http://luckycasweb.com 302 Redirect https://go.affpower.com/visit/?bta=36573&nci=6476 302 Redirect https://cp-ads.com/affs/bliss/cx/do/all?btag=36573_379340|||LP_Default_Offer_EN_ALL_ 301 Redirect https://cp-ads.com/affs/bliss/cx/do/all/index.html?btag=36573_379340%7C%7C%7CLP_Default_Offer_EN_ALL_ ;; ANSWER SECTION: go.affpower.com. 299 IN CNAME affpower-tracking.cxaff.com. affpower-tracking.cxaff.com. 299 IN CNAME go-affpower-com.cellexpertx.prod2.reblaze.com. go-affpower-com.cellexpertx.prod2.reblaze.com. 299 IN A 35.234.86.61 2020-05-26 17:05:17 admin-bdswiss-com.cellexpertx.prod2.reblaze.com A 35.234.86.61 2020-05-06 19:19:18 affiliate-api.cellexpertx.prod2.reblaze.com A 35.234.86.61 2020-01-07 01:25:39 affiliates-ig-com.cellexpertx.prod2.reblaze.com A 35.234.86.61 2020-05-06 19:20:20 affs-xforex-com.cellexpertx.prod2.reblaze.com A 35.234.86.61 2019-12-06 15:57:45 cpartner-bdswiss-com.cellexpertx.prod2.reblaze.com A 35.234.86.61 2020-05-27 00:32:13… Читать далее Hosting botnet spammed scam business & casino domains
Рубрика: google.com
Hosting botnet spammed scam business & casino domain: cp-ads.com
http://luckycasweb.com 302 Redirect https://go.affpower.com/visit/?bta=36573&nci=6476 302 Redirect https://cp-ads.com/affs/bliss/cx/do/all?btag=36573_379340|||LP_Default_Offer_EN_ALL_ 301 Redirect https://cp-ads.com/affs/bliss/cx/do/all/index.html?btag=36573_379340%7C%7C%7CLP_Default_Offer_EN_ALL_ ;; ANSWER SECTION: cp-ads.com. 59 IN A 35.241.63.253
Malware distribution @35.213.153.85
The host at this IP address (35.213.153.85) is either operated by cybercriminals or hosting compromised websites that are being used to distribute malware: https://paramassociates.co.in/hqzhd6.txt AS number: AS15169 AS name: GOOGLE Hostname: 85.153.213.35.bc.googleusercontent.com
Malware distribution @35.184.169.169
The host at this IP address (35.184.169.169) is either operated by cybercriminals or hosting compromised websites that are being used to distribute malware: http://35.184.169.169/software056/SystemSecure.exe AS number: AS15169 AS name: GOOGLE Hostname: 169.169.184.35.bc.googleusercontent.com
Malware distribution @34.95.239.176
The host at this IP address (34.95.239.176) is either operated by cybercriminals or hosting compromised websites that are being used to distribute malware: https://office.horussolution.com/files/04UT0TR1/42tphpvi/ https://office.horussolution.com/files/jk31_bx_pr/ https://office.horussolution.com/files/paclm/58j2gdwo0o/l1s20858103992aizm1m9sjcg3z5oi/ https://office.horussolution.com/files/Documentation/5Fh7ALucpQ/ https://office.horussolution.com/files/paclm/4ddnAqPo2G/ AS number: AS15169 AS name: GOOGLE Hostname: 176.239.95.34.bc.googleusercontent.com
Bitcoin scam redirectors.
Received: from drama.tigerman.best (45.254.35.12 [45.254.35.12]) Date: Wed, 21 Apr 2021 12:0x:xx +0000 Subject: Surf mee op de bitcoin-golf en verdien een gegarandeerde From: Bitcoin Nieuws <drama@tigerman.best> https://drive.timeforu.info/index.php/campaigns/[] => https://yellowow.co/sup003 => https://www.vbpol29.com/[]/?uid=83 => https://ss852cctrkflw.com/transaction/click/[]?id=[]&offer_id=1&affiliate_id=18784&t=3&offer_name=Bitcoin+System[] => https://btsystemos.com/index.php?lang=[]&id=[]&offer_id=1&affiliate_id=18784&t=3&offer_name=Bitcoin+System[] => https://ssfxtrade.com/autologin/[] => https://www.obrinvest.com/redirects/trade/?lang=en drive.timeforu.info. 300 IN A 104.21.17.142 drive.timeforu.info. 300 IN A 172.67.176.212 yellowow.co. 300 IN A 104.21.2.27 yellowow.co.… Читать далее Bitcoin scam redirectors.
Hacked sites hosting IRS phishing pages (escalation)
https://compagnidiviaggio.net/logs/update-your-account-information/security-measure/log-in/ compagnidiviaggio.net. 14343 IN A 34.90.48.198 SBL503748 34.90.48.198 google.com 2020-12-02 Hacked server hosting PayPal phish site SBL503455 34.90.48.198 google.com 2020-12-05 Hacked server hosting PayPal phish site
Carding fraud site/forums uniCC-bazar.cm (fe-shop.ru (approved-cc.su / trump-dumps.ru / iprofit.cc / megasearch.su / carderspro.com)
Stolen credit card data websites. unicc-bazar.cm. 599 IN A 35.242.182.237 35.242.182.237 plattform-formular-idcheck.com 2021-02-15 09:14:54 35.242.182.237 plattform-logincheck-legit.com 2021-02-11 22:35:03 35.242.182.237 plattform-loginform-checkid.com 2021-02-12 19:36:54 35.242.182.237 unicc-bazar.cm 2021-02-22 16:01:49 ______________ Was: unicc-bazar.cm. 599 IN A 79.174.12.93 ______________ Was: unicc-bazar.cm. 599 IN A 193.32.188.53 ______________ Was: unicc-bazar.cm. 599 IN A 8.208.9.212 ______________ Was: unicc-bazar.cm. 299 IN A 104.27.151.1 unicc-bazar.cm.… Читать далее Carding fraud site/forums uniCC-bazar.cm (fe-shop.ru (approved-cc.su / trump-dumps.ru / iprofit.cc / megasearch.su / carderspro.com)
Using hacked server/account to send porn spam for: https://goo.gl/Kvuf8M
https://goo.gl/Kvuf8M 302 Redirect http://howeveryoulikefun.info/Emily 301 Redirect https://howeveryoulikefun.info/Emily 302 Redirect http://gssa.info/ 301 Redirect http://www.gssa.info/ 301 Redirect https://dating-contacts-here2.com/?u=0rfpae3&o=13780xn&m=1&t=shaha goo.gl. 299 IN A 142.250.68.78 ________________ Received: from ns1.cdgjo.com (ns1.cdgjo.com [168.235.80.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by xxx; Fri, 18 Dec 2020 04:22:26 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=cdgjo.com; s=mail; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:… Читать далее Using hacked server/account to send porn spam for: https://goo.gl/Kvuf8M
Spam Hosting (form.jotform.com)
GoogleUserContent hosts the landing page for a long-time spammer from Sales Catalyst, a Philippines0-based spam operation. The URL is hidden behind bit.ly or a SalesCatalyst link tracker. Google: Please do not allow this spammer to continue to abuse your resources. Received: from mail2.xpert-sender.com (mail2.xpert-sender.com [110.76.190.241]) Date: Thu, 17 Dec 2020 19:##:## +0800 (HKT) From: JHIE… Читать далее Spam Hosting (form.jotform.com)