Google hosts the A record and website of the domain freecpewebinar.com. The owners of this domain are using ESP Benchmark Email to send spam emails to scraped, purchased or appended lists. Google: Please do NOT continue to allow spammers to abuse your network! Received: from pmta604.dedicated.bmsend.com (pmta604.dedicated.bmsend.com [12.174.236.139]) Date: Sat, 21 Aug 2021 12:##:## -0400… Читать далее freecpewebinar.com (A, website) (Pioneer Educator)
Рубрика: google.com
Assorted phish landing sites.
Yodobashi Camera mostly. 34.85.93.145 yodubashiace.ga 34.85.93.145 angfumaiban.gq 34.85.93.145 yodubashiace.tk 34.85.93.145 yudubashinfmac.tk 34.85.93.145 yobudashiafo.ml 34.85.93.145 muzztuotacjp.ml 34.85.93.145 actmoyofcojp.cf 34.85.93.145 anuttotakco.cf 34.85.93.145 muzzteakacjp.tk 34.85.93.145 yudubashinfmac.ml 34.85.93.145 madoaccinfjp.gq 34.85.93.145 yodoubeshinccop.cf 34.85.93.145 yudubasinfacc.cf 34.85.93.145 yodoubeshinccop.gq 34.85.93.145 yobudashiafo.cf 34.85.93.145 yodoubeshinccop.ml 34.85.93.145 yodobosheinf.cf 34.85.93.145 yodubashiace.gq 34.85.93.145 yobudashiafo.tk 34.85.93.145 yudobasicoinf.ml 34.85.93.145 anuttotakco.tk 34.85.93.145 yudubasinfacc.ml 34.85.93.145 muzzteakacjp.ml 34.85.93.145 yudobasicoinf.tk 34.85.93.145 yodoubeshiaccop.tk 34.85.93.145 muzzteakacjp.cf… Читать далее Assorted phish landing sites.
Assorted phish landing sites.
35.243.106.247 actmoyofcojp.tk 35.243.106.247 dacomuttjpco.gq 35.243.106.247 yodoubeshiaccop.gq 35.243.106.247 akatenntinfco.cf 35.243.106.247 autidacclin.cf 35.243.106.247 muzztuotacjp.ga 35.243.106.247 mengtoshisan.ml 35.243.106.247 mengtoshisan.gq 35.243.106.247 mengtoshisan.ga 35.243.106.247 docameaccfo.tk 35.243.106.247 docameaccfo.gq 35.243.106.247 mengtoshisan.tk 35.243.106.247 angfumaiban.ml AND MANY MORE, 30+
Spamvertised website
Received: from mail-pg1-x533.google.com ([2607:f8b0:4864:20::533]) From: thaiduong628@gmail.com Date: Sun, 29 Aug 2021 00:01:16 +0200 Subject:Funny T-Shirts For Engineer And Jobs Title T-Shirts https://engineerstore3.blogspot.com/2021/08/h2.html https://scienceflower.com/campaign/heavy-metals-chemistry-science-t-shirts engineerstore3.blogspot.com. 3600 IN CNAME blogspot.l.googleusercontent.com. blogspot.l.googleusercontent.com. 300 IN A 142.251.32.1 scienceflower.com. 300 IN A 104.21.51.216 scienceflower.com. 300 IN A 172.67.186.95
NTT DoCoMo phishing.
334th live listing. 34.146.247.192 smt-docomo-co-jp.website 34.146.247.192 ntt-docomo-co-jp.space 34.146.247.192 ntt-docomo-co-jp.website 34.146.247.192 ntt-docomo-co-jp.casa 34.146.247.192 ntt-docomo-co-jp.uno 34.146.247.192 etc-mylfei-jp.radio.am And MANY MORE variations on a theme. cfg-smt-docomo-ne-jp.website Porkbun, LLC ntt-docomo-co-jp.uno Porkbun, LLC ntt-docomo-ne-jp.website Porkbun, LLC smt-docomo-co-jp.website Porkbun, LLC smt-docomo-ne-jp.website Porkbun, LLC
learnfromgrc.com (GRC Educators, aka Ijona Serivces)
Google hosts the A Record and website of the domain learnfromgrc.com. The domain belongs to GRC Educators, aka Ijona Services/Ijona Skills. GRC Educators spams scarped, purchased, and appended lists to advertise its business compliance training and education services. It usually spams through respectable ESPs, in this case through Salesforce, and has been doing so under… Читать далее learnfromgrc.com (GRC Educators, aka Ijona Serivces)
Assorted phish landing sites.
yodobashi camera 34.97.52.59 yodobashi-ides.onthewifi.com credit card: hxxps://eposcardadmij.servebeer.com hxxps://eposcardnike.servebeer.com hxxps://eposcardmike.servebeer.com hxxps://eposcardokubo.serveftp.com hxxps://eposcardrecrds.servebeer.com hxxps://eposcardnagano.myvnc.com hxxps://eposcardkana.servebeer.com hxxps://eposcardaker.servebeer.com hxxps://eposcardcaces.servebeer.com
Phish landing sites.
How long will it take Google to get to this one? 35.241.124.129 disatermessoge.shop 35.241.124.129 dlsatermessage.shop 35.241.124.129 aboutprouducts.shop 35.241.124.129 bocahteam.top 35.241.124.129 amsking.jp 35.241.124.129 nttdocomoo.top 35.241.124.129 dncoskm.com 35.241.124.129 docomoadmin.dncoskm.com 35.241.124.129 onlinadmina.top 35.241.124.129 dnttadd.com 35.241.124.129 onlinadmin.com ——————- aboutproducts.shop aboutprouducts.shop adadaea.top amazonatop.com amsking.jp anshinsecurity.top anshinsecurlty.shop bocahteam.top cpraae.top ddnttsad.com disatermessage.shop disatermessage.top disatermessoge.shop dlsatermessage.shop dlsatermessoge.shop dncoskm.com dnttadd.com dnttadmin.com dpayment.top jsekinea.cc nttdocoomo.top… Читать далее Phish landing sites.
njrat botnet controller @35.239.113.160
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 35.239.113.160 on port 5050 TCP: $ telnet 35.239.113.160 5050 Trying 35.239.113.160… Connected to 35.239.113.160. Escape character… Читать далее njrat botnet controller @35.239.113.160
Amazon Phish landing sites.
All these and more land here. amazoncojpblockmss.gq amazonjapanamemu.ga amazonjapanamemu.gq amazonjapanamemu.ml amazonjapancomori.cf amazonjapancomori.ga amazonjapancotaken.cf amazonjapancotaken.gq amazonjapancotaken.tk amazonjapanossblock.cf amazonjpcoblock.cf amazonjpcormori.cf amazonjpcormori.tk backccounto.cf backccounto.ml ddo.jp <— dynamic dns service, lossbackaccount.cf middleventamaz.cf myvnc.com <— dynamic dns service, requactblack.cf requactblack.gq