Malware botnet controller @34.138.254.66

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 34.138.254.66 on port 443. $ telnet 34.138.254.66 443 Trying 34.138.254.66… Connected to 34.138.254.66. Escape character is ‘^]’ $ dig +short -x 34.138.254.66 66.254.138.34.bc.googleusercontent.com.… Читать далее Malware botnet controller @34.138.254.66

Опубликовано
В рубрике google.com

Malware distribution & malware botnet controllers @34.94.211.117

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 34.94.211.117 on port 80 (using HTTP POST): hXXp://host-data-coin-11.com/ host-data-coin-11.com. 600 IN A 34.94.211.117 Referencing malware binaries (MD5 hash): 16a32ce5e3bde626c4fe08878a2c3682 — AV… Читать далее Malware distribution & malware botnet controllers @34.94.211.117

Опубликовано
В рубрике google.com

Spam hosting/Mx (multiple domains) (OMICS)

This IP address hosts the A records of multiple domains belonging to OMICS, under at least two of its business names — Austin Publishing and Remedy Publishing. OMICS is a publisher of «open-access» journals that solicits contributions and (by implication) subscriptions through spam sent to scraped, purchased and appended lists. Those domains include: Among the… Читать далее Spam hosting/Mx (multiple domains) (OMICS)

Опубликовано
В рубрике google.com

Spam MX services (remedypublication.net) (OMICS)

Google provides MX Services for the domain remedypublication.net, which belongs to Remedy Publishers, aka OMICS. OMICS is a publisher of «open-access» journals. It solicits contributions and (by implication) subscriptions to its journals by sending spam to scraped, purchased, or appended lists. OMICS has considerably over 100 SBL listings, over 40 of which are currently live.… Читать далее Spam MX services (remedypublication.net) (OMICS)

Опубликовано
В рубрике google.com

phishing server

34.106.142.138|boa-secures01.com|2022-01-23 20:51:17 34.106.142.138|boa-secures02.com|2022-01-23 20:56:13 34.106.142.138|boa-secures03.com|2022-01-23 22:01:02 34.106.142.138|chase-team1.com|2022-01-22 20:36:10 34.106.142.138|chase-team2.com|2022-01-22 21:25:54 34.106.142.138|chase-team3.com|2022-01-22 21:55:51 34.106.142.138|chase-team4.com|2022-01-22 22:15:53 34.106.142.138|chase-verified1.com|2022-01-23 18:35:59 —- 34.106.142.138|boa-secured05.com|2022-01-24 00:01:02 34.106.142.138|boa-secured06.com|2022-01-24 00:11:16 34.106.142.138|boa-secured07.com|2022-01-24 01:05:42 34.106.142.138|boa-secures01.com|2022-01-23 20:51:17 34.106.142.138|boa-secures02.com|2022-01-23 20:56:13 34.106.142.138|boa-secures03.com|2022-01-23 22:01:02 34.106.142.138|boa-secures04.com|2022-01-23 22:26:05 34.106.142.138|chase-team1.com|2022-01-22 20:36:10 34.106.142.138|chase-team2.com|2022-01-22 21:25:54 34.106.142.138|chase-team3.com|2022-01-22 21:55:51 34.106.142.138|chase-team4.com|2022-01-22 22:15:53 34.106.142.138|chase-verified1.com|2022-01-23 18:35:59

Опубликовано
В рубрике google.com

Malware / Botnet / Phishing hosting server @34.138.15.9

According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. Malware botnet controller located at 34.138.15.9 port 443… Читать далее Malware / Botnet / Phishing hosting server @34.138.15.9

Опубликовано
В рубрике google.com

Tofsee botnet controller @35.228.103.145

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 35.228.103.145 on port 443 TCP: $ telnet 35.228.103.145 443 Trying 35.228.103.145… Connected to 35.228.103.145. Escape character… Читать далее Tofsee botnet controller @35.228.103.145

Опубликовано
В рубрике google.com

phishing server

mobile-auth-ref-093483.com has address 34.118.84.207 EasyWeb Login TD Canada Trust 34.118.84.207|accesweb-securite-797387.com|2022-02-01 04:56:13 34.118.84.207|accesweb-securite-91015394.com|2022-02-01 03:11:32 34.118.84.207|accesweb-securite-927964.com|2022-01-31 03:26:21 34.118.84.207|auth-ref-048279.com|2022-01-31 06:54:29 34.118.84.207|auth-ref-056382.com|2022-01-31 06:51:46 34.118.84.207|auth-ref-093483.com|2022-01-31 03:26:31 34.118.84.207|auth-ref-093631.com|2022-02-01 04:01:34 34.118.84.207|mobile-auth-ref-093483.com|2022-02-01 02:11:35

Опубликовано
В рубрике google.com

Malware distribution & malware botnet controllers @34.118.37.165

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 34.118.37.165 on port 80 (using HTTP POST): hXXp://coin-coin-file-9.com/ coin-coin-file-9.com. 600 IN A 34.118.37.165 Referencing malware binaries (MD5 hash): 16a32ce5e3bde626c4fe08878a2c3682 — AV… Читать далее Malware distribution & malware botnet controllers @34.118.37.165

Опубликовано
В рубрике google.com

Malware distribution & botnet controller @35.226.107.62

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 35.226.107.62 on port 443: $ telnet 35.226.107.62 443 Trying 35.226.107.62… Connected to 35.226.107.62. Escape character is… Читать далее Malware distribution & botnet controller @35.226.107.62

Опубликовано
В рубрике google.com