The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 34.138.254.66 on port 443. $ telnet 34.138.254.66 443 Trying 34.138.254.66… Connected to 34.138.254.66. Escape character is ‘^]’ $ dig +short -x 34.138.254.66 66.254.138.34.bc.googleusercontent.com.… Читать далее Malware botnet controller @34.138.254.66
Рубрика: google.com
Spam hosting/Mx (multiple domains) (OMICS)
This IP address hosts the A records of multiple domains belonging to OMICS, under at least two of its business names — Austin Publishing and Remedy Publishing. OMICS is a publisher of «open-access» journals that solicits contributions and (by implication) subscriptions through spam sent to scraped, purchased and appended lists. Those domains include: Among the… Читать далее Spam hosting/Mx (multiple domains) (OMICS)
Malware distribution & malware botnet controllers @34.94.211.117
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 34.94.211.117 on port 80 (using HTTP POST): hXXp://host-data-coin-11.com/ host-data-coin-11.com. 600 IN A 34.94.211.117 Referencing malware binaries (MD5 hash): 16a32ce5e3bde626c4fe08878a2c3682 — AV… Читать далее Malware distribution & malware botnet controllers @34.94.211.117
Spam MX services (remedypublication.net) (OMICS)
Google provides MX Services for the domain remedypublication.net, which belongs to Remedy Publishers, aka OMICS. OMICS is a publisher of «open-access» journals. It solicits contributions and (by implication) subscriptions to its journals by sending spam to scraped, purchased, or appended lists. OMICS has considerably over 100 SBL listings, over 40 of which are currently live.… Читать далее Spam MX services (remedypublication.net) (OMICS)
phishing server
34.106.142.138|boa-secures01.com|2022-01-23 20:51:17 34.106.142.138|boa-secures02.com|2022-01-23 20:56:13 34.106.142.138|boa-secures03.com|2022-01-23 22:01:02 34.106.142.138|chase-team1.com|2022-01-22 20:36:10 34.106.142.138|chase-team2.com|2022-01-22 21:25:54 34.106.142.138|chase-team3.com|2022-01-22 21:55:51 34.106.142.138|chase-team4.com|2022-01-22 22:15:53 34.106.142.138|chase-verified1.com|2022-01-23 18:35:59 —- 34.106.142.138|boa-secured05.com|2022-01-24 00:01:02 34.106.142.138|boa-secured06.com|2022-01-24 00:11:16 34.106.142.138|boa-secured07.com|2022-01-24 01:05:42 34.106.142.138|boa-secures01.com|2022-01-23 20:51:17 34.106.142.138|boa-secures02.com|2022-01-23 20:56:13 34.106.142.138|boa-secures03.com|2022-01-23 22:01:02 34.106.142.138|boa-secures04.com|2022-01-23 22:26:05 34.106.142.138|chase-team1.com|2022-01-22 20:36:10 34.106.142.138|chase-team2.com|2022-01-22 21:25:54 34.106.142.138|chase-team3.com|2022-01-22 21:55:51 34.106.142.138|chase-team4.com|2022-01-22 22:15:53 34.106.142.138|chase-verified1.com|2022-01-23 18:35:59
Malware / Botnet / Phishing hosting server @34.138.15.9
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. Malware botnet controller located at 34.138.15.9 port 443… Читать далее Malware / Botnet / Phishing hosting server @34.138.15.9
Tofsee botnet controller @35.228.103.145
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 35.228.103.145 on port 443 TCP: $ telnet 35.228.103.145 443 Trying 35.228.103.145… Connected to 35.228.103.145. Escape character… Читать далее Tofsee botnet controller @35.228.103.145
Malware distribution & malware botnet controllers @34.118.37.165
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 34.118.37.165 on port 80 (using HTTP POST): hXXp://coin-coin-file-9.com/ coin-coin-file-9.com. 600 IN A 34.118.37.165 Referencing malware binaries (MD5 hash): 16a32ce5e3bde626c4fe08878a2c3682 — AV… Читать далее Malware distribution & malware botnet controllers @34.118.37.165
phishing server
mobile-auth-ref-093483.com has address 34.118.84.207 EasyWeb Login TD Canada Trust 34.118.84.207|accesweb-securite-797387.com|2022-02-01 04:56:13 34.118.84.207|accesweb-securite-91015394.com|2022-02-01 03:11:32 34.118.84.207|accesweb-securite-927964.com|2022-01-31 03:26:21 34.118.84.207|auth-ref-048279.com|2022-01-31 06:54:29 34.118.84.207|auth-ref-056382.com|2022-01-31 06:51:46 34.118.84.207|auth-ref-093483.com|2022-01-31 03:26:31 34.118.84.207|auth-ref-093631.com|2022-02-01 04:01:34 34.118.84.207|mobile-auth-ref-093483.com|2022-02-01 02:11:35
Malware distribution & botnet controller @35.226.107.62
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 35.226.107.62 on port 443: $ telnet 35.226.107.62 443 Trying 35.226.107.62… Connected to 35.226.107.62. Escape character is… Читать далее Malware distribution & botnet controller @35.226.107.62