DCRat botnet controller @82.146.59.136

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. DCRat botnet controller located at 82.146.59.136 on port 80 (using HTTP GET): hXXp://82.146.59.136/_/datalife45/TrackProcessDle/JavascriptUpdateGeneratordlelocal.php $ nslookup 82.146.59.136 nolove209.fvds.ru Referencing malware binaries (MD5 hash): bc43cff296c2977a382f6569ed0db331 — AV detection: 40… Читать далее DCRat botnet controller @82.146.59.136

Опубликовано
В рубрике ispserver.com

Malware botnet controller @62.109.16.47

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 62.109.16.47 on port 80 (using HTTP GET): hXXp://62.109.16.47/API/2/configure.php $ nslookup 62.109.16.47 d.4442ur.fvds.ru Referencing malware binaries (MD5 hash): 02c1514da075534896a4223a620446b7 — AV detection: 24… Читать далее Malware botnet controller @62.109.16.47

Опубликовано
В рубрике ispserver.com

DCRat botnet controller @77.246.158.136

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. DCRat botnet controller located at 77.246.158.136 on port 80 (using HTTP GET): hXXp://77.246.158.136/62Api/flower/ApiVoiddb/track/DumpLongpollJsMariadb/VoiddbWordpress/flower/6/DatalifelocalFlower/1python/DlePhpSql/Temporary5Default/Video/Pythonmulti4/EternallinuxGeneratorTemp.php $ nslookup 77.246.158.136 akksvina12.fvds.ru Referencing malware binaries (MD5 hash): a7b9245f75fe9a8c0cfea633cf4685c5 — AV detection: 47… Читать далее DCRat botnet controller @77.246.158.136

Опубликовано
В рубрике ispserver.com

Malware botnet controller @188.120.232.237

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 188.120.232.237 on port 80 (using HTTP GET): hXXp://188.120.232.237/API/2/configure.php $ nslookup 188.120.232.237 artemy.gvozdik.fvds.ru Referencing malware binaries (MD5 hash): 04905f7a5d19e2dba9634cb7bb246af7 — AV detection: 37… Читать далее Malware botnet controller @188.120.232.237

Опубликовано
В рубрике ispserver.com

Malware botnet controller @185.63.191.169

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 185.63.191.169 on port 80 (using HTTP GET): hXXp://185.63.191.169/API/2/configure.php $ nslookup 185.63.191.169 g0rbunov.gordei.fvds.ru Referencing malware binaries (MD5 hash): 5eb13192123cb1e7327d51d1c6bfdf44 — AV detection: 42… Читать далее Malware botnet controller @185.63.191.169

Опубликовано
В рубрике ispserver.com

DCRat botnet controller @94.250.253.4

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. DCRat botnet controller located at 94.250.253.4 on port 80 (using HTTP GET): hXXp://94.250.253.4/Wp/8testDownloads/0ProcessorTrafficmariadb/imageApiVoiddbpython/ProtonProcess/5/js/UniversalProcessVideoApi/7Base/Dlegeo58/2/ServerWindowsSql/2datalifeEternalsecure/processDefaultLinuxwindows.php $ nslookup 94.250.253.4 melanieliza.fvds.ru Referencing malware binaries (MD5 hash): e7dac1680784996bdbd5f97595c351b4 — AV detection: 49… Читать далее DCRat botnet controller @94.250.253.4

Опубликовано
В рубрике ispserver.com

DCRat botnet controller @82.146.48.223

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. DCRat botnet controller located at 82.146.48.223 on port 80 (using HTTP GET): hXXp://82.146.48.223/63/TrackGenerator/Phpjavascript0/SecureProtect0Base/defaultuniversalLocalcentralDownloads.php $ nslookup 82.146.48.223 sq.hack.fvds.ru Referencing malware binaries (MD5 hash): 6e4f52db7bfdadb99a8dfb7f1f6b9333 — AV detection: 29… Читать далее DCRat botnet controller @82.146.48.223

Опубликовано
В рубрике ispserver.com

DCRat botnet controller @80.87.196.100

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. DCRat botnet controller located at 80.87.196.100 on port 80 (using HTTP GET): hXXp://80.87.196.100/providerphpgame.php $ nslookup 80.87.196.100 lolsasha123zzz.fvds.ru

Опубликовано
В рубрике ispserver.com

Malware botnet controller @77.246.158.37

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 77.246.158.377 on port 443: $ telnet 77.246.158.37 443 Trying 77.246.158.37… Connected to 77.246.158.37. Escape character is ‘^]’ gc-distribution.biz. 60 IN A 77.246.158.377

Опубликовано
В рубрике ispserver.com

Malware botnet controller @82.146.40.179

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 82.146.40.179 on port 443: $ telnet 82.146.40.179 443 Trying 82.146.40.179… Connected to 82.146.40.179. Escape character is ‘^]’ Malicious domains observed at this… Читать далее Malware botnet controller @82.146.40.179

Опубликовано
В рубрике ispserver.com