hXXps://asmr.ougoul.com/PHOv4Iv $ host asmr.ougoul.com asmr.ougoul.com has address 20.84.64.21 ogiero.com spdcmgo.com zcvuyly.com menfbc.com anakyatimadalah.org travvon.com ccxwl.com pfozofe.com fiififo.com lipuray.com
Рубрика: microsoft.com
ParallaxRAT botnet controller @52.229.23.65
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 52.229.23.65 on port 2345 TCP: $ telnet 52.229.23.65 2345 Trying 52.229.23.65… Connected to 52.229.23.65. Escape character… Читать далее ParallaxRAT botnet controller @52.229.23.65
IRS Phishing server
hXXps://irs.gov.covid19-thirdpayment.com/form/personal $ host irs.gov.covid19-thirdpayment.com irs.gov.covid19-thirdpayment.com has address 20.83.144.191 — hXXps://findyourdns.com/h0V6e0B $ host findyourdns.com findyourdns.com has address 20.83.144.191 — hXXps://covid19.irs.gov.irspayrent.com/home pigsarmy.finance irs-claimpayment.com tracktheip.com payment-covidstatus.com irscovid19.com irspayrent.com findyourdns.com tsel.plus covid19-thirdpayment.com
Malware botnet controller @104.43.200.50
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 104.43.200.50 on port 2224 TCP: $ telnet 104.43.200.50 2224 Trying 104.43.200.50… Connected to 104.43.200.50. Escape character… Читать далее Malware botnet controller @104.43.200.50
Malware botnet controller @157.55.136.23
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 157.55.136.23 on port 5300 TCP: $ telnet 157.55.136.23 5300 Trying 157.55.136.23… Connected to 157.55.136.23. Escape character… Читать далее Malware botnet controller @157.55.136.23
BitRAT botnet controller @104.208.31.182
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 104.208.31.182 on port 2222 TCP: $ telnet 104.208.31.182 2222 Trying 104.208.31.182… Connected to 104.208.31.182. Escape character… Читать далее BitRAT botnet controller @104.208.31.182
phishing server
hXXps://transactional-gov-irs-753678.com/
Phishing hosting @13.89.38.148
paypal-infocenter.com A 13.89.38.148 tracksupport-usps.com A 13.89.38.148 unusual-activity-service.com A 13.89.38.148
phishing server
$hXXp://claimfreexml-news1.gq/ host claimfreexml-news1.gq claimfreexml-news1.gq has address 40.76.223.231
phishing server
New domains added as old ones get terminated. getscodashop-diamonds5.cf freeclaimdmcodashop2.ml