hXXp://ambienteseguro.ml/ ambienteseguro.ml ambienteseguro.cf atendimentocadastroajuda.ga modoatutenticacao.ml examina.ga modoprivado.ga modoautenticacao.cf estudo.ga verificacao.gq atendimentocadastroajuda.cf verificacao.cf analise.cf analise.ga modoprivado.ml modoprivado.cf carrosibridos.tk itauempresasguardiao.gq modoseguro.gq modoseguro.cf itauempresasguardiao.ga atendimentocadastroajuda.ml netempresasegura.ga magzlu.cf netempresasegura.cf netempresasegura.ml novoatendimentoqrcode.ga modoseguro.ml assistenciaparahabilitar.ml novoatendimentoqrcode.cf itauempresasguardiao.ml novoatendimentoqrcode.ml
Рубрика: microsoft.com
AsyncRAT botnet controller @20.69.152.28
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 20.69.152.28 on port 7707 TCP: $ telnet 20.69.152.28 7707 Trying 20.69.152.28… Connected to 20.69.152.28. Escape character… Читать далее AsyncRAT botnet controller @20.69.152.28
phishing server
eventitemffterbaru.ml has address 65.52.121.135 foryou2.my.id has address 65.52.121.135 redeemhadiahpb.xyz has address 65.52.121.135 contohbuatsc.xyz has address 65.52.121.135 klaimfreefire23.ml has address 65.52.121.135 efootballpes-coins-event.ga has address 65.52.121.135 efootballpes-coins-event.gq has address 65.52.121.135 efootballpes-coins-event.cf has address 65.52.121.135 vipmaterial.ml has address 65.52.121.135 wtsgruobmy.tk has address 65.52.121.135 news-mlbb2021.gq has address 65.52.121.135
AsyncRAT botnet controller @20.98.203.218
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 20.98.203.218 on port 8080 TCP: $ telnet 20.98.203.218 8080 Trying 20.98.203.218… Connected to 20.98.203.218. Escape character… Читать далее AsyncRAT botnet controller @20.98.203.218
Cerberus botnet controller @51.140.106.206
Cerberus botnet controller hosted here: http://51.140.106.206/gate.php
USPS phishing server
hXXp://uusps.cf/USPS/verification/ $ host uusps.cf uusps.cf has address 52.188.225.79
phishing server
8/8/2021 > 290 phishing sites on this IP. fb-privacy-1000034208711592454170-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454161-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454165-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454162-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454163-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454167-tw.tk has address 20.106.72.121 fb-privacy-1000034208711592454169-tw.tk has address 20.106.72.121
phishing server
hxxp://nfcuverify.org $ host nfcuverify.org nfcuverify.org has address 52.255.154.246 hXXp://knoili.com/ $ host knoili.com knoili.com has address 52.255.154.246
njrat botnet controller @20.194.35.6
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 20.194.35.6 on port 7904 TCP: $ telnet 20.194.35.6 7904 Trying 20.194.35.6… Connected to 20.194.35.6. Escape character… Читать далее njrat botnet controller @20.194.35.6
BitRAT botnet controller @52.252.234.34
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 52.252.234.34 on port 2222 TCP: $ telnet 52.252.234.34 2222 Trying 52.252.234.34… Connected to 52.252.234.34. Escape character… Читать далее BitRAT botnet controller @52.252.234.34