Credit card fraud gang hosting (DNS): florenciyas.su (shopltdccfreshshop.ru / shop-buying-cvv.ru etc.)

Stolen credit card data websites (DNS servers): ns1.florenciyas.su. 7174 IN A 195.14.189.116 ns2.florenciyas.su. 7167 IN A 51.195.255.167 __________________________ Was: ns1.florenciyas.su. 7174 IN A 87.251.79.163 ns2.florenciyas.su. 7167 IN A 109.107.184.239 __________________________ Was: ns1.florenciyas.su. 7174 IN A 2.57.186.176 ns2.florenciyas.su. 7167 IN A 185.204.3.164 __________________________ Was: ns1.florenciyas.su. 7174 IN A 2.57.186.176 ns2.florenciyas.su. 7167 IN A 5.188.89.71 __________________________ Was:… Читать далее Credit card fraud gang hosting (DNS): florenciyas.su (shopltdccfreshshop.ru / shop-buying-cvv.ru etc.)

Опубликовано
В рубрике ovh.net

Malware botnet controller @149.56.41.77

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 149.56.41.77 on port 443: $ telnet 149.56.41.77 443 Trying 149.56.41.77… Connected to 149.56.41.77. Escape character is ‘^]’ amazinginvezt.org. 60 IN A 149.56.41.77… Читать далее Malware botnet controller @149.56.41.77

Опубликовано
В рубрике ovh.net

BitRAT botnet controller @158.69.152.26

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 158.69.152.26 on port 54329 TCP: $ telnet 158.69.152.26 54329 Trying 158.69.152.26… Connected to 158.69.152.26. Escape character… Читать далее BitRAT botnet controller @158.69.152.26

Опубликовано
В рубрике ovh.net

spam source

Received: from ihjlkopfyuvdh.us (141.95.104.75) Sender: jim=fustinis.com@mg.fustinis.com Date: Thu, 11 Nov 2021 15:07:xx +0000 Subject: =?UTF-8?B?WW91ciBQYWNrYWdlIC1Ob3RpZmljYXRpb24=?= =?UTF-8?B?8J+OhA==?=

Опубликовано
В рубрике ovh.net

Malware botnet controller @145.239.201.32

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 145.239.201.32 on port 443: $ telnet 145.239.201.32 443 Trying 145.239.201.32… Connected to 145.239.201.32. Escape character is ‘^]’ ads-memory.biz. 60 IN A 145.239.201.32… Читать далее Malware botnet controller @145.239.201.32

Опубликовано
В рубрике ovh.net

Canadian Pharmacy

51.222.136.197 bokoxbuv.xn--90apbf5a7a0e.xn--p1ai 2021-09-16 01:14:52 51.222.136.197 bvkvknla.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-29 22:59:43 51.222.136.197 canadiantabstore.com 2022-01-31 06:36:48 51.222.136.197 cniqsqet.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30 18:12:17 51.222.136.197 dbtizert.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-29 23:40:45 51.222.136.197 dgychea.xn--90apbf5a7a0e.xn--p1ai 2021-09-16 01:12:58 51.222.136.197 dvidpgs.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30 11:36:08 51.222.136.197 ebcakava.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30 02:54:18 51.222.136.197 enomgwz.xn--90apbf5a7a0e.xn--p1ai 2021-09-16 00:38:44 51.222.136.197 ezdnihoz.xn--90apbf5a7a0e.xn--p1ai 2021-09-16 01:17:42 51.222.136.197 fodgxcfa.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30 18:12:19 51.222.136.197 gfuipycu.xn--90apbf5a7a0e.xn--p1ai 2021-09-16 00:59:27 51.222.136.197 ggedpgny.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30 10:42:26 51.222.136.197 gzweeuly.xn--e1anbcbbkd2gta6a.xn--p1ai 2021-07-30… Читать далее Canadian Pharmacy

Опубликовано
В рубрике ovh.net

DCRat botnet controller @15.235.10.108

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 15.235.10.108 on port 8848 TCP: $ telnet 15.235.10.108 8848 Trying 15.235.10.108… Connected to 15.235.10.108. Escape character… Читать далее DCRat botnet controller @15.235.10.108

Опубликовано
В рубрике ovh.net

AsyncRAT botnet controller @15.235.13.122

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 15.235.13.122 on port 3000 TCP: $ telnet 15.235.13.122 3000 Trying 15.235.13.122… Connected to 15.235.13.122. Escape character… Читать далее AsyncRAT botnet controller @15.235.13.122

Опубликовано
В рубрике ovh.net

QuasarRAT botnet controller @51.178.13.102

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 51.178.13.102 on port 8324 TCP: $ telnet 51.178.13.102 8324 Trying 51.178.13.102… Connected to 51.178.13.102. Escape character… Читать далее QuasarRAT botnet controller @51.178.13.102

Опубликовано
В рубрике ovh.net

Malware botnet controller @135.125.241.48

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 135.125.241.48 on port 443: $ telnet 135.125.241.48 443 Trying 135.125.241.48… Connected to 135.125.241.48. Escape character is ‘^]’ gc-distribution.biz. 60 IN A 135.125.241.48

Опубликовано
В рубрике ovh.net