45.132.17.85|www.amazon.fankiutnb.club|2022-04-13 19:52:34 45.132.17.85|www.amazon.uoyt3.club|2022-04-13 17:02:41
Рубрика: ruvds.com
Malware / Botnet / Phishing hosting server @45.10.247.41
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is obviously… Читать далее Malware / Botnet / Phishing hosting server @45.10.247.41
Loki botnet controller @193.42.113.194
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 193.42.113.194 on port 80 (using HTTP POST): hXXp://sempersim.su/ge12/fre.php sempersim.su. 600 IN A 195.133.10.94 Referencing malware binaries (MD5 hash): 282597edf1d6759a52472a855ed9e14f — AV detection:… Читать далее Loki botnet controller @193.42.113.194
Malware distribution @45.11.26.72
The host at this IP address is currently being used to distribute malware. Malware distribution located here: hXXp://shfpudpqth.top/strong/mix.exe shfpudpqth.top. 600 IN A 45.11.26.72 Referencing malware binaries (MD5 hash): 9c287453cdeefc0effea16c5c1890edf — AV detection: 40 / 70 (57.14)
Malware / Botnet / Phishing hosting server @45.10.247.19
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is running… Читать далее Malware / Botnet / Phishing hosting server @45.10.247.19
Malware distribution and malware botnet controller @193.124.118.130
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 193.124.118.130 on port 443: $ telnet 193.124.118.130 443 Trying 193.124.118.130… Connected to 193.124.118.130. Escape character is ‘^]’ Malware located here: hXXp://docmasterpassb.top/kdv/ubt-R_iBQqxPIRMOiB6o8qAlaVnp3s9CmcNQ1l3P/ Malicious domains… Читать далее Malware distribution and malware botnet controller @193.124.118.130
Malware botnet controller @85.208.208.112
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 85.208.208.112 port 443: $ telnet 85.208.208.112 443 Trying 85.208.208.112… Connected to 85.208.208.112. Escape character is ‘^]’… Читать далее Malware botnet controller @85.208.208.112
Smoke Loader botnet controller @45.135.233.190
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 45.135.233.190 on port 80 (using HTTP POST): hXXp://afrocalite.ga/ afrocalite.ga. 600 IN A 45.135.233.190 Referencing malware binaries (MD5 hash): 3d75271eb12cedd6440f8ed22724840c — AV… Читать далее Smoke Loader botnet controller @45.135.233.190
Malware botnet controller @195.133.46.143
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 195.133.46.143 on port 443. $ telnet 195.133.46.143 443 Trying 195.133.46.143… Connected to 195.133.46.143. Escape character is ‘^]’ Malicious domains observed at this IP… Читать далее Malware botnet controller @195.133.46.143
Malware botnet controller @45.11.27.52
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 45.11.27.52 on port 443: $ telnet 45.11.27.52 443 Trying 45.11.27.52… Connected to 45.11.27.52. Escape character is ‘^]’ Malicious domains observed at this IP… Читать далее Malware botnet controller @45.11.27.52