The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 45.8.124.126 on port 443: $ telnet 45.8.124.126 443 Trying 45.8.124.126… Connected to 45.8.124.126. Escape character is ‘^]’ Malicious domains observed at this IP… Читать далее Malware botnet controller @45.8.124.126
Рубрика: selectel.ru
Cybercrime site/forum: infodig.ch / infodig.domains / infodig.sx
Stolen credit card data websites: https://ascarding.com/ >>> https://infodig.is/ infodig.ch. 600 IN A 45.8.124.79 infodig.domains. 600 IN A 45.8.124.79 infodig.sx. 600 IN A 45.8.124.79 ________________ Was: infodig.ch. 600 IN A 45.144.66.23 infodig.domains. 600 IN A 45.144.66.23 infodig.sx. 600 IN A 45.144.66.23 ________________ Was: infodig.ch. 600 IN A 185.87.49.197 infodig.domains. 600 IN A 185.87.49.197 infodig.sx. 600 IN… Читать далее Cybercrime site/forum: infodig.ch / infodig.domains / infodig.sx
RedLineStealer botnet controller @185.137.234.33
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 185.137.234.33 on port 8080 TCP: $ telnet 185.137.234.33 8080 Trying 185.137.234.33… Connected to 185.137.234.33. Escape character… Читать далее RedLineStealer botnet controller @185.137.234.33
Emotet botnet controller @82.202.192.66
Emotet botnet controller hosted here: $ telnet 82.202.192.66 80 Trying 82.202.192.66… Connected to 82.202.192.66. Escape character is ‘^]’.
Spamvertised website
2022-03-01 gotogml.com. 60 IN A 45.8.127.154 2022-03-01 gotogml.com. 60 IN A 45.8.127.155 2022-02-24 gotogml.com. 60 IN A 147.182.245.65 2022-02-24 gotogml.com. 60 IN A 213.166.70.250 2022-02-24 gotogml.com. 60 IN A 213.166.70.175 2022-02-23 gotogml.com. 60 IN A 37.140.197.206 2022-02-20 gotogml.com. 60 IN A 45.8.127.154 2022-02-01 gotogml.com. 60 IN A 194.87.1.4 2022-01-31 gotogml.com. 60 IN A 194.87.1.5 2022-01-20… Читать далее Spamvertised website
Spamvertised website
2022-03-01 gotogml.com. 60 IN A 45.8.127.155 2022-02-24 gotogml.com. 60 IN A 147.182.245.65 2022-02-24 gotogml.com. 60 IN A 213.166.70.250 2022-02-24 gotogml.com. 60 IN A 213.166.70.175 2022-02-23 gotogml.com. 60 IN A 37.140.197.206 2022-02-20 gotogml.com. 60 IN A 45.8.127.154 2022-02-01 gotogml.com. 60 IN A 194.87.1.4 2022-01-31 gotogml.com. 60 IN A 194.87.1.5 2022-01-20 gotogml.com. 60 IN A 194.87.185.11 2022-01-18… Читать далее Spamvertised website
Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Stolen credit card data websites (DNS servers): ns1.idinaxui-netspama.ru. 7168 IN A 172.245.36.102 ns2.idinaxui-netspama.ru. 7159 IN A 2.57.186.174 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 194.87.218.158 ns2.idinaxui-netspama.ru. 7159 IN A 2.57.186.157 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 194.87.218.158 ns2.idinaxui-netspama.ru. 7159 IN A 5.188.82.72 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 5.188.88.192 ns2.idinaxui-netspama.ru. 7159 IN A 185.103.109.130 ___________________ Was:… Читать далее Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Stolen credit card data websites (DNS servers): ns1.idinaxui-netspama.ru. 7168 IN A 194.87.218.158 ns2.idinaxui-netspama.ru. 7159 IN A 5.188.82.72 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 5.188.88.192 ns2.idinaxui-netspama.ru. 7159 IN A 185.103.109.130 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 5.180.136.218 ns2.idinaxui-netspama.ru. 7159 IN A 45.8.230.32 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 38.83.79.215 ns2.idinaxui-netspama.ru. 7159 IN A 185.173.38.225 ___________________ Was:… Читать далее Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Malware botnet controllers @45.8.124.187
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 45.8.124.187 on port 443: $ telnet 45.8.124.187 443 Trying 45.8.124.187… Connected to 45.8.124.187. Escape character is… Читать далее Malware botnet controllers @45.8.124.187
Malware botnet controller @185.137.234.33
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 185.137.234.33 on port 8080 TCP: $ telnet 185.137.234.33 8080 Trying 185.137.234.33… Connected to 185.137.234.33. Escape character… Читать далее Malware botnet controller @185.137.234.33