The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 185.185.68.245 on port 443: $ telnet 185.185.68.245 443 Trying 185.185.68.245… Connected to 185.185.68.245. Escape character is… Читать далее Malware botnet controller @185.185.68.245
Рубрика: sprinthost.ru
Malware distribution & malware botnet controller @176.119.147.41
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 176.119.147.41 on port 443 TCP: $ telnet 176.119.147.41 443 Trying 176.119.147.41… Connected to 176.119.147.41. Escape character… Читать далее Malware distribution & malware botnet controller @176.119.147.41
Loki botnet controller @185.185.69.76
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 185.185.69.76 on port 80 (using HTTP POST): hXXp://secure01-redirect.net/gc5/fre.php secure01-redirect.net. 600 IN A 185.185.69.76 Referencing malware binaries (MD5 hash): 551b922ffeac1a93a892a5b15f4465ee — AV detection:… Читать далее Loki botnet controller @185.185.69.76
Malware botnet controllers @185.251.91.108
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 185.251.91.108 on port 443: $ telnet 185.251.91.108 443 Trying 185.251.91.108… Connected to 185.251.91.108. Escape character is… Читать далее Malware botnet controllers @185.251.91.108