The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.
Malware botnet controller located at 104.21.63.77 on port 80 (using HTTP GET):
hXXp://humnkd.xyz/cookie/useStatistics/count
$ dig +short humnkd.xyz
104.21.63.77
Referencing malware binaries (MD5 hash):
4ffef2e35594eb44fcf1e4c222ec5341 — AV detection: 27 / 56 (48.21)
53074ccaf36bc24fd4286062f0cdac98 — AV detection: 21 / 67 (31.34)
76bc650e9936e7a08b159d7ab98eecfb — AV detection: 35 / 67 (52.24)
a1e656936816803eae447dfa8a500474 — AV detection: 42 / 69 (60.87)
a6f5ac33717a34ac8f2c7cbfec532500 — AV detection: 44 / 66 (66.67)
a7548e3a94d6f28101eb1b3c02f38981 — AV detection: 35 / 65 (53.85)
acd4f1abc20c791d50d011af42ddf59b — AV detection: 37 / 59 (62.71)
b05f49e2020b4e323441976fe58c9096 — AV detection: 35 / 64 (54.69)
b11a914144baf3fb7eb0b8075939d4dc — AV detection: 29 / 66 (43.94)
b3e7ffc2b68ac03d4d2cfbb8f3e33080 — AV detection: 36 / 65 (55.38)
b57b6c5d8f1cb3f7ad5d492028b957ef — AV detection: 37 / 64 (57.81)
beeae0294566a823cc4b40d6a006b374 — AV detection: 47 / 67 (70.15)
c5670c704486338a608674766ed6d93d — AV detection: 17 / 60 (28.33)
Other malicious domain names hosted on this IP address:
pupd02.qnancydkn.nl 104.21.63.77
www.freegames4rest.com 104.21.63.77
cdadesigngroup.com.au 104.21.63.77
humnkd.xyz 104.21.63.77