2022.01.16 smartdappwalletsconnect.com has address 159.65.99.182 2021.12.08 back to 24shells. Which has a surfeit of scams/IP. 2021.12.05 Alibaba gave the phisher his server back. That rather throws a spanner in any trustworthiness. smartdappwalletsconnect.com has address 67.220.187.210 AND MANY MORE. e.g. pcakenets.site has address 67.220.187.210 pancakesswaps.net pcakenets.online easydappsfix.com easywalletsfix.com bridgewalletvalidate.com ————————————— bc-royal.com has address 8.214.45.93 premiercitionline.com has… Читать далее Assorted crypto scam landing sites.
GCleaner tier-2 botnet controller @92.63.203.180
The host at this IP address is hosting a GCleaner tier-2 botnet controller on port 80 TCP: http://92.63.203.180
Malware botnet controller @194.87.185.58
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 194.87.185.58 port 443: $ telnet 194.87.185.58 443 Trying 194.87.185.58… Connected to 194.87.185.58. Escape character is ‘^]’ Malicious domain names hosted on this IP… Читать далее Malware botnet controller @194.87.185.58
phishing server
35.229.249.161|mycommbank-1og.in|2022-01-15 06:51:05 35.229.249.161|mycommbankingsecure-log.in|2022-01-14 13:37:26 35.229.249.161|mycommbankingsecured-log.in|2022-01-15 05:11:01 35.229.249.161|mycommbanksec.com.au|2022-01-13 01:31:28 35.229.249.161|mycommsecure.com.au|2022-01-14 05:37:22 35.229.249.161|mycommsecured-log.in|2022-01-16 00:06:20 35.229.249.161|mynetbanksecure-log.in|2022-01-15 11:56:09 35.229.249.161|mysecured-log.in|2022-01-16 02:25:56
spam support (domains)
domain advertising underage pornography camfree4u.com [3.33.152.147]
RedLineStealer botnet controller @95.143.177.66
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 95.143.177.66 on port 9006 TCP: $ telnet 95.143.177.66 9006 Trying 95.143.177.66… Connected to 95.143.177.66. Escape character… Читать далее RedLineStealer botnet controller @95.143.177.66
Malware distribution @81.163.30.181
The host at this IP address is currently being used to distribute malware. Malware distribution located here: hXXp://81.163.30.181/111.exe $ nslookup 81.163.30.181 vps96216.af.lojaebooky.com Referencing malware binaries (MD5 hash): 32cc6ad0e7d507258071b7c0e551720b — AV detection: 20 / 60 (33.33) 471779b638cfa1c797ed8207fa814612 — AV detection: 23 / 68 (33.82) 4f6b3a98f17a488dfdd4f772f98db4a8 — AV detection: 23 / 66 (34.85) 63a6b243f662c2e36685ee567f20ff1a — AV detection:… Читать далее Malware distribution @81.163.30.181
AsyncRAT botnet controller @138.201.2.2
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 138.201.2.2 on port 2022 TCP: $ telnet 138.201.2.2 2022 Trying 138.201.2.2… Connected to 138.201.2.2. Escape character… Читать далее AsyncRAT botnet controller @138.201.2.2
RedLineStealer botnet controller @65.108.104.175
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 65.108.104.175 on port 1193 TCP: $ telnet 65.108.104.175 1193 Trying 65.108.104.175… Connected to 65.108.104.175. Escape character… Читать далее RedLineStealer botnet controller @65.108.104.175
RedLineStealer botnet controller @23.88.109.42
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 23.88.109.42 on port 55961 TCP: $ telnet 23.88.109.42 55961 Trying 23.88.109.42… Connected to 23.88.109.42. Escape character… Читать далее RedLineStealer botnet controller @23.88.109.42