RaccoonStealer botnet controller @178.62.127.193

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. RaccoonStealer botnet controller located at 178.62.127.193 on port 80 (using HTTP GET): hXXp://178.62.127.193/charlyl12te Referencing malware binaries (MD5 hash): 12f02c15330bf864d6570c860fdd3cf5 — AV detection: 24 / 69 (34.78) 520a1cd11757b344b379af15f429cfa0… Читать далее RaccoonStealer botnet controller @178.62.127.193

Malware botnet controller @5.9.224.199

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 5.9.224.199 on port 443: $ telnet 5.9.224.199 443 Trying 5.9.224.199… Connected to 5.9.224.199. Escape character is ‘^]’ Malicious domains observed at this… Читать далее Malware botnet controller @5.9.224.199

Опубликовано
В рубрике hetzner.de

Malware botnet controllers @77.223.99.210

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 77.223.99.210 on port 443: $ telnet 77.223.99.210 443 Trying 77.223.99.210… Connected to 77.223.99.210. Escape character is… Читать далее Malware botnet controllers @77.223.99.210

Опубликовано
В рубрике selectel.ru

Malware botnet controller @212.22.87.217

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 212.22.87.217 on port 443: $ telnet 212.22.87.217 443 Trying 212.22.87.217… Connected to 212.22.87.217. Escape character is… Читать далее Malware botnet controller @212.22.87.217

Опубликовано
В рубрике ispserver.com

Malware / Botnet / Phishing hosting server @138.124.182.69

According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. Malware botnet controller located at 138.124.182.69 port 443… Читать далее Malware / Botnet / Phishing hosting server @138.124.182.69

Опубликовано
В рубрике ispserver.com

Malware / Botnet / Phishing hosting server @45.140.167.52

According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. Malware botnet controller located at 45.140.167.52 port 443… Читать далее Malware / Botnet / Phishing hosting server @45.140.167.52

Опубликовано
В рубрике ispserver.com

Botnet spammed phishing domains: Phishing Google users.

googletags-manager.com. 600 IN A 194.87.185.92 _____________ Was: 77.87.212.240 aero-flct.com 2021-12-16 09:01:12 77.87.212.240 aeroflct.name 2021-12-16 05:20:43 77.87.212.240 google-site-verification.com 2021-12-27 02:11:27 77.87.212.240 googletags-manager.com 2021-12-27 02:31:08 77.87.212.240 script-analytic.com 2021-12-25 02:15:42 77.87.212.240 script-analytics.com 2021-12-26 02:00:53 _____________ Was: 176.119.147.175 google-site-verification.com 2021-12-07 02:19:21 176.119.147.175 googletags-manager.com 2021-12-08 01:31:04 176.119.147.175 script-analytic.com 2021-12-08 01:43:58 176.119.147.175 script-analytics.com 2021-12-07 02:11:05 _____________ Was: google-site-verification.com. 600 IN A… Читать далее Botnet spammed phishing domains: Phishing Google users.

Опубликовано
В рубрике selectel.ru

AsyncRAT botnet controller @94.130.208.107

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 94.130.208.107 on port 2021 TCP: $ telnet 94.130.208.107 2021 Trying 94.130.208.107… Connected to 94.130.208.107. Escape character… Читать далее AsyncRAT botnet controller @94.130.208.107

Опубликовано
В рубрике hetzner.de

Carding fraud site/forum: infodig.is (InfoDIG.sx InfoDIG.ch InfoDIG.domains infodig.mn)

Stolen credit card data websites: https://ascarding.com/ >>> https://infodig.is/ infodig.ch. 600 IN A 79.143.29.96 infodig.domains. 600 IN A 79.143.29.96 infodig.sx. 600 IN A 79.143.29.96 ________________ Was: infodig.ch. 600 IN A 8.209.108.169 infodig.domains. 600 IN A 8.209.108.169 infodig.sx. 600 IN A 8.209.108.169 ________________ Was: infodig.ch. 600 IN A 141.8.194.16 infodig.domains. 600 IN A 141.8.194.16 infodig.sx. 600 IN… Читать далее Carding fraud site/forum: infodig.is (InfoDIG.sx InfoDIG.ch InfoDIG.domains infodig.mn)

Опубликовано
В рубрике selectel.ru

RedLineStealer botnet controller @62.182.156.183

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 62.182.156.183 on port 42926 TCP: $ telnet 62.182.156.183 42926 Trying 62.182.156.183… Connected to 62.182.156.183. Escape character… Читать далее RedLineStealer botnet controller @62.182.156.183

Опубликовано
В рубрике selectel.ru