Stolen credit card data sites: <a href=»https://briansclub.at/register»><img src=»https://i.imgur.com/shMP31G.gif»></a> <a href=»https://briansclub.at/register»><img src=»https://i.imgur.com/XwRsPnJ.gif»></a> briansclub.cm. 600 IN A 91.224.22.46 _____________ Was: briansclub.cm. 600 IN A 91.240.242.114 _____________ Was: briansclub.cm. 60 IN A 185.105.91.69 _____________ Was: briansclub.cm. 60 IN A 190.115.18.206 _____________ Was: briansclub.cm. 600 IN A 45.139.184.171 _____________ Was: briansclub.cm. 600 IN A 185.217.199.119 _____________ Was: briansclub.at. 600… Читать далее Carding fraud site/forum: briansclub.cm / briansclub.at (omerta.cc / rescator.cm / lampeduza.cm)
RedLineStealer botnet controller @51.81.139.72
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 51.81.139.72 on port 10762 TCP: $ telnet 51.81.139.72 10762 Trying 51.81.139.72… Connected to 51.81.139.72. Escape character… Читать далее RedLineStealer botnet controller @51.81.139.72
Loki botnet controller @104.21.59.53
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 104.21.59.53 on port 80 (using HTTP POST): hXXp://alenbrooksret.com/mobi/Panel/five/fre.php $ dig +short alenbrooksret.com 104.21.59.53 Other malicious domain names hosted on this IP address:… Читать далее Loki botnet controller @104.21.59.53
Loki botnet controller @172.67.204.72
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 172.67.204.72 on port 80 (using HTTP POST): hXXp://cnkfeng.com/neds/Panel/five/fre.php $ dig +short cnkfeng.com 172.67.204.72 Other malicious domain names hosted on this IP address:… Читать далее Loki botnet controller @172.67.204.72
Moroccan spammer C
All over this /24 helo: y2uymtljowfj.clientesnet.de msgid: x@45.33.4.118 srcip: 194.87.185.53 from: fatura1637081575@apoioclientes.com bodyfrom: Minha Claro Subject: Fatura Claro em atraso. timestamp: 2021-11-16 x bodyurl: mailto:alfredo.souza@hmrag.com bodyurl: https://links.claro.negociafacil.com.br/ …. helo: zgrkymi5nmrk.clientesnet.de srcip: 194.87.185.115 timestamp: 2021-11-16 x from: fatura1637098478@apoioclientes.com to: x Subject: Fatura Claro em atraso. bodyfrom: Minha Claro
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Suspected Snowshoe Spam IP Range
Based on research, analysis of network data, our ‘snowshoe’ spam detection systems, intelligence sources and our experience, Spamhaus believes that this IP address range is being used or is about to be used for the purpose of high volume ‘snowshoe’ spam emission. As a precaution therefore we are listing this IP range in an SBL… Читать далее Suspected Snowshoe Spam IP Range
Phishing origination against Danske Bank (Nordic banking group)
194.195.124.214 194.195.125.66 194.195.125.67 194.195.125.68 194.195.125.71 194.195.125.72 194.195.125.76 194.195.125.77 194.195.125.78 194.195.125.79 are sending out Danske Bank phishing spam today.
Phishing origination against Danske Bank (Nordic banking group)
194.195.124.214 194.195.125.66 194.195.125.67 194.195.125.68 194.195.125.71 194.195.125.72 194.195.125.76 194.195.125.77 194.195.125.78 194.195.125.79 are sending out Danske Bank phishing spam today.
Predatory publisher/spammer: Peertechz Open Access
Received: from smtp33.ptzinfomed.org (smtp.ptzinfomed.org [147.135.37.124]) $ host -t txt ptzinfomed.org ptzinfomed.org descriptive text «v=spf1 a mx a:ptzinfomed.org ip4:147.135.37.124 ip4:51.81.251.131 ip4:51.81.253.224/27 ip4:147.135.107.128/27 ip4:147.135.49.56/29 ip4:147.135.51.112/29 ip4:147.135.51.120/29 ip4:147.135.49.144/29 ip4:51.81.218.96/27 ip6:2604:2dc0:0200:017c::/64 include:m» «ailgun.org ~all» OVH, any of the above that are in your network belong to the same customer. It is a spammer you have chased around your network… Читать далее Predatory publisher/spammer: Peertechz Open Access