This IP address is sending spam for OMICS, a publisher of «open-access» journals that solicits contributions and (by implication) fees and/or subscriptions through spam sent to scraped, purchased, or appended email addresses. Received: from e1.researchpublish.biz (ip146.ip-51-210-48.eu [51.210.48.146]) Received: from 209.105.239.144 (unknown [209.105.239.144]) Date: Mon, 4 Apr 2022 04:##:## +0530 From: Editor-Surgical Procedures <editor@researchpublish.biz> Reply-To: Editor-Surgical… Читать далее Spam Emitter (OMICS)
phishing server
20.113.85.124|securesite-amazon.com|2022-04-03 23:06:38 20.113.85.124|securesite-chase.com|2022-04-03 23:06:28 20.113.85.124|securesite-paypal.com|2022-04-03 23:06:30
phishing server
34.150.111.50|amaoznejapane.cf|2022-03-31 16:26:25 34.150.111.50|amaoznejapn.ga|2022-04-02 22:53:02 34.150.111.50|etc-maisaijp.cf|2022-03-26 16:56:28 34.150.111.50|etc-maisaijp.ga|2022-03-27 15:46:06 34.150.111.50|etc-maisaijp.gq|2022-03-28 16:57:23 34.150.111.50|etc-maisaijp.ml|2022-03-26 16:51:09 34.150.111.50|etc-meisaizjp.cf|2022-04-03 19:27:39 34.150.111.50|etc-meisazi.ga|2022-04-03 08:21:45 34.150.111.50|etc-meisazi.gq|2022-03-27 15:41:41 34.150.111.50|etc-meisazi.ml|2022-03-26 16:45:50
Malware / Botnet / Phishing hosting server @141.8.199.143
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is obviously… Читать далее Malware / Botnet / Phishing hosting server @141.8.199.143
Spam Emitters (OMICS)
Most of the following IP addresses and ranges are sending spam for OMICS, a publisher of «open-access» journals that solicits contributions and (by implication) fees and/or subscriptions through spam sent to scraped, purchased, or appended email addresses. Please ensure that your customer Vcom terminates all services to their spamming customer. This is UNACCEPTABLE. SENDING IPs… Читать далее Spam Emitters (OMICS)
Spam Emitters (OMICS)
Most of the following IP addresses and ranges are sending spam for OMICS, a publisher of «open-access» journals that solicits contributions and (by implication) fees and/or subscriptions through spam sent to scraped, purchased, or appended email addresses. Please ensure that your customer Vcom terminates all services to their spamming customer. This is UNACCEPTABLE. SENDING IPs… Читать далее Spam Emitters (OMICS)
phishing server
Fake URL shorteners for phishing. 35.230.20.151|0nli7ne-auth04.com|2022-04-01 23:26:17 35.230.20.151|0nli7ne-auth04.info|2022-04-01 22:26:57 35.230.20.151|0nli7ne-auth04.net|2022-04-01 22:27:01 35.230.20.151|0nli7ne-auth04.org|2022-04-01 20:56:12 35.230.20.151|0nli9ne-auth4.com|2022-03-31 22:02:09 35.230.20.151|0nli9ne-auth4.net|2022-03-31 19:46:35 35.230.20.151|0nli9ne-auth4.org|2022-03-31 18:17:27 35.230.20.151|0nline1-authen02.com|2022-03-30 19:01:35 35.230.20.151|0nline1-authen02.info|2022-03-30 19:36:42 35.230.20.151|0nline1-authen02.net|2022-03-30 18:22:17 35.230.20.151|0nline1-authen02.org|2022-03-30 17:37:59 35.230.20.151|0nline2-auth3.com|2022-03-30 22:51:35 35.230.20.151|0nline2-auth3.info|2022-03-30 20:46:24 35.230.20.151|0nline2-auth3.net|2022-03-30 20:08:01 35.230.20.151|0nline2-auth3.org|2022-03-30 19:31:49 35.230.20.151|cartechfan.com|2021-04-08 08:46:12 35.230.20.151|secbe3-server9.com|2022-03-29 21:46:31 35.230.20.151|secbe3-server9.info|2022-03-29 21:16:24 35.230.20.151|secbe3-server9.net|2022-03-29 19:12:01 35.230.20.151|secbe3-server9.org|2022-03-29 18:12:54 35.230.20.151|secube06-user03.com|2022-03-28 23:06:28 35.230.20.151|secube06-user03.info|2022-03-28 22:02:12 35.230.20.151|secube06-user03.net|2022-03-28 21:22:21 35.230.20.151|secube06-user03.org|2022-03-28 20:56:44 35.230.20.151|secure04-c0nnect3.com|2022-03-30 22:16:33… Читать далее phishing server
Malware botnet controller @141.8.199.56
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 141.8.199.56 port 443: $ telnet 141.8.199.56 443 Trying 141.8.199.56… Connected to 141.8.199.56. Escape character is ‘^]’… Читать далее Malware botnet controller @141.8.199.56
Malware / Botnet / Phishing hosting server @141.8.199.209
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 141.8.199.209 port 443: $ telnet 141.8.199.209 443 Trying 141.8.199.209… Connected to 141.8.199.209. Escape character is ‘^]’… Читать далее Malware / Botnet / Phishing hosting server @141.8.199.209
Malware / Botnet / Phishing hosting server @92.53.71.105
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is running… Читать далее Malware / Botnet / Phishing hosting server @92.53.71.105