The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller at 95.213.216.236 on port 443: $ telnet 95.213.216.236 443 Trying 95.213.216.236… Connected to 95.213.216.236. Escape character is ‘^]’ Malicious domains observed at this IP… Читать далее Malware botnet controller @95.213.216.236
Phish source @18.183.194.212
Received: from sv1202.xserver.jp (sv1202.xserver.jp [183.90.232.3]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by X (Postfix) with ESMTPS id X for <X>; Wed, 30 Mar 2022 X Received: from virusgw9.xserver.jp (virusgw9.xserver.jp [183.90.232.243]) by sv1202.xserver.jp (Postfix) with ESMTP id X for <X>; Thu, 31 Mar 2022 X Received: from sv1202.xserver.jp (183.90.232.3)… Читать далее Phish source @18.183.194.212
Hosting phishing domains
194.87.46.104 jqueryllc.net 2022-03-30 06:12:00 ______________________ Was: 194.87.70.84 ajaxtracker.com 2022-03-28 12:38:41 194.87.70.84 cdn-cgi.net 2022-03-28 12:03:53 194.87.70.84 coupon-popup.net 2022-03-28 16:48:14 194.87.70.84 jquery-ui.net 2022-03-29 04:07:24 194.87.70.84 jquerylibs.net 2022-03-29 04:06:32 194.87.70.84 jqueryllc.net 2022-03-28 18:11:38 194.87.70.84 magento-plugin.com 2022-03-29 01:07:13 194.87.70.84 purechal.com 2022-03-29 04:12:09 194.87.70.84 trustdomains.net 2022-03-28 23:41:43 ______________________ Was: 213.178.155.116 ajaxtracker.com 2022-03-27 07:01:26 213.178.155.116 jqueryllc.net 2022-03-28 06:12:01 ______________________ Was: ajaxtracker.com.… Читать далее Hosting phishing domains
RedLineStealer botnet controller @62.182.156.185
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 62.182.156.185 on port 48571 TCP: $ telnet 62.182.156.185 48571 Trying 62.182.156.185… Connected to 62.182.156.185. Escape character… Читать далее RedLineStealer botnet controller @62.182.156.185
Spam source @163.172.187.110
Received: from enseignebachepascher.fr (smtp.enseignebachepascher.fr [163.172.187.110]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by X (Postfix) with ESMTPS id X for <rX>; Wed, 30 Mar 2022 X Received: from enseignebachepascher.fr (enseignebachepascher.fr [127.0.0.1]) by enseignebachepascher.fr (8.14.7/8.14.7) with ESMTP id X for <X>; Wed, 30 Mar 2022 X DKIM-Filter: OpenDKIM Filter v2.11.0… Читать далее Spam source @163.172.187.110
Smoke Loader botnet controller @95.213.216.234
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 95.213.216.234 on port 80 (using HTTP POST): hXXp://afrocalite.ga/ afrocalite.ga. 600 IN A 95.213.216.234 Referencing malware binaries (MD5 hash): 3d75271eb12cedd6440f8ed22724840c — AV… Читать далее Smoke Loader botnet controller @95.213.216.234
Malware botnet controller @141.8.195.68
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 141.8.195.68 port 443: $ telnet 141.8.195.68 443 Trying 141.8.195.68… Connected to 141.8.195.68. Escape character is ‘^]’… Читать далее Malware botnet controller @141.8.195.68
Malware / Botnet / Phishing hosting server @141.8.199.226
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is running… Читать далее Malware / Botnet / Phishing hosting server @141.8.199.226
Loki botnet controller @213.226.114.149
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 213.226.114.149 on port 80 (using HTTP POST): hXXp://sempersim.su/ge12/fre.php sempersim.su. 600 IN A 213.226.114.149 Referencing malware binaries (MD5 hash): 282597edf1d6759a52472a855ed9e14f — AV detection:… Читать далее Loki botnet controller @213.226.114.149
Malware / Botnet / Phishing hosting server @95.213.216.232
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. The host at this IP address is running… Читать далее Malware / Botnet / Phishing hosting server @95.213.216.232