54.39.7.197 pietro3.mta.emailsendingwizz.com «pietro3.mta.emailsendingwizz.com» 2022-03-25T11:40:00Z (+/-10 min) 54.39.7.197/32 (54.39.7.197 .. 54.39.7.197) 54.39.239.55 pietro2.mta.emailsendingwizz.com «pietro2.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.56 pietro8.mta.emailsendingwizz.com «pietro8.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.57 pietro7.mta.emailsendingwizz.com «pietro7.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.48/28 (54.39.239.48 .. 54.39.239.63) 66.70.160.169 pietro5.mta.emailsendingwizz.com «pietro5.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 66.70.160.169/32 (66.70.160.169 .. 66.70.160.169) 142.44.253.252 pietro4.mta.emailsendingwizz.com «pietro4.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 142.44.253.252/32 (142.44.253.252 .. 142.44.253.252) 167.114.80.60 pietro6.mta.emailsendingwizz.com «pietro6.mta.emailsendingwizz.com»… Читать далее spam source
spam source
54.39.7.197 pietro3.mta.emailsendingwizz.com «pietro3.mta.emailsendingwizz.com» 2022-03-25T11:40:00Z (+/-10 min) 54.39.7.197/32 (54.39.7.197 .. 54.39.7.197) 54.39.239.55 pietro2.mta.emailsendingwizz.com «pietro2.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.56 pietro8.mta.emailsendingwizz.com «pietro8.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.57 pietro7.mta.emailsendingwizz.com «pietro7.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.48/28 (54.39.239.48 .. 54.39.239.63) 66.70.160.169 pietro5.mta.emailsendingwizz.com «pietro5.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 66.70.160.169/32 (66.70.160.169 .. 66.70.160.169) 142.44.253.252 pietro4.mta.emailsendingwizz.com «pietro4.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 142.44.253.252/32 (142.44.253.252 .. 142.44.253.252) 167.114.80.60 pietro6.mta.emailsendingwizz.com «pietro6.mta.emailsendingwizz.com»… Читать далее spam source
spam source
54.39.7.197 pietro3.mta.emailsendingwizz.com «pietro3.mta.emailsendingwizz.com» 2022-03-25T11:40:00Z (+/-10 min) 54.39.7.197/32 (54.39.7.197 .. 54.39.7.197) 54.39.239.55 pietro2.mta.emailsendingwizz.com «pietro2.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.56 pietro8.mta.emailsendingwizz.com «pietro8.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.57 pietro7.mta.emailsendingwizz.com «pietro7.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.48/28 (54.39.239.48 .. 54.39.239.63) 66.70.160.169 pietro5.mta.emailsendingwizz.com «pietro5.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 66.70.160.169/32 (66.70.160.169 .. 66.70.160.169) 142.44.253.252 pietro4.mta.emailsendingwizz.com «pietro4.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 142.44.253.252/32 (142.44.253.252 .. 142.44.253.252) 167.114.80.60 pietro6.mta.emailsendingwizz.com «pietro6.mta.emailsendingwizz.com»… Читать далее spam source
spam source
54.39.7.197 pietro3.mta.emailsendingwizz.com «pietro3.mta.emailsendingwizz.com» 2022-03-25T11:40:00Z (+/-10 min) 54.39.7.197/32 (54.39.7.197 .. 54.39.7.197) 54.39.239.55 pietro2.mta.emailsendingwizz.com «pietro2.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.56 pietro8.mta.emailsendingwizz.com «pietro8.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.57 pietro7.mta.emailsendingwizz.com «pietro7.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 54.39.239.48/28 (54.39.239.48 .. 54.39.239.63) 66.70.160.169 pietro5.mta.emailsendingwizz.com «pietro5.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 66.70.160.169/32 (66.70.160.169 .. 66.70.160.169) 142.44.253.252 pietro4.mta.emailsendingwizz.com «pietro4.mta.emailsendingwizz.com» 2022-03-25T11:30:00Z (+/-10 min) 142.44.253.252/32 (142.44.253.252 .. 142.44.253.252) 167.114.80.60 pietro6.mta.emailsendingwizz.com «pietro6.mta.emailsendingwizz.com»… Читать далее spam source
Abused crypto currency mining pool
The host at this IP address is running a crypto currency mining pool that is currently being abused by cybercriminals for mining crypto currencies on malware infected computers. The following information should be sufficient for the identification and suspension of the abusive users: {«id»:1,»jsonrpc»:»2.0″,»method»:»login»,»params»:{«login»:»497qdSyfY8t9dYnAGTnk8UigUbUPL4MXTFAxobWPDZ5rReSiVNL22GEGt9ptgNbDbTe3qyj3oRq2LfEYbws8yGqnSjBWHR6″,»pass»:»tati»,»agent»:»XMRig/6.16.4 (Windows NT 10.0; Win64; x64) libuv/1.42.0 msvc/2019″,»algo»:[«cn/1″,»cn/2″,»cn/r»,»cn/fast»,»cn/half»,»cn/xao»,»cn/rto»,»cn/rwz»,»cn/zls»,»cn/double»,»cn/ccx»,»cn-lite/1″,»cn-heavy/0″,»cn-heavy/tube»,»cn-heavy/xhv»,»cn-pico»,»cn-pico/tlo»,»cn/upx2″,»rx/0″,»rx/wow»,»rx/arq»,»rx/graft»,»rx/sfx»,»rx/keva»,»argon2/chukwa»,»argon2/chukwav2″,»argon2/ninja»,»astrobwt»,»ghostrider»]}}
spam source
23.251.255.151 e255-151.smtp-out.amazonses.com «e255-151.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.155 e255-155.smtp-out.amazonses.com «e255-155.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.159 e255-159.smtp-out.amazonses.com «e255-159.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.170 e255-170.smtp-out.amazonses.com «e255-170.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.172 e255-172.smtp-out.amazonses.com «e255-172.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.180 e255-180.smtp-out.amazonses.com «e255-180.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.181 e255-181.smtp-out.amazonses.com «e255-181.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.184 e255-184.smtp-out.amazonses.com «e255-184.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.188 e255-188.smtp-out.amazonses.com «e255-188.smtp-out.amazonses.com» 2022-03-24T20:10:00Z (+/-10 min) 23.251.255.189… Читать далее spam source
spam source
w+ 54.240.8.28 a8-28.smtp-out.amazonses.com «a8-28.smtp-out.amazonses.com» 2022-03-24T21:50:00Z (+/-10 min) w+ 54.240.8.32 a8-32.smtp-out.amazonses.com «a8-32.smtp-out.amazonses.com» 2022-03-24T21:50:00Z (+/-10 min) w+ 54.240.8.64 a8-64.smtp-out.amazonses.com «a8-64.smtp-out.amazonses.com» 2022-03-24T21:40:00Z (+/-10 min) w+ 54.240.8.192 a8-192.smtp-out.amazonses.com «a8-192.smtp-out.amazonses.com» 2022-03-24T21:50:00Z (+/-10 min) 54.240.8.0/24 (54.240.8.0 .. 54.240.8.255) w+ 54.240.10.60 a10-60.smtp-out.amazonses.com «a10-60.smtp-out.amazonses.com» 2022-03-24T22:00:00Z (+/-10 min) w+ 54.240.10.108 a10-108.smtp-out.amazonses.com «a10-108.smtp-out.amazonses.com» 2022-03-24T21:50:00Z (+/-10 min) w+ 54.240.10.119 a10-119.smtp-out.amazonses.com «a10-119.smtp-out.amazonses.com» 2022-03-24T21:50:00Z (+/-10 min) w+ 54.240.10.124… Читать далее spam source
Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Stolen credit card data websites (DNS servers): ns1.idinaxui-netspama.ru. 7168 IN A 45.8.228.10 ns2.idinaxui-netspama.ru. 7159 IN A 2.57.187.26 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 2.57.187.21 ns2.idinaxui-netspama.ru. 7159 IN A 213.178.155.85 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 46.17.248.102 ns2.idinaxui-netspama.ru. 7159 IN A 94.103.88.31 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 87.251.79.154 ns2.idinaxui-netspama.ru. 7159 IN A 195.2.81.30 ___________________ Was:… Читать далее Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Stolen credit card data websites (DNS servers): ns1.idinaxui-netspama.ru. 7168 IN A 194.87.80.24 ns2.idinaxui-netspama.ru. 7159 IN A 2.57.187.26 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 185.244.182.153 ns2.idinaxui-netspama.ru. 7159 IN A 213.178.155.85 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 109.107.172.149 ns2.idinaxui-netspama.ru. 7159 IN A 213.178.155.85 ___________________ Was: ns1.idinaxui-netspama.ru. 7168 IN A 46.17.248.102 ns2.idinaxui-netspama.ru. 7159 IN A 94.103.88.31 ___________________ Was:… Читать далее Credit card fraud gang hosting (DNS): idinaxui-netspama.ru (vmad.su / amazingdumpsshop.ru / cvv-fullz-shop.ru etc.)
Smoke Loader botnet controller @141.8.194.151
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Smoke Loader botnet controller located at 141.8.194.151 on port 80 (using HTTP POST): hXXp://afrocalite.ga/ afrocalite.ga. 600 IN A 141.8.194.151 Referencing malware binaries (MD5 hash): 3d75271eb12cedd6440f8ed22724840c — AV… Читать далее Smoke Loader botnet controller @141.8.194.151