The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 88.99.190.55 on port 443: $ telnet 88.99.190.55 443 Trying 88.99.190.55… Connected to 88.99.190.55. Escape character is ‘^]’ amazinginvezt.org. 60 IN A 88.99.190.55… Читать далее Malware botnet controller @88.99.190.55
njrat botnet controller @15.223.46.207
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 15.223.46.207 on port 5552 TCP: $ telnet 15.223.46.207 5552 Trying 15.223.46.207… Connected to 15.223.46.207. Escape character… Читать далее njrat botnet controller @15.223.46.207
DCRat botnet controller @23.100.22.106
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 23.100.22.106 on port 5877 TCP: $ telnet 23.100.22.106 5877 Trying 23.100.22.106… Connected to 23.100.22.106. Escape character… Читать далее DCRat botnet controller @23.100.22.106
Malware botnet controller @149.56.41.77
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 149.56.41.77 on port 443: $ telnet 149.56.41.77 443 Trying 149.56.41.77… Connected to 149.56.41.77. Escape character is ‘^]’ amazinginvezt.org. 60 IN A 149.56.41.77… Читать далее Malware botnet controller @149.56.41.77
Malware botnet controller @37.230.116.213
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 37.230.116.213 on port 443: $ telnet 37.230.116.213 443 Trying 37.230.116.213… Connected to 37.230.116.213. Escape character is ‘^]’ gc-distribution.biz. 60 IN A 37.230.116.213
Malware / Botnet / Phishing hosting server @137.184.111.165
According to our telemetry and our own intelligence, the host at this IP address has been setup by cyber criminals for the exclusive purpose of hosting phishing sites, malware distribution sites and/or botnet controllers. We therefore advise our users to block any traffic from/to this IP address. Malware botnet controller located at 137.184.111.165 port 443… Читать далее Malware / Botnet / Phishing hosting server @137.184.111.165
spam source
[!] This SBL record is to show an example of ongoing network abuse. It currently is not being published in the SBL list, but is instead being presented on the webpage so that the network owner has evidence to investigate and correct the problem. w 54.240.27.54 a27-54.smtp-out.us-west-2.amazonses.com «a27-54.smtp-out.us-west-2.amazonses.com» 2022-02-07T16:00:00Z (+/-10 min) w 54.240.27.58 a27-58.smtp-out.us-west-2.amazonses.com «a27-58.smtp-out.us-west-2.amazonses.com»… Читать далее spam source
spam source
[!] This SBL record is to show an example of ongoing network abuse. It currently is not being published in the SBL list, but is instead being presented on the webpage so that the network owner has evidence to investigate and correct the problem. w 54.240.27.54 a27-54.smtp-out.us-west-2.amazonses.com «a27-54.smtp-out.us-west-2.amazonses.com» 2022-02-07T16:00:00Z (+/-10 min) w 54.240.27.58 a27-58.smtp-out.us-west-2.amazonses.com «a27-58.smtp-out.us-west-2.amazonses.com»… Читать далее spam source
Malware botnet controller @167.99.236.104
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 167.99.236.104 on port 443: $ telnet 167.99.236.104 443 Trying 167.99.236.104… Connected to 167.99.236.104. Escape character is… Читать далее Malware botnet controller @167.99.236.104
Malware botnet controller @167.99.224.180
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 167.99.224.180 on port 443: $ telnet 167.99.224.180 443 Trying 167.99.224.180… Connected to 167.99.224.180. Escape character is… Читать далее Malware botnet controller @167.99.224.180