WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 1 ... 23

Date (UTC)DomainIPReverse LookupDescriptionRegistrantASN
2015/04/22_15:17zyrdu.cruisingsmallship.com/vyglachaph/choawoatch/glocoaphoo/files/176.31.28.226-VBS.Trojan.Downloader-16276FR
2016/03/18_06:58zt.tim-taxi.com/login.php198.12.67.179179.67.12.198.host.nwnx.net.MasterCard phishingRegistrar Abuse Contact onlinenic-enduser@onlinenic.com36352US
2009/06/12_00:00zous.szm.sk88.86.113.4freehosting.szm.com.directs to exploits-39392CZ
2009/05/28_00:00zkic.com174.37.172.162www.se.parahost.com.directs to exploitszhirong yang cdyzr@yahoo.com.cn36351US
2014/03/21_13:13zjjlf.croukwexdbyerr.net/zyso.cgi?1666.96.195.4966-96-195-49.static.hostnoc.net.redirects to exploit kitRegistrar Abuse Contact abuse@web.com21788US
2015/04/22_15:17zibup.csheaven.com/ypsoophoov/ptycmympub/teezukedoo/files/46.30.42.74veronikalife.ru.VBS.Trojan.Downloader-35415RU
2009/06/07_00:00zgsysz.com125.65.112.23-directs to exploitslans-1126@163.com4134CN
2013/12/09_09:45z7752.com/checkout.php?step=1195.191.56.113-Ransomware payment processorRegistrar Abuse Contact abuse@bizcn.com50395UA
2010/04/27_06:45z32538.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=2ac11c971204a16811817c725e04d68a44f9d4987c472f66eb08d066.220.17.200-trojan SwizzorContactprivacy.com / hostcom@contactprivacy.com6939US
2014/01/19_09:40yumekin.com/inde.php?comercial@cohesp.com.br108.179.202.25-TrojanRegistrar Abuse Contact abuse-contact@publicdomainregistry.com36351US
2014/01/19_09:40yumekin.com/inde.php108.179.202.25-TrojanRegistrar Abuse Contact abuse-contact@publicdomainregistry.com36351US
2013/05/20_18:00youtuhe.com174.140.17.100-Redirects to Rogue.FakeFlashPlayer15520009924361-f52e2a@whoisprivacyservices.com.au32311US
2013/05/20_20:35youtibe.com173.193.106.10173.193.106.10-static.reverse.softlayer.com.Redirects to Rogue.FakeFlashPlayerDomain Admin (contact@privacyprotect.org36351US
2013/05/20_18:00yougube.com199.223.209.169server.ambertechnic.com.Redirects to Rogue.FakeFlashPlayerEmail:k8atacs4f84bd7a8c158@t02cduv4f7f99a255f64.privatewhois.net25847US
2014/07/15_07:26ylpzt.juzojossai.net/9aywse7eva192.200.105.135192-200-105-135.static.gorillaservers.com.exploit kitRegistrar Abuse Contact abuse@web.com53850US
2015/12/28_20:16yigitakcali.com/dbsys.php160.153.16.29ip-160-153-16-29.ip.secureserver.net.Teslacrypt ransomware c&cRegistrant mahoni_17@hotmail.com26496US
2012/11/18_15:21xpornstarsckc.ddns.name/latest/xxx-porn-movie.avi.exe94.199.53.203ded-srv-pool-53-203.23net.hu.trojan-30836HU
2015/04/22_15:17xotsa.frenchgerlemanelectric.com/apsestooxo/iwheewhosh/keckalrees/files/93.170.123.186programmerworld.ru.VBS.Trojan.Downloader-29182CZ
2009/07/21_00:00xorgwebs.webs.com/stx.1216.52.115.50membersite.webs.com.RFIFREEWEBS, INC / inquiries@webs.com10913US
2009/07/01_00:00xoomer.alice.it/email02/bom.jpg62.211.68.12-trojan-20580IT
2009/05/23_00:00xindalawyer.com218.5.79.63-Exploitsjimmy@hn12345.com4134CN
2014/12/03_08:50xicaxique.com.br/catalog/view/theme/default/image/image102.jpg200.219.249.162static.200.219.249.162.datacenter1.com.br.Trojan.Banker.DEVincent Comercio Eletroeletronico Ltda / registro@br2001.com.br16397BR
2012/10/24_20:51xamateurpornlic.www1.biz/latest/xxx-porn-movie.avi.exe94.199.53.203ded-srv-pool-53-203.23net.hu.trojan ZeroAccess/SirefefChangeIP Network Operations / noc@changeip.com30836HU
2012/05/06_18:07www8.0zz0.com/2012/05/05/18/394995639.gif70.38.12.107-trojan RansomArabic-web / -32613CA
2012/05/06_18:07www12.0zz0.com/2012/05/06/00/464591666.gif67.205.89.53-trojanArabic-web / -32613CA
2010/11/13_09:52www.zyxyfy.com/images/ner.html61.178.85.177vip.lz118114.cn.exploit460243714@qq.com4134CN
2013/12/20_15:23www.zctei.com/date/9377chiyue_Y_Cdcr1124.exe122.225.107.85-Win32/Trojan.Spyythappyboy@163.com4134CN
2014/02/07_08:25www.zatzy.com/allmaent/391854-volvos-nya-drive-e.html81.201.217.115-compromised site leads to exploit kitRegistrar Abuse Contact abuse@ascio.com41175SE
2016/07/12_13:19www.ywvcomputerprocess.info/errorreport/ty5ug6h4ndma4/103.224.212.222lb-212-222.above.com.fake alert pageywvcomputerprocess.info@domainsbyproxy.com133618AU
2009/08/05_00:00www.xiruz.kit.net/mola.jpg201.7.184.2-trojanGLOBO Comunicacao e Participacoes S.A. / fapesp@corp.globo.com28604BR
2013/08/07_18:57www.wyroki.eu/wp-stc.php85.128.187.109ame109.rev.netart.pl.Leads to exploitNOT DISCLOSED! / admin@netart.pl15967PL
2009/11/15_16:09www.wrestlingexposed.com/faq.php?t=bleach-244-english-sub67.20.108.6367-20-108-63.bluehost.com.redirects to Rogue if referer is a search enginewrestlingexposed.com / whois@emailaddressprotection.com11798US
2009/11/15_16:09www.wildsap.com/?kkk=bleach-episodes-24469.89.31.59box259.bluehost.com.redirects to Rogue if referer is a search enginewhois@bluehost.com11798US
2009/07/21_00:00www.wigglewoo.com/portfolio/contests/contest-006.png85.13.136.149dd15308.kasserver.com.RFIowner-tjana.habermann@gmx.net34788DE
2011/04/01_04:46www.widestep.com/files/ws_qk_install.exe205.186.183.224ekiaioocks.gs07.gridserver.com.Win32/Agent.HSDNOGRwidestep@mail.ru31815US
2009/09/19_00:00www.whitesports.co.kr211.202.2.17web-7.blueweb.co.kr.iframe directs to LuckySploityoon1092@hotmail.com9318KR
2009/09/11_00:00www.vvvic.com118.220.175.24-obfuscated iframe directs to exploitsjini lee / jini6708@hanmail.net9318KR
2015/06/02_07:16www.volleyball-doppeldorf.de/templates/blau_weiss/n8jh3wbr.php?id=6071616337.218.254.115c15.webspace-verkauf.de.iframe on compromised site leads to exploit kitinfo@webspace-verkauf.de45031DE
2014/06/26_14:27www.vivaimontina.com/213.205.40.169web-vip-it.eu.tiscali.it.Script.ExploitRegistrar Abuse Contact abuse@ascio.com8612IT
2015/02/28_14:36www.vipcpms.com/watch?key=e722a8eea048590dd97760d8b657327b&scrWidth=1680&scrHeight=1050&tz=0209.200.44.228trgdbtest.webair.com.Malvertising, Android.FakeAVRegistrar Abuse Contact abuse@enom.com27257US
2014/06/26_14:27www.vinyljazzrecords.com/japan.html213.205.40.169web-vip-it.eu.tiscali.it.Script.ExploitRegistrar Abuse Contact abuse@ascio.com8612IT
2016/06/07_08:37www.vertourmer.com/81.31.147.91jmhlmd41.colt-engine.it.iframe on compromised site leads to EKRegistrar Abuse Contact domainabuse@tucows.com47242IT
2009/07/21_00:00www.usaenterprise.com/images/images.txt212.70.224.183virtweb-cms.nethouse.it.RFIusa enterprise / usainfo@virgilio.it16141IT
2009/07/21_00:00www.uriyuri.com/bbs/skin/zero_vote/1.txt202.131.25.49-RFIChae Yu ri / freen@introcom.net23576KR
2014/06/26_14:27www.unicaitaly.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit-8612IT
2014/03/21_09:24www.two-of-us.at/images/youtube/d/flashplayer.html85.158.181.11server143-han.de-nserver.de.Mal.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/youtube/d/flashplayer.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/W.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/vein.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/s4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/s2x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/s2.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/pictures.php85.158.181.11server143-han.de-nserver.de.PHP.ShellEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/m.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/digitalcoinminer.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/dgc4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/dc.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/bz.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/BR.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/aurcoinlab.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/au4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/au.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/777.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/3.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/2.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/03/21_09:24www.two-of-us.at/images/1.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlashEngelbert Kronsteiner / office@pch.at34432DE
2014/02/11_02:56www.tvnews.or.kr/web/view.html210.205.6.203-Win32/Exploit.CVE-2013-3897.A-9318KR
2014/02/11_02:56www.tvnews.or.kr/web/menu.gif210.205.6.203-Trojan-9318KR
2014/02/11_02:53www.tvnews.or.kr/web/main.gif210.205.6.203-Trojan-9318KR
2009/12/10_15:48www.tpt.edu.in/76.163.253.1-compromized site loads external script with exploits-32392US
2009/07/21_00:00www.torgi.kz/help/idxx.txt212.154.208.169-RFI-9198KZ
2009/07/21_00:00www.torgi.kz/help/id2.txt212.154.208.169-RFI-9198KZ
2014/02/12_11:08www.toochattoo.com/fond-ecran-anime/chinois1.exe88.190.253.247pf7-web.online.net.TrojanOwner franck.duparc@wanadoo.fr12322FR
2010/04/16_20:16www.tiergestuetzt.de/80.190.144.115sv05.net-housting.de.compromised site directs to exploits-15598DE
2015/04/24_19:11www.thesparkmachine.com/Antivirus.zip208.113.197.192apache2-emu.paulding.dreamhost.com.FakeAVRegistrar Abuse Contact abuse@web.com26347US
2016/01/12_08:53www.technix.it/217.194.6.34vchicken.oval.it.compromised site leads to exploit kit-12637IT
2013/06/05_20:17www.tdms.saglik.gov.tr/KDV_Guncel_Tevkifat_Oranlari.htm212.175.169.227-compromised sites leads to exploit kitSalk Bakanl / netsistem@saglik.gov.tr9121TR
2009/06/24_00:00www.t-sb.net72.232.219.152152.219.232.72.static.reverse.ltdomains.com.directs to exploitsNorets Mihail Vitalevich / nmihey@gmail.com22576US
2014/02/07_09:44www.t-gas.co.uk/1.txt212.227.26.21-Leads to exploit at jolygoestobeinvester.ruGordon Potts / -8560DE
2014/12/03_08:50www.super8service.de/zf0yx81.169.145.164wa4.rzone.de.Trojan.Zeus.GOhostmaster@strato.de6724DE
2017/01/19_13:05www.studiolegaleabbruzzese.com/wp-content/plugins/urxwhbnw3ez/flight_4832.pdf62.149.142.206webx440.aruba.it.ransomwareRegistrar Abuse Contact domainabuse@tucows.com31034IT
2014/02/12_11:08www.studiochiarelli.eu/02-2014/clients/order.3757.zip195.110.124.133opus.register.it.TrojanNOT DISCLOSED! / support@register.it39729IT
2009/07/21_00:00www.stormpages.com/script/ping.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/script/PHP.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/p38r1/aku.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/master/VoLcoM_04.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/hasheo/ros.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/hasheo/naoky.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/hasheo/mil.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/blewah/bot.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2009/07/21_00:00www.stormpages.com/ariefdream/nidec.txt209.33.220.8-RFIWeb Services / webmaster@slk9.com11071US
2010/04/16_20:16www.stirparts.ru/89.108.67.238cp141.agava.net.compromised site directs to exploits-43146RU
2011/02/02_18:13www.spris.com/images/log.txt210.114.221.53-IE exploitspris corp. / koo bonghoe wkpark@kumkang.com4670KR
2010/04/16_20:16www.sonnoli.com/?page_id=562.149.140.107webx97.aruba.it.compromised site directs to exploits-31034IT
2015/10/16_07:33www.smartscan.ro85.9.27.130s13v.webindex.ro.compromised site leads to exploit kit-5588RO
2014/02/17_10:32www.smartgvcfunding.com/Invoice.zip?21VJRpXbAFI7wa Trojan.Zbot209.235.144.9hostedc31.carrierzone.com.-Internet Services BT Business / domains@btdomainsaccount.com30447US
2013/10/27_03:02www.slivki.com.ua/as/smp.exe212.26.135.68-Trojan=========== / hostmaster-telecom@adamant.net8788UA
2013/10/27_03:02www.slivki.com.ua/as/Ponynl.exe212.26.135.68-Trojan=========== / hostmaster-telecom@adamant.net8788UA
2013/12/20_15:23www.sj88.com/hezi/jm/s1000.exe202.97.174.68-Trojan.DropperRegistrant NAMENIC@GMAIL.COM4837CN

Page 0 1 ... 23


You can find an overview of downloadable lists here