WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 1 ... 23

Date (UTC)DomainIPReverse LookupDescriptionRegistrantASN
2014/05/12_00:24akirkpatrick.com/1181.27.85.16zeus7.easy-internet.co.uk.Spyware.Zbot.EDRegistrar Abuse Contact abuse-contact@publicdomainregistry.com25577GB
2016/08/12_07:01euro-vertrieb.com/hosteurope/KIS-Login.htm217.31.81.101zaphod3-1.hostweb.de.Hosteurope phishingRegistrar Abuse Contact abuse@corehub.net29140DE
2009/05/08_00:00slightlyoffcenter.net208.76.80.19yavin.tchmachines.com.directs to exploitsJennifer Huang / jch1@cec.wustl.edu25767US
2016/10/13_14:03www.family-partners.fr/data.dpg95.142.169.132xvm-169-132.ghst.net.ransomwarenoc@gandi.net29169FR
2013/07/25_06:31server1.extra-web.cz/dbm.exe212.80.69.55xhosting.cz.trojantefan Ihnat / stefan.ihnat@email.cz29208CZ
2014/09/16_09:59isonomia.com.ar/mkyejphtxc/nsjkdqsmto.html200.58.123.153x094vm14.isonomia.com.ar.Compromised site (DHL malspam campaign), leads to Upatre-27823AR
2014/09/16_09:59isonomia.com.ar/vwyryztlkn/nsxiquronl.html200.58.123.153x094vm14.isonomia.com.ar.Compromised site (DHL malspam campaign), leads to Upatre-27823AR
2016/02/01_13:14www.pieiron.co.uk/146.185.29.100www6.grakka.net.iframe on compromised site leads to EKGrakka Limited / -29302GB
2016/04/28_07:49www.dezuiderwaard.nl/195.238.74.87www53.totaalholding.nl.iframe on compromised site leads to EK-50673NL
2009/06/29_00:00romsigmed.ro86.35.15.214www4.linux.romtelecom.net.directs to exploits-9050RO
2014/05/12_00:24allforlove.de/11217.13.199.48www28.prosite.de.Spyware.Zbot.EDinfo@speedbone.de15657DE
2009/06/07_00:00bezproudoff.cz93.185.104.30www20.pipni.cz.directs to exploits-43541CZ
2009/06/07_00:00hotspot.cz93.185.104.30www20.pipni.cz.directs to exploitsSimon Zaruba / simzaruba@seznam.cz43541CZ
2009/06/07_00:00nowina.info93.185.104.30www20.pipni.cz.directs to exploitsGregor Stopa / gstopa@volny.cz43541CZ
2009/06/07_00:00spekband.com93.185.104.30www20.pipni.cz.directs to exploitsMichal Gancarcik / michalgancarcik@seznam.cz43541CZ
2009/06/28_00:00sbnc.hak.su/spread.txt91.189.81.71www2.wen.ru.RFIwapplanet@mail.ru8342RU
2014/02/18_15:40www.notaverde.com/Invoice.zip205.236.147.30www2.securenet.net.Trojan.Zbot-14112CA
2009/06/07_00:00nerez-schodiste-zabradli.com93.185.104.29www19.pipni.cz.directs to exploitsPetr Danek - Danek a Danek / danek-danek@volny.cz43541CZ
2009/06/07_00:00pb-webdesign.net93.185.104.29www19.pipni.cz.directs to exploitsPetr Beran Beran / dom-reg-joker@ignum.cz43541CZ
2009/06/07_00:00podzemi.myotis.info93.185.104.29www19.pipni.cz.directs to exploitsLadislav Mikes / la.mi@volny.cz43541CZ
2009/06/07_00:00smrcek.com93.185.104.29www19.pipni.cz.directs to exploitsPavel Jedlicka / dom-reg-joker@ignum.cz43541CZ
2009/06/07_00:00nordiccountry.cz93.185.104.28www18.pipni.cz.directs to exploits-43541CZ
2009/06/07_00:00ceskarepublika.net93.185.104.27www17.pipni.cz.directs to exploitspvachtl@quick.cz43541CZ
2013/05/29_09:54markbruinink.nl/wp-admin/cnt.php46.244.13.6www1.hitnet.nl.redirects to exploit kit-51088NL
2009/07/21_00:00plengeh.wen.ru/id.txt91.189.80.71www.wen.ru.RFIwapplanet@mail.ru8342RU
2014/05/27_04:02villalecchi.com/images/min/b41.exe209.51.141.123www.villalecchi.com.Trojan.InjectRegistrar Abuse Contact onlinenic-enduser@onlinenic.com3595US
2012/05/02_13:48-194.183.224.73/out/out.htmwww.van-helden.net.Java exploits serves Poison Ivy-5463BE
2009/05/26_00:00orbowlada.strefa.pl/text396.htm217.74.66.183www.strefa.pl.Directs to rogue-16138PL
2009/09/13_00:00tabex.sopharma.bg:808084.242.167.49www.sopharma.bg.compromised server with nginx at port 8080-8672BG
2009/09/13_00:00-84.242.167.49:8080www.sopharma.bgcompromised server with nginx at port 8080-8672BG
2009/05/28_00:00zkic.com174.37.172.162www.se.parahost.com.directs to exploitszhirong yang cdyzr@yahoo.com.cn36351US
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip?mscfopoysckwdh202.224.60.77www.sankyo.gr.jp.Trojan.Zbot-4685JP
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip202.224.60.77www.sankyo.gr.jp.Trojan.Extension.Exploit-4685JP
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip?IIFEhTaalZlzYipWok202.224.60.77www.sankyo.gr.jp.Trojan.Zbot-4685JP
2013/04/16_00:32freefblikes.phpnet.us209.190.85.252www.quark.byethost4.com.VBScript.Trojan.IRCAdministrator Administrator / hostorgadmin@googlemail.com10297US
2013/09/06_04:59-202.212.131.8/ruses/nonsmokers.jswww.melodian.co.jp.Leads to exploit-2514JP
2009/06/30_00:00womenslabour.org83.142.47.61www.linux.webserwer.pl.directs to exploitsrogoz@firma.hoga.pl39168PL
2009/06/30_00:00wroclawski.com.pl83.142.47.61www.linux.webserwer.pl.directs to exploits-39168PL
2009/07/21_00:00www.freewebtown.com/atakus/Nokia/BotNetNew.txt208.75.230.43www.freewebtown.com.RFITulip Systems / abuse@tulix.com36820US
2016/06/23_15:01www.enchantier.com/176.31.73.196www.enchantier.com.iframe on compromised site leads to EKRegistrar Abuse Contact abuse@1and1.com16276FR
2011/01/12_19:15-209.216.193.107/registrydoktor-newde.phpwww.antivirus-reports.org.fake av-21607US
2011/11/16_18:14nobodyspeakstruth.narod.ru/upload/main.exe87.250.250.83wrz.yandex.ru.trojan-13238RU
2010/04/16_20:16www.sanseracingteam.com/wordpress/85.10.140.251wpc4811.host7x24.com.compromised site directs to exploits-48185FR
2010/04/16_20:16www.sanseracingteam.com/wordpress/?p=12885.10.140.251wpc4811.host7x24.com.compromised site directs to exploits-48185FR
2014/02/07_14:31finnhair.co.uk/1.html208.123.212.48wp03.yeg.alentus.net.Leads to exploit at jolygoestobeinvester.ruNina Brazendale, P Percival and R Percival / -25745US
2014/02/07_15:13tamilcm.com/1.html67.227.152.196windows2.india-to.net.Leads to exploit at jolygoestobeinvester.ruRegistrar Abuse Contact abuse-contact@publicdomainregistry.com32244US
2014/02/07_17:51sysconcalibration.com/1.html174.141.228.147win11.hostingmantra.com.Leads to exploit at jolygoestobeinvester.ruRegistrar Abuse Contact abuse-contact@publicdomainregistry.com32613US
2014/05/27_04:02centralwestwater.com.au/Estratto/Dati.zip103.4.16.91whs.clientdns.com.Trojan.Extension.ExploitMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2014/05/27_04:02centralwestwater.com.au/Dettagli_Fatture.zip103.4.16.91whs.clientdns.com.Trojan.Extension.ExploitMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2014/05/27_04:02centralwestwater.com.au/Conto.zip103.4.16.91whs.clientdns.com.Trojan.Extension.ExploitMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2014/05/27_04:02centralwestwater.com.au/Estratto/Dati.zip103.4.16.91whs.clientdns.com.Trojan.ZbotMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2014/05/27_04:02centralwestwater.com.au/Dettagli_Fatture.zip?aladinodepaulis@uniadriatica.it103.4.16.91whs.clientdns.com.Trojan.ZbotMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2014/05/27_04:02centralwestwater.com.au/Conto.zip?gZ5lXOdeRY7y103.4.16.91whs.clientdns.com.Trojan.ZbotMarg Redfern / Visit whois.ausregistry.com.au for Web based WhoIs58940AU
2010/12/16_17:28-98.158.178.231/pics.scrwhm.profissionalizando.org.backdoor-32780US
2010/02/02_08:40www.rempko.sk/kontakt.htm213.81.152.60wep.t-com.sk.compromised site directs to exploits-6855SK
2011/01/25_18:09www.downloaddirect.com/software/vlc-player/256767.55.67.250welcome23.webcamclub.com.trojanDesign and Marketing DM S.A. / juancarlos@loudmo.com27257US
2010/04/16_20:16www.sonnoli.com/?page_id=562.149.140.107webx97.aruba.it.compromised site directs to exploits-31034IT
2015/07/20_18:46www.mondoperaio.net/wp-content/plugins/cached_data/k1.exe62.149.144.66webx544.aruba.it.Trojan.P0nyRegistrar Abuse Contact domainabuse@tucows.com31034IT
2017/01/19_13:05www.studiolegaleabbruzzese.com/wp-content/plugins/urxwhbnw3ez/flight_4832.pdf62.149.142.206webx440.aruba.it.ransomwareRegistrar Abuse Contact domainabuse@tucows.com31034IT
2014/09/16_09:59www.advancesrl.eu/ryubfrytqb/dkdorvskxe.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to UpatreNOT DISCLOSED! / technical@staff.aruba.it31034IT
2014/09/16_09:59www.advancesrl.eu/tjjyeqyfjz/gmiuxfhgsb.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to UpatreNOT DISCLOSED! / technical@staff.aruba.it31034IT
2014/09/16_09:59www.advancesrl.eu/ukhclcatkr/brcybmsute.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to UpatreNOT DISCLOSED! / technical@staff.aruba.it31034IT
2014/05/12_00:24citymediamagazin.hu/spacey/egress87.229.77.23webszerver.autofejlesztes.hu.Spyware.ZeuS-61998HU
2014/05/12_00:24citymediamagazin.hu/poniards/figurine87.229.77.23webszerver.autofejlesztes.hu.Spyware.ZeuS-61998HU
2016/02/29_13:00www.gold-city.it/image/_vti_cnf/app/psi.exe31.11.33.82websn2s072.aruba.it.trojan-31034IT
2013/08/07_18:57praxisww.com/wp-stc.php69.26.171.30webprecision.com.Leads to exploitPraxis Communications / eric@praxisww.com27524US
2013/08/07_18:57www.praxisww.com/wp-stc.php69.26.171.30webprecision.com.Leads to exploitPraxis Communications / eric@praxisww.com27524US
2010/03/17_15:54vette-porno.nl213.132.197.60webguru104.webguru.nl.obfuscated iframe directs to exploit kit-24793NL
2014/12/03_08:50chaveiro.bio.br/tmp/AcbtReader.exe177.12.163.81web943.uni5.net.Trojan.Agent.AIcert.br, http://www.cert.br/, respectivelly to cert@cert.br28299BR
2014/03/06_17:46onrio.com.br/site/Pdf/187.1.140.30web601.uni5.net.TrojanOnRio Serviços de Informática Ltda ME / onrio@onrio.com.br28299BR
2011/02/24_21:26patrickhickey.eu/concertina-free-short-skits-scripts-in-hindi-for-independence-day/89.234.64.136web4.hosting.digiweb.ie.Compromised site leading to fake AVNOT DISCLOSED! / domains@europeregistry.com31122IE
2010/04/07_06:26blacknite.eu/cracking/Pelite.EXE89.234.64.135web3.hosting.digiweb.ie.trojan-31122IE
2016/06/27_08:07www.gennaroespositomilano.it/75.126.217.36web234.webfaction.com.iframe on compromised site leads to EK-36351US
2016/07/18_17:31www.luce.polimi.it/it/131.175.187.208web193.asict.polimi.it.iframe on compromised site leads to EK-137IT
2016/01/13_15:10inclusivediversity.co.uk/wp-content/upgrade/217.199.187.192web192.extendcp.co.uk.Paypal Phishing (Redirect)Sasha Scott / -20738GB
2014/05/12_00:24beespace.com.ua/hook/hookkey.exe91.222.136.251web123.ukraine.com.ua.Trojan.Agent% =========== / -47781UA
2013/08/07_18:57www.over50datingservices.com/wp-stc.php79.170.44.116web116.extendcp.co.uk.Leads to exploitAdministrative brian@kaneconsult.co.uk31727GB
2014/02/10_13:58miracema.rj.gov.br/counter.php187.73.33.43web101.f1.k8.com.br.iFrame.Exploit (injected into compromised sites, e.g. www.plantes-sauvages.fr/fiche_lierre_terrestre.htm)Sérgio Chiapetta Leal / schiapett@proderj.rj.gov.br262672BR
2016/09/15_10:06catjogger.win/ganel/gate.php213.145.225.170web02.chillydomains.com.pony loader c&c-25575AT
2009/09/24_00:00typeofmarijuana.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00trafficgrowth.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00thcvaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00roorbong.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00thcextractor.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00purethc.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitswHd9hT@privacypost.com23352US
2009/09/24_00:00potvaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00portablevaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00cannabispicture.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2009/09/24_00:00cannabislyric.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploitsWF / mark@tig.eu23352US
2016/06/17_12:10ex.technor.com/index.php82.113.193.43web.alias.twt.it.iframe on compromised site leads to EKRegistrar Abuse Contact abuse-registrar@orange-business.com30848IT
2014/06/26_14:27www.cellularbeton.it/js/jquery.js213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit-8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2006/3tappa.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit-8612IT
2014/06/26_14:27www.archigate.it/213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit-8612IT
2014/06/26_14:27www.galileounaluna.com/213.205.40.169web-vip-it.eu.tiscali.it.JS.ExploitRegistrar Abuse Contact abuse@ascio.com8612IT
2014/06/26_14:27www.vivaimontina.com/213.205.40.169web-vip-it.eu.tiscali.it.Script.ExploitRegistrar Abuse Contact abuse@ascio.com8612IT
2014/06/26_14:27www.elisaart.it/213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit-8612IT
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_saggese.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit-8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2013/calendario.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit-8612IT
2014/06/26_14:27www.poesiadelsud.it/mostra_internazionale_artecont_1.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit-8612IT
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_napolillo.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit-8612IT

Page 0 1 ... 23


You can find an overview of downloadable lists here