WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 1 ... 11

Date (UTC)DomainIPReverse LookupDescriptionASN
2017/06/02_08:38sarahdaniella.com/swift/SWIFT%20$.pdf.ace63.247.140.224coriandertest.hmdnsgroup.com.trojan19271US
2017/03/20_10:13dieutribenhkhop.com/parking/pay/rd.php?id=1084.200.4.125125.0-255.4.200.84.in-addr.arpa.Ransom, Fake.PCN, Malspam31400DE
2017/01/25_20:16falconsafe.com.sg/api/get.php?id=aW5mb0BzYXBjdXBncmFkZXMuY29t43.229.84.107-Trojan.Backdoor, Office.Word.Downloader38532SG
2017/01/25_20:15www.lifelabs.vn/api/get.php?id=aW5mb0BzYXBjdXBncmFkZXMuY29t118.69.196.199-Trojan.Backdoor, Office.Word.Downloader18403VN
2016/09/15_08:48tscl.com.bd/m/RI%20XIN%20QUOTATION%20LIST.zip209.99.16.206206.0/24.16.99.209.in-addr.arpa.trojan inside zip file394695US
2016/09/05_10:07ross.starvingmillionaire.org/unveiled/dropdown.js?ver=496e05e1aea0a9c4655800e8a7b9ea285.200.55.58-leads to exploit kit48096RU
2016/09/05_09:37giants.yourzip.co/static/quotes.js?ver=d58072be2820e8682c0a27c0518e805e5.200.55.58-leads to exploit kit48096RU
2016/09/05_09:37ad.9tv.co.il/serv4/www/delivery/ajs.php?zoneid=37&cb=54350405237&charset=utf-862.219.67.44bzq-67-44.red.bezeqint.net.iframe on compromised site leads to exploit kit8551IL
2016/09/01_17:35tahit.wastech2016.in/xcqrsw3.html93.190.140.162customer.worldstream.nl.gateway to EK49981NL
2016/07/21_15:20molla.gato1000.cl/edmiu2.html93.190.140.121customer.worldstream.nl.gateway to EK49981NL
2016/07/21_13:20adv.riza.it/www/delivery/ajs.php?zoneid=51&cb=9602097806062.149.195.107host107-195-149-62.serverdedicati.aruba.it.iframe on compromised site leads to exploit kit31034IT
2016/06/28_20:52www.alphamedical02.fr/94.23.236.74ns308230.ip-94-23-236.eu.iframe on compromised site leads to EK16276FR
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2015/09/17_22:431866809.securefastserver.com/~keycodes777/x1/login.php86.105.227.125-Bot.C249335EU
2015/09/03_21:21ab.usageload32.com/zz/kudhg87s7882bi/mmerrorx.html?tid=x4v&os=Windows&osv=7&isp=Comcast%20Cable&browser=Firefox&ip=Firefox184.50.238.184a184-50-238-184.deploy.static.akamaitechnologies.com.Browlock, Fake.TechSupport20940US
2015/09/03_05:16krsa2gno.youre-todays-lucky-sweeps-winner.com/0H4RuV82F4sgUoM42smmqB4doKnVprIJ/52.10.128.168ec2-52-10-128-168.us-west-2.compute.amazonaws.com.Browlock.Fake.TechSupport16509US
2015/09/03_05:16krsa2gno.important-security-brower-alert.com/0H4RuV82F4sgUoM42smmqB4doKnVprIJ/52.10.128.168ec2-52-10-128-168.us-west-2.compute.amazonaws.com.Browlock.Fake.TechSupport16509US
2015/09/03_05:16krsa2gno.congrats-sweepstakes-winner.com/0H4RuV82F4sgUoM42smmqB4doKnVprIJ/52.10.128.168ec2-52-10-128-168.us-west-2.compute.amazonaws.com.Browlock.Fake.TechSupport16509US
2015/09/03_05:16krsa2gno.todays-sweepstakes-winner.com/0H4RuV82F4sgUoM42smmqB4doKnVprIJ/52.10.128.168ec2-52-10-128-168.us-west-2.compute.amazonaws.com.Browlock.Fake.TechSupport16509US
2015/09/03_05:16krsa2gno.internet-security-alert.com/0H4RuV82F4sgUoM42smmqB4doKnVprIJ/52.10.128.168ec2-52-10-128-168.us-west-2.compute.amazonaws.com.Browlock.Fake.TechSupport16509US
2015/06/02_07:16winsetupcostotome.easthamvacations.info/answered-polynomial-eccentricity-unserviceable/02928771821861481494.242.198.222ip-static-94-242-198-222.server.lu.exploit kit5577LU
2015/06/02_07:16www.volleyball-doppeldorf.de/templates/blau_weiss/n8jh3wbr.php?id=6071616337.218.254.115c15.webspace-verkauf.de.iframe on compromised site leads to exploit kit45031DE
2015/05/11_10:05www.motivacionyrelajacion.com/Z0H24k7E6A/50.62.31.207ip-50-62-31-207.ip.secureserver.net.trojan26496US
2015/04/22_15:17jstaikos.com/51i70l/chbpy.html192.186.209.131ip-192-186-209-131.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17web-sensations.com/js/jquery-1.40.15.js192.186.238.40ip-192-186-238-40.ip.secureserver.net.JS.Exploit26496US
2015/04/20_23:15thewinesteward.com/css/Document1704.exe192.254.249.180-Trojan.Dyre46606US
2015/04/11_14:50securitywebservices.com/hD08940x9A.js217.23.5.57-P2PZeus.WebInject49981NL
2015/03/20_11:35b.nevadaprivateoffice.com:8085/phpmyadm/modelsearch/help/after.php?before=346.254.17.233hosted-by.ihc.ru.Sweet Orange exploit kit42244RU
2015/03/11_12:26hujii.qplanner.cf:8181/2006/movies/html/christmas.php?online=160755&paper=124&what=109448&promos=206723&exchange=309188&edit=135400&common=21695646.254.17.30hosted-by.ihc.ru.exploit kit42244RU
2015/02/28_14:36www.scanmyphones.com/fatalvirus/mx/101/index.php?countryname=United%20Kingdom&brand=&model=&isp=PlusNet%20Technologies%20Ltd&voluumdata=vid..00000008-5d87-4a50-8000-000000000000__vpid..15af7000-bf52-11e4-8afe-28ca782357aa__caid..b012dd3a-0871-4fc2-a5d8-8f6e6e30c334__lid..281f1d6a-3f5c-4aef-b00d-8178c6d9f00f__rt..D__oid1..14fdf5b9-f153-4ad7-9aec-c61b2432d31e54.209.159.227ec2-54-209-159-227.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2015/02/28_14:36www.officialrdr.com/b012dd3a-0871-4fc2-a5d8-8f6e6e30c33454.236.134.245ec2-54-236-134-245.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2015/02/28_14:36app.pho8.com/go.php?c=246&l=509&subid=21388413584?198.58.103.202li553-202.members.linode.com.Malvertising, Fake.Cleaner36351US
2015/02/28_14:36app.pho8.com/go.php?c=255&l=387&subid=21843049645198.58.103.202li553-202.members.linode.com.Malvertising, Android.FakeAV36351US
2015/02/28_14:36app.pho8.com/lp/sd/en/lp4/index.php?c=300&l=524&subid=21841780391198.58.103.202li553-202.members.linode.com.Malvertising, Android.FakeAV36351US
2015/02/28_14:36app.pho8.com/click.php?c=246&key=l8s861364oq1y6w08t9kjkq1&pl_id=1286198.58.103.202li553-202.members.linode.com.Malvertising, Android.FakeAV36351US
2015/02/28_14:36www.vipcpms.com/watch?key=e722a8eea048590dd97760d8b657327b&scrWidth=1680&scrHeight=1050&tz=0209.200.44.228trgdbtest.webair.com.Malvertising, Android.FakeAV27257US
2015/02/17_01:15njtgsd.attackthethrone.com/public-justice/64XPKZldWDM_/R4efelSvf_/I1OdCoSKw2r1epqivQsiUvi9Pb1pHroRToqggbsG5oYAuB_/fSiunpQPK/_/lE3aXgQ~~/MTQ2N2I5OThlNWVjOWFmMWQ2OTE0ZjBh/governing-institution.mhtml94.242.203.247ip-static-94-242-203-247.server.lu.Browlock.Malvertising5577LU
2015/01/14_20:48d4.cumshots.ws:25707/history/t/movies.php?timeline=2146.254.18.236hosted-by.ihc.ru.exploit kit42244RU
2015/01/13_12:55fgtkmcby02.eu:9633/file/help.php?state=36185.16.40.228-exploit kit199456GB
2014/12/03_08:50www.super8service.de/zf0yx81.169.145.164wa4.rzone.de.Trojan.Zeus.GO6724DE
2014/12/03_08:50getdatanetukscan.info/sp32_64_3491943367355003623.exe85.17.73.28-Trojan.FakeMS16265NL
2014/12/03_08:50getdatanetukscan.info/sp32_64_10044639319006172375.exe85.17.73.28-Trojan.FakeMS16265NL
2014/12/03_08:50loft2126.dedicatedpanel.com/pnn/20.exe85.25.176.113loft2126.serverloft.com.Trojan.Downloader8972DE
2014/12/03_08:50xicaxique.com.br/catalog/view/theme/default/image/image102.jpg200.219.249.162static.200.219.249.162.datacenter1.com.br.Trojan.Banker.DE16397BR
2014/12/03_08:50wt10.haote.com/jywgxrjzd.exe218.75.155.41-Trojan.Backdoor4134CN
2014/11/27_18:2497b1c56132dfcdd90f93-0c5c8388c0a5897e648f883e2c86dc72.r54.cf5.rackcdn.com/67.135.105.184-Browlock.FakeInfection209US
2014/11/27_18:24www.email-login-support.com/index-10.html192.186.249.4ip-192-186-249-4.ip.secureserver.net.Browlock.FakeInfection26496US
2014/09/16_09:59pix360.co.nf/wisnyrdqou/ltbwattpww.html83.125.22.199-Compromised site (DHL malspam campaign), leads to Upatre13237EU
2014/09/16_09:59pix360.co.nf/lgdjojxwuo/fofrkxuhgc.html83.125.22.199-Compromised site (DHL malspam campaign), leads to Upatre13237EU

Page 0 1 ... 11


You can find an overview of downloadable lists here