WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 0 1 2 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9378.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9445.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.milardi.it/corteconti.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.milardi.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011/213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.bcservice.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.unicaitaly.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.montacarichi.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.assculturaleincontri.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.ristoromontebasso.it/scripts/menu.js213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.3difx.com213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2014/06/26_14:27www.3difx.com/serv010.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.chiaperottipaolo.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.marinoderosas.com/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.riccardochinnici.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.eivamos.com/rimessaggio/carrelliconver.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.catgallery.com/email.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.vinyljazzrecords.com/japan.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.racingandclassic.com/pagineit/race.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.sbo.it/babylon.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit, Embedded links leading to illegal pharma8612IT
2014/06/26_14:27www.aerreravasi.com/filmestensibile/filmestensibile.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/differenziata/differenziata.html213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/chisiamo/chisiamo.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/comeraggiungerci/comeraggiungerci.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/bolle/bolle.html213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/05/27_04:02www.cortesidesign.com/Avviso.zip213.205.40.169web-vip-it.eu.tiscali.it.Trojan.Zbot8612IT
2014/05/27_04:02www.cortesidesign.com/Avviso.zip213.205.40.169web-vip-it.eu.tiscali.it.Trojan.Inject8612IT
2015/04/22_15:17teprom.it/HSBC.BANK.STORAGE/document.html213.205.38.23client-sh-3.hosting.tiscali.it.Script.Exploit8612IT
2015/04/22_15:17teprom.it/BANK.STORAGE-DATA/secure_document.html213.205.38.23client-sh-3.hosting.tiscali.it.Script.Exploit8612IT
2015/04/22_15:17teprom.it/HSBC-BANK_STORAGE-DATA/new_secure_payment.html213.205.38.23client-sh-3.hosting.tiscali.it.Script.Exploit8612IT
2015/04/22_15:17teprom.it/HSBC_BANK_STORAGE_DATA/secure-document.html213.205.38.23client-sh-3.hosting.tiscali.it.Script.Exploit8612IT
2013/07/11_07:25www.rebeccacella.com/wp-content/plugins/subscribe/212.227.31.159kundenserver.de.compromised site leads to exploit kit8560DE
2013/10/27_03:06bizzibeans.net/wp-admin/zope/82.165.116.169-Leads to trojan8560DE
2013/10/27_03:06bizzibeans.net/wp-admin/zope/adobe_flash.exe82.165.116.169-Trojan8560DE
2014/02/07_09:44www.t-gas.co.uk/1.txt212.227.26.21-Leads to exploit at jolygoestobeinvester.ru8560DE
2014/02/07_13:34www.nothingcompares.co.uk/1.html82.165.204.223kundenserver.de.Leads to exploit at jolygoestobeinvester.ru8560DE
2014/02/07_14:04nortonfire.co.uk/1.html82.165.213.55kundenserver.de.Leads to exploit at jolygoestobeinvester.ru8560DE
2014/05/01_00:23ocpersian.com74.208.21.148-Android.Trojan.SMSStealer8560US
2014/05/27_04:02troytempest.com/DHLDocument.zip217.160.115.88kundenserver.de.Trojan.Email.Gen8560DE
2014/05/27_04:02troytempest.com/DHLDocument.zip217.160.115.88kundenserver.de.Trojan.Zbot8560DE
2014/05/27_04:02dougmlee.com/DHL50.21.187.135s15569399.onlinehome-server.com.Document.zip Trojan.Email.Gen8560US
2014/05/27_04:02dougmlee.com/DHL%20Document.zip50.21.187.135s15569399.onlinehome-server.com.Trojan.Zbot8560US
2015/01/13_14:47omrdatacapture.com/taxadmin/get_doc.html213.171.218.18server213-171-218-18.livedns.org.uk.Compromised site, leads to exploit8560GB
2016/09/05_09:37ad.9tv.co.il/serv4/www/delivery/ajs.php?zoneid=37&cb=54350405237&charset=utf-862.219.67.44bzq-67-44.red.bezeqint.net.iframe on compromised site leads to exploit kit8551IL
2014/10/09_13:05www.sasenergia.pt/images/highslide/highslide-with-gallery.js176.221.32.120pplc32120.ciberserver.com.Compromised site leading to exploit8426PT
2010/07/29_13:45-85.21.235.231/psd/index.html85-21-235-231.dar-ekspo.corbina.ru.obfuscated script / java downloader8402RU
2010/11/15_18:37-89.209.91.49/e/bin/config.binstream-91.49.users.odessa.comstar.net.ua.Spyeye config file8359UA
2010/11/15_18:37-89.209.91.49/e/bt_version_checker.phpstream-91.49.users.odessa.comstar.net.ua.SpyEye C&C8359UA
2009/06/25_00:00web-olymp.ru81.176.232.104server4.neoweb.ru.directs to exploits8342RU
2009/06/28_00:00sbnc.hak.su/spread.txt91.189.81.71www2.wen.ru.RFI8342RU
2009/07/21_00:00plengeh.wen.ru/id.txt91.189.80.71www.wen.ru.RFI8342RU
2011/03/12_14:57seet10.jino.ru81.177.139.113srv16-h-st.jino.ru.Trojan8342RU
2016/09/21_12:12art-archiv.ru/images/animated-number/docum-arhiv.exe81.177.139.111-trojan8342RU
2014/12/03_08:50optimization-methods.com/Bilder/calc.exe212.218.192.28plesk3.nbg1.nethinks.com.Trojan.Backdoor8319DE
2012/12/21_02:03port.bg/wfgv.html?php=receipt91.196.124.59host124-59.superhosting.bg.Redirects to exploit8262BG
2017/03/20_10:13fourthgate.org/Yryzvt104.200.67.194-Ransom, Fake.PCN, Malspam8100US
2016/03/31_10:01kassabravo.com/67.196.85.119israsky.com.iframe on compromised site leads to EK8001US
2009/07/24_00:00www.hospedar.xpg.com.br/nome.txt200.149.77.224-RFI7738BR
2013/12/03_08:36www.lostartofbeingadame.com/wp-content/plugins/www.fotosupload.php70.88.182.38-redirects to trojan download7725US
2014/01/22_14:39-221.132.37.26/sh-Linux malware7643VN
2014/02/07_14:21hrdcvn.com.vn/1.html123.30.184.132vdc184-132.vmms.vn.Leads to exploit at jolygoestobeinvester.ru7643VN
2014/05/27_04:02hnskorea.co.kr/alberta/dingo.exe203.242.210.105exp1.ecplaza.net.Trojan.Agent.ED7557KR
2014/02/07_13:34users173.lolipop.jp/~lolipop.jp-204f9d446b7f9eb/1.html210.157.22.62users173.phy.lolipop.jp.Leads to exploit at jolygoestobeinvester.ru7506JP
2013/11/19_15:22silurian.cn/modules/mod_cmsfix/fix.php159.226.74.251-iframe leads to exploit kit7497CN
2014/05/27_04:02www.arkinsoftware.in/images/aveksynkens.exe216.151.164.53shared-hosting.njtech.com.Spyware.Zbot.ED7393US
2014/05/12_00:24arkinsoftware.in/images/nukotobne.exe216.151.164.53shared-hosting.njtech.com.Trojan.Agent.FSAVXGen7393US
2014/05/12_00:24arkinsoftware.in/images/inexsabit.exe216.151.164.53shared-hosting.njtech.com.Trojan.Inject.ED7393US
2014/05/12_00:24arkinsoftware.in/images/aveksynkens.exe216.151.164.53shared-hosting.njtech.com.Trojan.Zbot7393US
2009/06/30_00:00tecnocuer.com190.228.29.81mx2981.godns.net.directs to exploits7303AR
2009/06/30_00:00tomalinoalambres.com.ar190.228.29.81mx2981.godns.net.directs to exploits7303AR
2014/12/03_08:50tatschke.net/hbc.exe190.228.29.82mx2982.godns.net.Trojan.Backdoor7303AR
2011/02/20_10:48alissonluis-musico.sites.uol.com.br/mar.jpg200.147.33.21200-147-33-21.static.uol.com.br.trojan Banker7162BR
2016/06/06_10:17welington.info/187.17.111.101-iframe on compromised site leads to EK7162BR
2011/02/22_20:34-71.235.85.177/images/xc.gifc-71-235-85-177.hsd1.ct.comcast.net.trojan Banload7015US
2010/02/17_15:39-66.220.17.157/toolbar_uninstall.exe157.17.220.66.in-addr.arpaTrojan.Obfuscated.BX / Lop / Swizzor6939US
2010/04/25_06:54w612.nb.host127-0-0-1.com/bins/int/kr3_znp.int?fxp=384bd820008ee37f030b3e65bca6e8a1a65beab33574f567a23b0a987ca83e6544e3e64566.220.17.200-trojan Swizzor6939US
2010/04/25_06:54q28840.nb.host127-0-0-1.com/bins/int/tp_map16.int?fxp=5936289861f351e362768cf97e7b45e0648647f26c6d6750fb2298af91238cf9c815a46166.220.17.200-trojan Swizzor6939US
2010/04/27_06:45w4988.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=85c26940bd074d9ebe8290842bca496331374b71c3b8806954f77f966.220.17.200-trojan Swizzor6939US
2010/04/27_06:45z32538.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=2ac11c971204a16811817c725e04d68a44f9d4987c472f66eb08d066.220.17.200-trojan Swizzor6939US
2013/05/10_17:35-66.175.218.117:8080/get/e3943d7369aa6add911aca18b3a507f4.exeli513-117.members.linode.com.trojan6939US
2013/05/12_14:55-66.175.218.117:8080//get/e3943d7369aa6add911aca18b3a507f4.exeli513-117.members.linode.com.Trojan.FakeAlert6939US
2014/03/20_18:19instruminahui.edu.ec/201403/editor.html74.207.242.230host.saaslibre.info.exploit kit6939US
2014/12/03_08:50pharmadeal.gr/nfqnaanl64.71.131.228228.224-28.131.71.64.in-addr.arpa.Trojan.Zeus.GO6939US
2010/02/02_08:40www.rempko.sk/kontakt.htm213.81.152.60wep.t-com.sk.compromised site directs to exploits6855SK
2010/07/13_12:51-91.188.60.5/hit.php?v=44&app_type_id=1&wm_id=acc0044&u=d6c9b08c-89d3-46bf-b610-08c742b7ebf2&t=2-malware calls home6851LV
2010/07/19_21:04-91.188.60.5/hit.php?v=45&app_type_id=1&wm_id=acc0049&u=28b6d4a0-f30b-43bc-8cc8-c466a4ca72bc&t=2-malware calls home6851LV
2010/07/23_08:01-91.188.60.5/hit.php?v=46&app_type_id=1&wm_id=acc0047&u=6a397086-fc8c-4e4e-bd44-05f8f376ab0f&t=2-malware calls home6851LV
2010/07/23_08:01-91.188.60.5/l.php?wm_id=acc0047-trojan downloader6851LV
2010/07/25_17:24-91.188.59.10/opapa.exe-trojan6851LV
2010/08/21_19:01-91.188.59.150/show.php?s=bc0915c6c2-Incognito exploit kit6851LV
2010/08/21_19:01-91.188.59.150/admin.php-control panel of Incognito exploit kit6851LV
2010/08/21_19:01-91.188.59.150/load.php?e=2-fake av6851LV
2010/08/26_16:20-91.188.59.10/exe/sweater.exe-fake av6851LV
2010/08/26_16:20-91.188.59.10/exe/dogma.exe-trojan TDSS6851LV
2010/08/26_16:20-91.188.59.10/report/log.php-malware calls home6851LV
2012/12/10_15:48private.hotelcesenaticobooking.info/r/l/updating-bugs_keeping.php93.190.43.44-Cool exploit kit6849UA
2009/09/26_00:00dp-medien.eu81.169.145.69w05.rzone.de.compromised site directs to exploits6724DE
2009/09/26_00:00vural-electronic.com81.169.145.82w82.rzone.de.compromised site directs to exploits6724DE
2013/05/10_17:35-85.214.133.237:8080/get/e3943d7369aa6add911aca18b3a507f4.exegamelevel.de.trojan6724DE

Page 0 ... 0 1 2 ... 22


You can find an overview of downloadable lists here