WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 0 1 2 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2009/06/30_00:00tomalinoalambres.com.ar190.228.29.81mx2981.godns.net.directs to exploits7303AR
2009/06/30_00:00vipdn123.blackapplehost.com69.162.86.44-86-162-69.static.reverse.lstn.net.vbscript downloader46475US
2009/06/30_00:00womenslabour.org83.142.47.61www.linux.webserwer.pl.directs to exploits39168PL
2009/06/30_00:00wroclawski.com.pl83.142.47.61www.linux.webserwer.pl.directs to exploits39168PL
2009/07/01_00:00xoomer.alice.it/email02/bom.jpg62.211.68.12-trojan20580IT
2009/07/11_00:00www.propan.ru/forum/downloads.php89.111.177.27fe91-1.hc.ru.RFI41126RU
2009/07/21_00:00firehouse651.com/gallery/images/copyright.txt64.40.123.35mercury.van-dns.com.RFI14280CA
2009/07/21_00:00www.freewebtown.com/atakus/Nokia/BotNetNew.txt208.75.230.43www.freewebtown.com.RFI36820US
2009/07/21_00:00webcashmaker.com/v2/members/trade_traffic.php74.206.224.180-RFI27257US
2009/07/21_00:00sentrol.cl/components/kampret.jpg74.200.91.144unknown144.91.200.74.defenderhosting.com.RFI14383US
2009/07/21_00:00www.kjbbc.net/bbs/data/gallery/1207290228/inbox.txt112.216.25.75-RFI3786KR
2009/07/21_00:00www.torgi.kz/help/id2.txt212.154.208.169-RFI9198KZ
2009/07/21_00:00www.torgi.kz/help/idxx.txt212.154.208.169-RFI9198KZ
2009/07/21_00:00www.uriyuri.com/bbs/skin/zero_vote/1.txt202.131.25.49-RFI23576KR
2009/07/21_00:00www.usaenterprise.com/images/images.txt212.70.224.183virtweb-cms.nethouse.it.RFI16141IT
2009/07/21_00:00www.wigglewoo.com/portfolio/contests/contest-006.png85.13.136.149dd15308.kasserver.com.RFI34788DE
2009/07/21_00:00xorgwebs.webs.com/stx.1216.52.115.50membersite.webs.com.RFI10913US
2009/07/21_00:00plengeh.wen.ru/id.txt91.189.80.71www.wen.ru.RFI8342RU
2009/07/21_00:00wahyufian.zoomshare.com/files/bot.txt64.94.37.195frontend.zoomshare.com.RFI19024US
2009/07/24_00:00www.hospedar.xpg.com.br/nome.txt200.149.77.224-RFI7738BR
2009/08/03_00:00dl.heima8.com/pv/dl.htm?adid=20132&sid=021158.215.240.96--4134CN
2009/08/05_00:00update.51edm.net/20090728/01.dll222.222.204.68-trojan4134CN
2009/08/05_00:00update.51edm.net/20090728/01.kdg222.222.204.67-trojan4134CN
2009/08/05_00:00www.xiruz.kit.net/mola.jpg201.7.184.2-trojan28604BR
2009/08/12_00:00wfoto.front.ru/fotos.com194.186.88.45ftp.front.ru.trojan Banload3216RU
2009/08/12_00:00ska.energia.cz/download/imer.up217.31.49.10kojak.core.ignum.cz.trojan Bancos29134CZ
2009/08/15_00:00www.obyz.de/webproxytest.txt85.13.138.226dd18438.kasserver.com.RFI34788DE
2009/08/17_00:00callingcardsinstantly.com/webalizer/050709wareza/crack=17=keygen=serial.html216.157.140.193hsphere.cc.directs to exploits16557US
2009/08/17_00:00dawnframing.com/webalizer/050709wareza/crack=17=keygen=serial.html216.81.64.192rapidcolo.com.directs to exploits16557US
2009/08/17_00:00free-crochet-pattern.com/webalizer/050709wareza/crack=17=keygen=serial.html216.157.140.192hsphere.cc.directs to exploits16557US
2009/08/17_00:00-199.238.181.161/setup.exe-Rogue2914US
2009/08/25_00:00js.tongji.linezing.com/1189582/tongji.js119.42.225.167lvs1.bmvip.cnz.alimama.com.directs to exploits37963CN
2009/08/30_00:00www.oiluk.net/cache/cache_94afbfb2f291e0bf253fcf222e9d238e_180836f9b956ab9d91a50f9add968699188.64.184.32bluechip3.ukhost4u.com.-47625GB
2009/09/05_00:00adgallery.whitehousedrugpolicy.gov/members/Miley-Cyrus-Nude/default.aspx198.77.71.192adgallery.whitehousedrugpolicy.gov.directs to trojan3356US
2009/09/11_00:00-213.163.89.54/lib/index.php?t=2-redirects to exploit kit20495NL
2009/09/11_00:00www.vvvic.com118.220.175.24-obfuscated iframe directs to exploits9318KR
2009/09/12_00:00sportsulsan.co.kr/poll/aipi/id.txt211.171.231.215sportsulsan.co.kr.RFI3786KR
2009/09/13_00:00-66.96.214.117:80806696214117.hostnoc.netcompromised server with nginx at port 808021788US
2009/09/13_00:00-84.242.167.49:8080www.sopharma.bgcompromised server with nginx at port 80808672BG
2009/09/13_00:00hst-19-33.splius.lt:808077.79.19.33hst-19-33.splius.lt.compromised server with nginx at port 808025406LT
2009/09/13_00:00tabex.sopharma.bg:808084.242.167.49www.sopharma.bg.compromised server with nginx at port 80808672BG
2009/09/13_00:00-209.9.188.130/t.txt-RFI3491US
2009/09/16_00:00www.professionalblackbook.com/96.30.28.181host.disantolaw.com.obfuscated iframe directs to exploits19066US
2009/09/18_00:000koryu0.easter.ne.jp208.71.106.216super-html-7.fc2.com.obfuscated iframe directs to LuckySploit40263US
2009/09/19_00:00www.whitesports.co.kr211.202.2.17web-7.blueweb.co.kr.iframe directs to LuckySploit9318KR
2009/09/23_00:00-213.163.89.54/mito/-redirects to exploit kit20495NL
2009/09/24_00:00typeofmarijuana.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00trafficgrowth.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00thcvaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00roorbong.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00thcextractor.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00purethc.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00potvaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00portablevaporizer.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00cannabispicture.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/24_00:00cannabislyric.com/204.93.171.26web01.snaago.com.obfuscated script directs to exploits23352US
2009/09/26_00:00dp-medien.eu81.169.145.69w05.rzone.de.compromised site directs to exploits6724DE
2009/09/26_00:00juedische-kammerphilharmonie.de85.13.135.179dd14202.kasserver.com.compromised site directs to exploits34788DE
2009/09/26_00:00vernoblisk.com67.228.85.201hostica.com.compromised site directs to exploits36351US
2009/09/26_00:00vural-electronic.com81.169.145.82w82.rzone.de.compromised site directs to exploits6724DE
2009/11/01_18:49-217.23.6.17:10283/d3n2829231.dat-malware calls home15435NL
2009/11/13_20:52-200.80.97.174/maravilha.txtmultilink-97-174.ipAddr.multilink-ht.net.RFI27767HT
2009/11/15_16:09www.purplehorses.net/?page=bleach-244-online69.89.19.20019-200.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09www.wildsap.com/?kkk=bleach-episodes-24469.89.31.59box259.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09www.ohiomm.com/?page=bleach-244-vosta74.220.219.67box467.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09be-funk.com/?kkk=bleach-244-english-sub69.89.18.20box20.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09revistaelite.com/?topic=bleach-244-english-sub69.89.22.116box116.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09www.wrestlingexposed.com/faq.php?t=bleach-244-english-sub67.20.108.6367-20-108-63.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09revistaelite.com/?topic=bleach-244-raw69.89.22.116box116.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/16_21:00santacruzsuspension.com/?j=bleach-episode-24566.96.130.2121.130.96.66.static.eigbox.net.redirects to Rogue if referer is a search engine29873US
2009/11/24_19:27-88.80.10.1/pp/anp.php-RFI33837SE
2009/12/02_20:32www.sitepalace.com/w0rmreaper/NoVaC.jpeg216.45.58.150-trojan29761US
2009/12/04_19:56www.doctor-alex.com/files/SetupDrAlex.exe69.89.20.48box48.bluehost.com.Rogue11798US
2009/12/10_15:48cznshuya.ivnet.ru/81.20.97.13hosting.ivnet.ru.compromized site loads external script with exploits24699RU
2009/12/10_15:48www.tpt.edu.in/76.163.253.1-compromized site loads external script with exploits32392US
2009/12/12_10:56-218.25.203.5/images/images/js.gif-trojan4837CN
2009/12/23_02:35inlinea.co.uk213.230.203.8686.0/24.203.230.213.in-addr.arpa.exploit33970GB
2009/12/23_02:35inlinea.co.uk/suspended.page/213.230.203.8686.0/24.203.230.213.in-addr.arpa.exploit33970GB
2009/12/23_02:35inlinea.co.uk/adnep/simple.php213.230.203.8686.0/24.203.230.213.in-addr.arpa.fake av33970GB
2009/12/23_02:35inlinea.co.uk/adnep/tahitian.php213.230.203.8686.0/24.203.230.213.in-addr.arpa.fake av33970GB
2010/02/01_11:14websalesusa.com/ken208.112.22.66-RFI20021US
2010/02/02_08:40www.rempko.sk/kontakt.htm213.81.152.60wep.t-com.sk.compromised site directs to exploits6855SK
2010/02/10_11:39www.secondome.com/sora-margherita/69.163.145.107apache2-moon.suns.dreamhost.com.obfuscated iframe directs to exploit kit26347US
2010/02/13_09:21reishus.de/.sys/?action=fbgen&mode=s&age=193&a=-186345958&v=82&crc=669&ie=6.0.2900.2180212.12.112.25web-ve-gamma.domainmedia.net.Koobface12595DE
2010/02/13_09:21sexzoznamka.eu/lightbox/js/r/files/tasks/AC87.236.199.153boom.barad.cz.returns malware url base64 encoded35592CZ
2010/02/14_15:14-119.145.143.6/aspnet_client/system_web/update.exe-trojan Redosdru4134CN
2010/02/17_15:39-66.220.17.157/toolbar_uninstall.exe157.17.220.66.in-addr.arpaTrojan.Obfuscated.BX / Lop / Swizzor6939US
2010/02/17_15:39-89.28.13.212/in.php?s=89.28.13.21489-28-13-212.starnet.mdredirects to fake av31252MD
2010/02/25_21:26a.update.51edm.net/20100223/01.kdg?md5=ab2676ca2190bc21abcba6e5f5b3b2a7222.222.204.68-trojan4134CN
2010/02/26_16:28-77.245.61.232/offersfortoday/get_file.phpafleet15.amsnl.webair.com.redirects to trojan36057NL
2010/02/26_16:30-77.245.61.232/offersfortoday/multi/28.exeafleet15.amsnl.webair.com.trojan36057NL
2010/03/17_04:53-83.139.194.168/images/comprovanteEmail_Html.com-Trojan33942IT
2010/03/17_15:54vette-porno.nl213.132.197.60webguru104.webguru.nl.obfuscated iframe directs to exploit kit24793NL
2010/03/24_11:51-58.55.127.16:8080/files/image.jpg-Backdoor Koutodoor4134CN
2010/03/29_06:18obkom.net.ua/bancodes/rotator.php?place=indexfoot193.178.146.235obkom.net.ua.iframe directs to redirector/exploits28907UA
2010/04/01_16:14wkmg.co.kr/bbs/lib/1.txt218.38.243.71-RFI17845KR
2010/04/03_10:04-91.207.6.134/spm/page.php?id=1378328&tick=1378328&ver=100&smtp=ok&task=0134.6.207.91.unknown.SteepHost.Net.-47142CZ
2010/04/07_06:26blacknite.eu/cracking/Pelite.EXE89.234.64.135web3.hosting.digiweb.ie.trojan31122IE
2010/04/07_14:26-78.140.15.82/protod.exe-backdoor31357RU
2010/04/08_15:26-202.38.97.217/manual/readme.txt-trojan4538CN

Page 0 ... 0 1 2 ... 22


You can find an overview of downloadable lists here