WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 0 1 2 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2010/09/09_17:06-188.65.74.162/invisible_eorighroeig.exe-fake av42473AT
2010/09/09_19:49-91.211.117.25/sp/admin/bin/upload/gbotout.exe-trojan48587UA
2010/09/09_19:49-91.211.117.25/sp/admin/bin/upload/out.exe-trojan48587UA
2010/09/09_19:49-91.211.117.25/sp/admin/bin/upload/out1.exe-trojan48587UA
2010/09/09_19:49-91.211.117.25/sp/admin/bin/upload/pedoout.exe-trojan48587UA
2010/09/12_10:10-188.65.74.162/fuckemall_dfljgsdhfog.exe-fake av42473AT
2010/09/12_10:10-194.28.112.3/outlook.exe-trojan48691MD
2010/09/15_21:29-94.100.25.139/np/index.php139.25.100.94.king-servers.com.CRiMEPACK35017PL
2010/09/15_21:29-94.100.25.139/np/admin.php139.25.100.94.king-servers.com.control panel of CRiMEPACK35017PL
2010/09/15_21:29-94.100.25.139/np/load.php?spl=hcp&b=ff&o=xp&i=hcp139.25.100.94.king-servers.com.trojan Oficla/Sasfis35017PL
2010/09/16_18:37-89.248.111.226/page/contacts-exploit kit45001ES
2010/09/16_18:37-89.248.111.226/page/b6609413801fe046af0a9bd9dff148af.php?site=12&name=47942584&quote=contacts&-trojan45001ES
2010/09/22_19:04-178.17.163.108/ez/178-17-163-108.static-host.net.exploit kit43289MD
2010/09/22_19:04-178.17.163.108/ez/stats.php178-17-163-108.static-host.net.control panel of exploit kit43289MD
2010/09/22_19:04-178.17.163.108/ez/load.php?f=1&e=0178-17-163-108.static-host.net.trojan43289MD
2010/09/28_18:49-70.86.83.194/~unix/PLUGIN/Install-TvFlashPlayer.exeserver1.ddf.com.br.trojan21844US
2010/10/06_07:08-188.65.74.163/vlx777_sdhgjklaogreah.exe-fake av42473AT
2010/10/06_20:13-178.63.2.21/www/delivery/ajs.php?zoneid=4&cb=52206126077static.21.2.63.178.clients.your-server.de.iframe directs to exploit kits24940DE
2010/10/07_08:41-69.64.50.78/kmxqildtbnangvd.phpvds104.entdev.org.Phoenix exploit kit30083US
2010/10/10_11:05-69.64.50.78/foj.php?i=15vds104.entdev.org.trojandownloader Vilsel30083US
2010/10/18_09:54-83.133.122.54/r.php?type=0srv243.cyberhost.name.return malware url13237EU
2010/10/19_19:22-195.226.197.49/spl_6/bn8.php?i=15-trojan51303UA
2010/10/22_06:27-109.196.143.135/outlook.exe-trojan39150UA
2010/10/23_14:38-188.65.74.163/cash2_rwhoajdtyjtyysd.exe-fake av42473AT
2010/10/26_18:45-195.226.197.50/spl_3/dzf.php?i=15-trojan51303UA
2010/10/28_17:28-109.196.143.133/1.exe-trojan Bredolab39150UA
2010/10/28_17:28-109.196.143.133/bm/-Bredolab C&C39150UA
2010/11/07_10:30-92.60.177.235/iza.php?i=15grusha-92-60-177-235.hostinghutor.com.trojan downloader15772UA
2010/11/09_19:19-193.178.172.60/1.exe-anti Trusteer Rapport trojan20564UA
2010/11/09_19:33-195.226.197.50/spl_4/xt.php?i=15-trojan51303UA
2010/11/12_07:47-91.217.249.160/KILL.exe-trojan51554UA
2010/11/12_18:17-69.64.63.220/ar.php?i=15balder038.server4you.net.trojan Vilsel30083US
2010/11/12_18:17-69.50.213.106/1/bqe.php?i=15-trojan18866US
2010/11/13_09:52-188.95.159.100/phpbb/image2/cp.php?i=15-trojan Oficla/Sasfis51306UA
2010/11/13_14:59-193.104.146.77/f1_heiught3o2iryhe/2uiew__t/zxconfig.bin--50134CZ
2010/11/13_14:59-193.104.146.77/f1_heiught3o2iryhe/2uiew__t/up1/bot_up1_144.exe--50134CZ
2010/11/14_18:06-91.217.162.141/adult/bq.php?i=15-trojan downloader51441UA
2010/11/15_18:18-92.60.177.244/out/al8.php?i=15grusha-92-60-177-244.hostinghutor.com.trojan downloader15772UA
2010/11/15_18:37-89.209.91.49/e/bin/config.binstream-91.49.users.odessa.comstar.net.ua.Spyeye config file8359UA
2010/11/15_18:37-89.209.91.49/e/bt_version_checker.phpstream-91.49.users.odessa.comstar.net.ua.SpyEye C&C8359UA
2010/11/15_18:37-78.26.187.39/god/jwi.php?i=15vps70-16.elaninet.com.fake av34187UA
2010/11/16_18:59-91.217.162.176/dm3.exe-trojan TDSS51441UA
2010/11/18_20:56-91.217.249.136/jwb.php?i=15-trojan Bredolab51554UA
2010/11/18_21:14-200.63.44.192/hk/show.php?key=27b7d8fb16d42bb82f9cf3a156f77994&u=user123-exploit kit27716PA
2010/11/18_21:14-200.63.44.192/hk/show.php?key=27b7d8fb16d42bb82f9cf3a156f77994&u=user123-trojan27716PA
2010/11/19_12:41-213.155.12.144/sec/bin/config.bin-SpyEye config file41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/k.exe-trojan SpyEye41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/load.exe-trojan41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/45.exe-trojan41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/baby.exe-trojan41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/v1crypted.exe--41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/v1crypted1.exe--41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/v2crypted.exe-trojan41665UA
2010/11/19_12:41-213.155.12.144/sec/bin/upload/v2crypted1.exe-trojan41665UA
2010/11/19_19:45-109.196.143.136/aff422_flsgejrlhjtrag.exe-trojan39150UA
2010/11/19_19:45-109.196.143.137/setup.exe-trojan39150UA
2010/11/19_19:45-78.26.187.41/god/bp.php?i=15vps70-6.elaninet.com.trojan downloader34187UA
2010/11/19_19:45-92.60.177.246/other/cu.php?i=15grusha-92-60-177-246.hostinghutor.com.trojan15772UA
2010/11/20_07:03-114.203.87.195/help.asp-exploit9318KR
2010/11/20_07:03-121.254.145.212/w3c/ad.exe-trojan3786KR
2010/11/20_09:49-204.45.48.15/shop/xsf.php?i=15actualemailsavings.info.fake av30058US
2010/11/21_11:02-128.134.30.87/w.exe-trojan4766KR
2010/11/21_11:02-128.134.30.87/s.exe-trojan4766KR
2010/11/21_16:10-92.60.177.236/old/jzc.php?i=15grusha-92-60-177-236.hostinghutor.com.trojan15772UA
2010/11/22_07:25-91.217.162.158/pic/is.php?i=15-trojan downloader51441UA
2010/11/22_12:30-195.226.197.51/my_spl4/xt.php?i=15-trojan51303UA
2010/11/24_19:20-80.24.67.44/images/install_flash_player.exe44.Red-80-24-67.staticIP.rima-tde.net.trojan3352ES
2010/11/26_19:18-69.50.208.164/stat/co.php?i=15-fake av18866US
2010/11/26_20:26-195.226.197.51/my_spl3/dzf.php?i=15-trojan51303UA
2010/11/26_20:26-69.50.195.232/-Bleeding Life exploit kit18866US
2010/11/26_21:56-91.207.182.55/xxx1/gw.php?i=15-trojan SpyEye48280UA
2010/12/02_17:39-109.196.143.136/setup.exe-fake av39150UA
2010/12/02_17:39-109.196.143.136/vlx777_sdhgjklaogreah.exe-trojan39150UA
2010/12/02_18:42-91.213.174.46/KillEXE.exe-trojan29106UA
2010/12/02_18:42-91.213.174.46/all-zahlung.exe-trojan Ramnit29106UA
2010/12/02_20:17-220.110.138.52/MNRSys/images/install_flash_player.exe52.48.138.110.220.in-addr.arpa.trojan4713JP
2010/12/03_17:29-201.76.178.58/.YAMAHA/kx.gifmvx-201-76-178-58.mundivox.com.trojan Banker17222BR
2010/12/03_17:29-201.76.178.58/.YAMAHA/sx.gifmvx-201-76-178-58.mundivox.com.trojan Banker17222BR
2010/12/03_17:29-201.76.178.58/.YAMAHA/24.gifmvx-201-76-178-58.mundivox.com.trojan Banker17222BR
2010/12/03_18:04-203.157.204.2/icons/facebook_toolbar.exe-irc backdoor9649TH
2010/12/08_20:40-91.217.162.228/pic/cq.php?i=15-trojan downloader51441UA
2010/12/12_20:02-91.207.182.56/xxx1/gw.php?i=15-trojan SpyEye48280UA
2010/12/12_23:48-109.196.143.136/andru333_lfdshogerhah.exe-trojan39150UA
2010/12/12_23:48-109.196.143.137/setup.exe-trojan39150UA
2010/12/15_19:15-189.108.44.42/envc.php?praquem=dianalnogueira@gmail.com&titulo=Empresas%20000000-C9913A97%2011:11:47&texto=Sony%20Samsung%20Philipis%20Gradiente%20MMX%20EBX%20Toyota%20Volks%20BMW%20Mercedez%20Fiatmail.lavapes.com.br.maklware calls home10429BR
2010/12/15_19:15-222.24.94.19/default/index/images/manual/oracle.txt-Windows hosts file used by banking trojan4538CN
2010/12/15_19:15-202.38.97.217/manual/readme.txt-Windows hosts file used by banking trojan4538CN
2010/12/15_21:06-91.213.174.44/KillEXE.exe-trojan29106UA
2010/12/16_17:28-98.158.178.231/pics.scrwhm.profissionalizando.org.backdoor32780US
2010/12/16_19:46-91.213.174.10/KillEXE.exe-trojan Banker29106UA
2010/12/16_19:46-69.197.135.51/ins/gts/xw.php?i=15-trojan32097US
2010/12/18_20:26-211.234.117.132/index.htm-IE exploit3786KR
2010/12/19_16:35-195.234.124.40/kor/du.php?i=15-trojan20489UA
2010/12/21_06:50-91.213.217.91/index.php?9t=w3N0U4cAIZamABawd7aWMGAE56&4TBG=28CPTYS8X181QOG5P6PTtO&80Il=WdbMk8vV24%2FPiw7&009jY=2V3N01&00=ATK2HJ1U73F8&8Ad03=MCoqPV&7AQe=OBVYMUtDK&0Cj9=VZPPUSVI5ZR9DI77X&46l5k=Q0E6IYM722K66&H7W=SgdOCT9iMD9gDmpSCF&h6=zBHtRBCprYmlnamd9BGJkTSE6Qw%3D%3D&MYyjG=JmfSNUZFJtelNxLwFm&O1u5v=VgclWgU-fake scanner page49806UA
2010/12/21_21:00-91.217.162.239/shikel/dz2.php?i=15-trojan51441UA
2010/12/21_21:00-69.50.209.109/stat/bv.php?i=15-trojan18866US
2010/12/25_13:35-116.255.180.231/smc/bue.php?i=15-trojan4837CN
2010/12/25_13:35-69.64.63.204/hqi.php?i=15balder038.server4you.net.trojan30083US
2010/12/25_13:57-173.244.194.236/goi.php?i=15173.244.194.236.static.midphase.com.trojan36351US
2010/12/26_10:17-211.234.117.47/index.htm-IE exploit3786KR

Page 0 ... 0 1 2 ... 22


You can find an overview of downloadable lists here