WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 1 2 3 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2010/12/26_11:57-67.21.76.6/zhk.htm-IE exploit46844US
2010/12/26_11:57-67.21.76.6/zfc.htm-IE exploit46844US
2010/12/27_17:18-193.107.172.11/abr.v.alg/gate.php?guid=User!SANDBOX2!D06F0742&ver=10299&stat=ONLINE&ie=6.0.2900.2180&os=5.1.2600&ut=Admin&ccrc=4C78BF5E&md5=dbe81c844053e377da221d2d0bdb34d4-SpyEye C&C196957UA
2010/12/27_17:18-193.107.172.11/abr.v.alg/bin/config.bin-SpyEye config file196957UA
2010/12/27_17:55-91.207.182.56/xxx2/kt.php?i=15-fake av48280UA
2010/12/27_19:51-91.217.162.199/images/hni.php?i=15-trojan51441UA
2010/12/27_23:22-69.50.202.16/stop/xsd.php?i=15-trojan18866US
2010/12/28_18:17-116.255.180.231/elt/e/index.php-Eleonore Exploits pack v1.4.4mod4837CN
2010/12/28_18:17-116.255.180.231/elt/e/stat.php-control panel of Eleonore Exploits pack v1.4.4mod4837CN
2010/12/28_23:01-61.57.227.5/js/b1.aspupgroup.piinet.net.IE exploit17710TW
2010/12/28_23:01-61.57.227.5/js/b3.aspupgroup.piinet.net.IE exploit17710TW
2010/12/29_19:10-195.234.124.41/kor/du.php?i=15-trojan20489UA
2010/12/31_19:40-74.81.73.134:9082/exemple.com/index.phpgnax-ded100.simplehelix.com.Eleonore exploit pack16626US
2010/12/31_19:40-74.81.73.134:9082/exemple.com/load.php?spl=javasgnax-ded100.simplehelix.com.trojan16626US
2010/12/31_23:36-125.141.196.59/A.asp-IE exploit4766KR
2011/01/08_17:42-173.192.136.92/sdh.htm173.192.136.92-static.reverse.softlayer.com.exploit36351US
2011/01/08_17:42-173.192.136.92/tow.htm173.192.136.92-static.reverse.softlayer.com.exploit36351US
2011/01/10_20:06-208.76.54.216/shop/gva.php?i=2-fake av47869US
2011/01/11_19:16-71.7.3.60/webctrl_client/1_0/TreeImages/rtl/l1.gifgrnl-static-04-0012.dsl.iowatelecom.net.trojan30160US
2011/01/11_19:16-71.7.3.60/webctrl_client/1_0/TreeImages/rtl/l2.gifgrnl-static-04-0012.dsl.iowatelecom.net.trojan30160US
2011/01/11_19:16-71.7.3.60/webctrl_client/1_0/TreeImages/rtl/l3.gifgrnl-static-04-0012.dsl.iowatelecom.net.trojan30160US
2011/01/12_14:33-220.128.152.141/aspnet_client/system_web/1_1_4322/flash.htm220-128-152-141.HINET-IP.hinet.net.leads to trojan Banker3462TW
2011/01/12_19:15-209.216.193.107/registrydoktor-newde.phpwww.antivirus-reports.org.fake av21607US
2011/01/14_18:43-89.187.50.195/index.php?3104c3a31c438f61b5e85b6b6c751c0e-exploit kit25129MD
2011/01/14_18:43-89.187.50.195/server_privileges.php?03b32fe00ceb95f0a9fc8dd78a0d58d1=3-trojan25129MD
2011/01/17_10:30-110.45.136.181/stat/x.asp-IE exploit3786KR
2011/01/20_11:16-71.7.3.60/webctrl_client/a/xp001.gifgrnl-static-04-0012.dsl.iowatelecom.net.trojan Banker30160US
2011/01/21_20:32-173.244.192.245/zfotp.htm173.244.192.245.static.midphase.com.IE exploit36351US
2011/01/26_19:40-194.247.58.96/soln_1/knb.php?i=2vpn10-dip-t-pool2-194-247-58.96.sevpn.com.trojan SpyEye52093UA
2011/01/26_19:40-194.247.58.95/mypanel/gate.php?guid=5.1.2600!SANDBOX0!D06F0742&ver=10305&ie=6.0.2900.2180&os=5.1.2600&ut=Admin&ccrc=169E4359&md5=72079beedbc873cb73e7326ef3f8de56&plg=customconnector;webfakes;socks5;ftpbc;ccgrabber&stat=onlinevpn10-dip-t-pool2-194-247-58.95.sevpn.com.SpyEye C&C52093UA
2011/01/30_20:52-95.169.186.126/wp-logs/cm.php?i=15ns.km33904.keymachine.de.trojan downloader31103DE
2011/01/30_21:40-208.76.54.224/shop/jp.php?i=15-fake av47869US
2011/02/01_08:21-67.21.76.33/fvp.htm-IE exploit46844US
2011/02/01_08:21-67.21.76.33/rcf.htm-IE exploit46844US
2011/02/01_17:30-186.202.16.186/winjar2011.dllcpro0867.publiccloud.com.br.trojan Bancos27715BR
2011/02/02_13:30-195.242.182.30/xxx1/xob.php?i=15-trojan44994EU
2011/02/03_10:51-46.17.101.2/main/gate.php-SpyEye C&C48211RU
2011/02/05_17:53-91.200.240.7/Yh89RfaPh7bBss1zOFn7saOaOOa/bin/config.bin-SpyEye config file48709UA
2011/02/05_17:53-91.200.240.7/Yh89RfaPh7bBss1zOFn7saOaOOa/gate.php-SpyEye C&C48709UA
2011/02/08_20:17-195.80.151.59/7box/dqj.php?i=15-trojan Bamital50877DE
2011/02/12_09:57-194.247.58.51/ir7.php?i=15vpn6-dip-t-pool2-194-247-58.51.sevpn.com.trojan SpyEye52093UA
2011/02/18_20:25-91.200.240.7/T6yRslk8JrR5sOpskHs51L/bin/config.bin-SpyEye config file48709UA
2011/02/18_20:25-91.200.240.7/T6yRslk8JrR5sOpskHs51L/gate.php-SpyEye C&C48709UA
2011/02/20_11:07-194.247.58.174/js/config.binvpn18-dip-t-pool29-194-247-58.174.sevpn.com.SpyEye config file52093UA
2011/02/21_08:18-91.200.240.7/T6yRslk8JrR5sOpskHs51L/bin/config.bin-SpyEye C&C48709UA
2011/02/22_20:34-71.235.85.177/images/xc.gifc-71-235-85-177.hsd1.ct.comcast.net.trojan Banload7015US
2011/02/22_20:34-200.13.244.245/cw-assenda/bin/es/es/post.aspstatic-epm200-13-244-245.epm.net.co.malware calls home13489CO
2011/02/22_20:34-200.13.244.245/cw-assenda/bin/es/es/contador.aspstatic-epm200-13-244-245.epm.net.co.infection counter13489CO
2011/03/11_15:52-174.127.70.195/8545/4544/174.127.70.195.static.midphase.com.fake AV36351US
2011/03/18_19:29-69.50.192.250:8000-malware calls home18866US
2011/03/20_17:23-70.38.124.97/distrmaincp/-SpyEye C&C32613CA
2011/03/20_17:23-91.220.62.84/123/index.php-Eleonore Exploits pack version 1.4.4mod51699UA
2011/03/20_17:23-91.220.62.84/123/stat.php-control panel of Eleonore Exploits pack version 1.4.4mod51699UA
2011/03/20_17:23-91.220.62.84/123/load.php?spl=mdac-trojan downloader51699UA
2011/03/20_17:23-91.220.62.84/info/load.php?file=0-backdoor Cycbot51699UA
2011/03/20_17:23-91.220.62.84/info/load.php?file=1-fake av51699UA
2011/03/22_19:21-70.43.40.116/PRISM/CSS/a.gif70.43.40.116.nw.nuvox.net.trojan Banload11456US
2011/03/22_19:21-70.43.40.116/PRISM/CSS/b.gif70.43.40.116.nw.nuvox.net.trojan11456US
2011/03/22_19:21-70.43.40.116/PRISM/CSS/c.gif70.43.40.116.nw.nuvox.net.trojan11456US
2011/03/26_16:01-95.64.8.76/hex/jwh.php?i=15-fake av49873RO
2011/07/04_19:06-186.190.213.10/dl/wan18.b2bprovidersite.com.trojan52302PA
2011/07/09_02:48-186.190.213.10/x/wan18.b2bprovidersite.com.Trojan.FakeAV52302PA
2011/07/14_05:52-79.142.65.179/crack-keygen/592147/emu8086-300.htmlhosted-by.altushost.com.Leads to Renos trojan49544EU
2011/07/14_05:52-79.142.65.179/crack-keygen/223644/wavclean-183.htmlhosted-by.altushost.com.Leads to Renos trojan49544EU
2011/07/14_05:52-79.142.65.179/crack-keygen/390415/pdf-snake-v237-for-adobe-acrobat.htmlhosted-by.altushost.com.Leads to Renos trojan49544EU
2011/07/21_15:16-77.221.149.219/get/311/2363977.221.149.219.addr.datapoint.ru.Fraud Skype setup30968RU
2011/07/26_18:33-46.16.240.18/9VBMa76FFnB4VAYu0X5j755pMiSyVrcV?s=mdacot-trojan51632UA
2011/07/30_20:33-46.16.240.18/9VBMa76FFnB4VAYu0X5j755pMiSyVrcV?s=odayz&-trojan51632UA
2011/10/21_23:55-121.10.107.78:88/b7/0.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/1.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/3.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/4.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/5.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/6.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/7.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/8.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/9.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/10.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/11.exe-trojan OnlineGames4134CN
2011/10/21_23:55-121.10.107.78:88/b7/13.exe-trojan OnlineGames4134CN
2011/11/10_21:52-202.157.165.152/zfin.html-redirects to exploit kit9892SG
2012/03/17_20:32-31.186.102.170/lolomgfucku/3214spackasd324/-Bleeding Life exploit kit49505RU
2012/03/17_20:32-31.186.102.170/lolomgfucku/3214spackasd324//download_file.php?e=JavaSignedApplet-trojan49505RU
2012/04/01_19:58-178.248.85.67/zeus/config.bin67.85.248.178.sta.211.ru.zeus config file41794RU
2012/04/01_19:58-178.248.85.67/zeus/gate.php67.85.248.178.sta.211.ru.zeus drop zone41794RU
2012/04/02_20:11-193.107.19.80/inter/gate.php?hwid=4281525696&pc=COMPUTERNAME&localip=127.0.0.1&winver=x32-malware calls home197794RU
2012/04/05_08:08-211.44.250.173:8080/navigator/jueoaritjuir.php-Phoenix exploit kit9318KR
2012/04/05_08:08-180.235.150.72:8080/navigator/jueoaritjuir.php-Phoenix exploit kit45731ID
2012/04/08_09:23-188.127.249.241/~alert/alert.php?id=5-Message text for Ransom48172RU
2012/04/09_12:25-112.78.124.115:8080/navigator/jueoaritjuir.php-Phoenix exploit kit9371JP
2012/04/10_08:31-88.190.22.72:8080/navigator/jueoaritjuir.phpsd-29537.dedibox.fr.Phoenix exploit kit12322FR
2012/04/10_08:31-89.31.145.154:8080/navigator/jueoaritjuir.phpvserver-mpfppr2.nexen.net.Phoenix exploit kit41628FR
2012/04/10_08:31-62.85.27.129:8080/navigator/jueoaritjuir.phpsw-gbit-1.gw.27-129.ime.lv.Phoenix exploit kit39201LV
2012/04/10_08:31-219.94.194.138:8080/navigator/jueoaritjuir.php-Phoenix exploit kit9371JP
2012/04/11_20:36-62.109.29.101/a/xwy.php?i=15geovanne.fvds.ru.Zeus trojan29182LU
2012/04/12_15:12-69.194.192.229/q.php?f=7245d&e=2-Zeus trojan14670US
2012/04/12_20:21-91.195.254.71/?a8b15ffc5b06664b1e119cc1c6942b3d-trojan Ransom message text43997RU
2012/04/16_14:40-91.195.254.86/?1284cf325cf33aa48aeb29aee89b3473-Ransom message text43997RU
2012/04/16_14:40-91.195.254.74/?b933de68eae80dadb34b9d4b889575eb-Ransom message text43997RU
2012/04/20_15:11-91.196.216.64/s.php?ref=referrer&cls=colorDepth&sw=width&sh=height&dc=charset&lc=location&ua=userAgent-Exploit43239RU

Page 0 ... 1 2 3 ... 22


You can find an overview of downloadable lists here