WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 1 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2015/04/22_15:17zyrdu.cruisingsmallship.com/vyglachaph/choawoatch/glocoaphoo/files/176.31.28.226-VBS.Trojan.Downloader16276FR
2016/03/18_06:58zt.tim-taxi.com/login.php198.12.67.179179.67.12.198.host.nwnx.net.MasterCard phishing36352US
2009/06/12_00:00zous.szm.sk88.86.113.4freehosting.szm.com.directs to exploits39392CZ
2009/05/28_00:00zkic.com174.37.172.162www.se.parahost.com.directs to exploits36351US
2014/03/21_13:13zjjlf.croukwexdbyerr.net/zyso.cgi?1666.96.195.4966-96-195-49.static.hostnoc.net.redirects to exploit kit21788US
2015/04/22_15:17zibup.csheaven.com/ypsoophoov/ptycmympub/teezukedoo/files/46.30.42.74veronikalife.ru.VBS.Trojan.Downloader35415RU
2009/06/07_00:00zgsysz.com125.65.112.23-directs to exploits4134CN
2013/12/09_09:45z7752.com/checkout.php?step=1195.191.56.113-Ransomware payment processor50395UA
2010/04/27_06:45z32538.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=2ac11c971204a16811817c725e04d68a44f9d4987c472f66eb08d066.220.17.200-trojan Swizzor6939US
2014/01/19_09:40yumekin.com/inde.php?comercial@cohesp.com.br108.179.202.25-Trojan36351US
2014/01/19_09:40yumekin.com/inde.php108.179.202.25-Trojan36351US
2013/05/20_18:00youtuhe.com174.140.17.100-Redirects to Rogue.FakeFlashPlayer32311US
2013/05/20_20:35youtibe.com173.193.106.10173.193.106.10-static.reverse.softlayer.com.Redirects to Rogue.FakeFlashPlayer36351US
2013/05/20_18:00yougube.com199.223.209.169server.ambertechnic.com.Redirects to Rogue.FakeFlashPlayer25847US
2014/07/15_07:26ylpzt.juzojossai.net/9aywse7eva192.200.105.135192-200-105-135.static.gorillaservers.com.exploit kit53850US
2015/12/28_20:16yigitakcali.com/dbsys.php160.153.16.29ip-160-153-16-29.ip.secureserver.net.Teslacrypt ransomware c&c26496US
2012/11/18_15:21xpornstarsckc.ddns.name/latest/xxx-porn-movie.avi.exe94.199.53.203ded-srv-pool-53-203.23net.hu.trojan30836HU
2015/04/22_15:17xotsa.frenchgerlemanelectric.com/apsestooxo/iwheewhosh/keckalrees/files/93.170.123.186programmerworld.ru.VBS.Trojan.Downloader29182CZ
2009/07/21_00:00xorgwebs.webs.com/stx.1216.52.115.50membersite.webs.com.RFI10913US
2009/07/01_00:00xoomer.alice.it/email02/bom.jpg62.211.68.12-trojan20580IT
2009/05/23_00:00xindalawyer.com218.5.79.63-Exploits4134CN
2014/12/03_08:50xicaxique.com.br/catalog/view/theme/default/image/image102.jpg200.219.249.162static.200.219.249.162.datacenter1.com.br.Trojan.Banker.DE16397BR
2012/10/24_20:51xamateurpornlic.www1.biz/latest/xxx-porn-movie.avi.exe94.199.53.203ded-srv-pool-53-203.23net.hu.trojan ZeroAccess/Sirefef30836HU
2010/11/13_09:52www.zyxyfy.com/images/ner.html61.178.85.177vip.lz118114.cn.exploit4134CN
2013/12/20_15:23www.zctei.com/date/9377chiyue_Y_Cdcr1124.exe122.225.107.85-Win32/Trojan.Spy4134CN
2014/02/07_08:25www.zatzy.com/allmaent/391854-volvos-nya-drive-e.html81.201.217.115-compromised site leads to exploit kit41175SE
2016/07/12_13:19www.ywvcomputerprocess.info/errorreport/ty5ug6h4ndma4/103.224.212.222lb-212-222.above.com.fake alert page133618AU
2009/08/05_00:00www.xiruz.kit.net/mola.jpg201.7.184.2-trojan28604BR
2013/08/07_18:57www.wyroki.eu/wp-stc.php85.128.187.109ame109.rev.netart.pl.Leads to exploit15967PL
2009/11/15_16:09www.wrestlingexposed.com/faq.php?t=bleach-244-english-sub67.20.108.6367-20-108-63.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/11/15_16:09www.wildsap.com/?kkk=bleach-episodes-24469.89.31.59box259.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/07/21_00:00www.wigglewoo.com/portfolio/contests/contest-006.png85.13.136.149dd15308.kasserver.com.RFI34788DE
2011/04/01_04:46www.widestep.com/files/ws_qk_install.exe205.186.183.224ekiaioocks.gs07.gridserver.com.Win32/Agent.HSDNOGR31815US
2009/09/19_00:00www.whitesports.co.kr211.202.2.17web-7.blueweb.co.kr.iframe directs to LuckySploit9318KR
2009/09/11_00:00www.vvvic.com118.220.175.24-obfuscated iframe directs to exploits9318KR
2015/06/02_07:16www.volleyball-doppeldorf.de/templates/blau_weiss/n8jh3wbr.php?id=6071616337.218.254.115c15.webspace-verkauf.de.iframe on compromised site leads to exploit kit45031DE
2014/06/26_14:27www.vivaimontina.com/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2015/02/28_14:36www.vipcpms.com/watch?key=e722a8eea048590dd97760d8b657327b&scrWidth=1680&scrHeight=1050&tz=0209.200.44.228trgdbtest.webair.com.Malvertising, Android.FakeAV27257US
2014/06/26_14:27www.vinyljazzrecords.com/japan.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2016/06/07_08:37www.vertourmer.com/81.31.147.91jmhlmd41.colt-engine.it.iframe on compromised site leads to EK47242IT
2009/07/21_00:00www.usaenterprise.com/images/images.txt212.70.224.183virtweb-cms.nethouse.it.RFI16141IT
2009/07/21_00:00www.uriyuri.com/bbs/skin/zero_vote/1.txt202.131.25.49-RFI23576KR
2014/06/26_14:27www.unicaitaly.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/03/21_09:24www.two-of-us.at/images/youtube/d/flashplayer.html85.158.181.11server143-han.de-nserver.de.Mal.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/youtube/d/flashplayer.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/W.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/vein.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/s4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/s2x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/s2.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/pictures.php85.158.181.11server143-han.de-nserver.de.PHP.Shell34432DE
2014/03/21_09:24www.two-of-us.at/images/m.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/digitalcoinminer.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/dgc4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/dc.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/bz.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/BR.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/aurcoinlab.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/au4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/au.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/777.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/4x.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/3.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/2.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/03/21_09:24www.two-of-us.at/images/1.exe85.158.181.11server143-han.de-nserver.de.Trojan.FakeFlash34432DE
2014/02/11_02:56www.tvnews.or.kr/web/view.html210.205.6.203-Win32/Exploit.CVE-2013-3897.A9318KR
2014/02/11_02:56www.tvnews.or.kr/web/menu.gif210.205.6.203-Trojan9318KR
2014/02/11_02:53www.tvnews.or.kr/web/main.gif210.205.6.203-Trojan9318KR
2009/12/10_15:48www.tpt.edu.in/76.163.253.1-compromized site loads external script with exploits32392US
2009/07/21_00:00www.torgi.kz/help/idxx.txt212.154.208.169-RFI9198KZ
2009/07/21_00:00www.torgi.kz/help/id2.txt212.154.208.169-RFI9198KZ
2014/02/12_11:08www.toochattoo.com/fond-ecran-anime/chinois1.exe88.190.253.247pf7-web.online.net.Trojan12322FR
2010/04/16_20:16www.tiergestuetzt.de/80.190.144.115sv05.net-housting.de.compromised site directs to exploits15598DE
2015/04/24_19:11www.thesparkmachine.com/Antivirus.zip208.113.197.192apache2-emu.paulding.dreamhost.com.FakeAV26347US
2016/01/12_08:53www.technix.it/217.194.6.34vchicken.oval.it.compromised site leads to exploit kit12637IT
2013/06/05_20:17www.tdms.saglik.gov.tr/KDV_Guncel_Tevkifat_Oranlari.htm212.175.169.227-compromised sites leads to exploit kit9121TR
2009/06/24_00:00www.t-sb.net72.232.219.152152.219.232.72.static.reverse.ltdomains.com.directs to exploits22576US
2014/02/07_09:44www.t-gas.co.uk/1.txt212.227.26.21-Leads to exploit at jolygoestobeinvester.ru8560DE
2014/12/03_08:50www.super8service.de/zf0yx81.169.145.164wa4.rzone.de.Trojan.Zeus.GO6724DE
2017/01/19_13:05www.studiolegaleabbruzzese.com/wp-content/plugins/urxwhbnw3ez/flight_4832.pdf62.149.142.206webx440.aruba.it.ransomware31034IT
2014/02/12_11:08www.studiochiarelli.eu/02-2014/clients/order.3757.zip195.110.124.133opus.register.it.Trojan39729IT
2010/04/16_20:16www.stirparts.ru/89.108.67.238cp141.agava.net.compromised site directs to exploits43146RU
2011/02/02_18:13www.spris.com/images/log.txt210.114.221.53-IE exploit4670KR
2010/04/16_20:16www.sonnoli.com/?page_id=562.149.140.107webx97.aruba.it.compromised site directs to exploits31034IT
2015/10/16_07:33www.smartscan.ro85.9.27.130s13v.webindex.ro.compromised site leads to exploit kit5588RO
2013/10/27_03:02www.slivki.com.ua/as/smp.exe212.26.135.68-Trojan8788UA
2013/10/27_03:02www.slivki.com.ua/as/Ponynl.exe212.26.135.68-Trojan8788UA
2013/12/20_15:23www.sj88.com/hezi/jm/s1000.exe202.97.174.68-Trojan.Dropper4837CN
2009/12/02_20:32www.sitepalace.com/w0rmreaper/NoVaC.jpeg216.45.58.150-trojan29761US
2016/05/23_09:06www.sieltre.it/79.58.246.237host237-246-static.58-79-b.business.telecomitalia.it.iframe on compromised site leads to EK3269IT
2010/02/10_11:39www.secondome.com/sora-margherita/69.163.145.107apache2-moon.suns.dreamhost.com.obfuscated iframe directs to exploit kit26347US
2014/02/21_05:43www.seal-technicsag.ch/index.zip82.195.224.113gic-web-bsd-013.genotec.ch.Trojan.Zbot1836CH
2014/02/21_05:43www.seal-technicsag.ch/index.zip82.195.224.113gic-web-bsd-013.genotec.ch.Trojan.Zbot1836CH
2014/02/21_05:43www.seal-technicsag.ch/inddex.html82.195.224.113gic-web-bsd-013.genotec.ch.Leads to Trojan.Zbot1836CH
2014/02/21_05:43www.seal-technicsag.ch/inddex.html82.195.224.113gic-web-bsd-013.genotec.ch.Leads to Trojan.Zbot1836CH
2016/03/15_07:55www.schuh-zentgraf.de/81.169.145.160wa0.rzone.de.iframe on compromised site leads to EK6724DE
2016/01/12_08:49www.scantanzania.com/bin/img/make.html64.202.115.199twiga-ip5.tanzaniawebhosting.com.phishing23352US
2015/02/28_14:36www.scanmyphones.com/fatalvirus/mx/101/index.php?countryname=United%20Kingdom&brand=&model=&isp=PlusNet%20Technologies%20Ltd&voluumdata=vid..00000008-5d87-4a50-8000-000000000000__vpid..15af7000-bf52-11e4-8afe-28ca782357aa__caid..b012dd3a-0871-4fc2-a5d8-8f6e6e30c334__lid..281f1d6a-3f5c-4aef-b00d-8178c6d9f00f__rt..D__oid1..14fdf5b9-f153-4ad7-9aec-c61b2432d31e54.209.159.227ec2-54-209-159-227.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2014/06/26_14:27www.sbo.it/babylon.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit, Embedded links leading to illegal pharma8612IT
2014/10/09_13:05www.sasenergia.pt/images/highslide/highslide-with-gallery.js176.221.32.120pplc32120.ciberserver.com.Compromised site leading to exploit8426PT

Page 0 1 ... 22


You can find an overview of downloadable lists here