WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 0 1 2 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2010/04/16_20:16www.sanseracingteam.com/wordpress/?p=12885.10.140.251wpc4811.host7x24.com.compromised site directs to exploits48185FR
2010/04/16_20:16www.sanseracingteam.com/wordpress/85.10.140.251wpc4811.host7x24.com.compromised site directs to exploits48185FR
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip?mscfopoysckwdh202.224.60.77www.sankyo.gr.jp.Trojan.Zbot4685JP
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip?IIFEhTaalZlzYipWok202.224.60.77www.sankyo.gr.jp.Trojan.Zbot4685JP
2014/05/27_04:02www.sankyo.gr.jp/Pagamento.zip202.224.60.77www.sankyo.gr.jp.Trojan.Extension.Exploit4685JP
2016/06/20_14:33www.salentoeasy.it/95.110.189.62host62-189-110-95.serverdedicati.aruba.it.iframe on compromised site leads to EK31034IT
2013/08/07_18:57www.saemark.is/wp-content/plugins/wp-sts.php212.30.229.50-Leads to exploit44515IS
2013/06/20_11:20www.rooversadvocatuur.nl/rel.php83.172.140.27ns1.securenameserver5.net.redirects to exploit kit25459NL
2016/05/05_18:09www.roltek.com.tr/94.73.151.594-73-151-5.cizgi.net.tr.iframe on compromised site leads to EK34619TR
2014/05/27_04:02www.rokus-tgy.hu/Pagamento.zip?IdjJzMrNmz195.70.32.145virtweb2.interware.hu.Trojan.Zbot5588HU
2014/05/27_04:02www.rokus-tgy.hu/Pagamento.zip195.70.32.145virtweb2.interware.hu.Trojan.Extension.Exploit5588HU
2014/06/26_14:27www.ristoromontebasso.it/scripts/menu.js213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.riccardochinnici.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2010/02/02_08:40www.rempko.sk/kontakt.htm213.81.152.60wep.t-com.sk.compromised site directs to exploits6855SK
2013/07/11_07:25www.rebeccacella.com/wp-content/plugins/subscribe/212.227.31.159kundenserver.de.compromised site leads to exploit kit8560DE
2009/06/10_00:00www.realinnovation.com/css/menu.js67.202.87.234ip234.67-202-87.static.steadfast.net.redirects to exploits32748US
2014/06/26_14:27www.racingandclassic.com/pagineit/race.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2009/11/15_16:09www.purplehorses.net/?page=bleach-244-online69.89.19.20019-200.bluehost.com.redirects to Rogue if referer is a search engine11798US
2009/07/11_00:00www.propan.ru/forum/downloads.php89.111.177.27fe91-1.hc.ru.RFI41126RU
2016/01/19_11:30www.profill-smd.com/77.55.57.113acf113.rev.netart.pl.compromised site leads to exploit kit15967PL
2009/09/16_00:00www.professionalblackbook.com/96.30.28.181host.disantolaw.com.obfuscated iframe directs to exploits19066US
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2013/08/07_18:57www.praxisww.com/wp-stc.php69.26.171.30webprecision.com.Leads to exploit27524US
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_saggese.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_napolillo.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.poesiadelsud.it/mostra_internazionale_artecont_1.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2016/02/01_13:14www.pieiron.co.uk/146.185.29.100www6.grakka.net.iframe on compromised site leads to EK29302GB
2016/08/13_10:47www.pgathailand.com/which.exe128.199.127.7pyptech.net.Trojan.P0ny133165GB
2014/03/23_10:15www.petpleasers.ca/templates/rhuk_milkyway/images/red/sll.exe66.49.201.136-Trojan.Dropper33139CA
2012/08/30_06:59www.perupuntocom.com/claroideas.exe68.178.254.187p3slh042.shr.phx3.secureserver.net.trojan26496US
2012/06/19_07:03www.panazan.ro/online/libraries/pattemplate/patTemplate/Modifier/HTML/im/o/z/3pingo/gate.php89.42.216.47server20.whmpanels.com.zeus drop zone5606RO
2012/06/19_07:03www.panazan.ro/online/libraries/pattemplate/patTemplate/Modifier/HTML/im/o/z/3pingo/cfg.bin89.42.216.47server20.whmpanels.com.zeus config file5606RO
2013/08/07_18:57www.over50datingservices.com/wp-stc.php79.170.44.116web116.extendcp.co.uk.Leads to exploit31727GB
2016/05/10_07:18www.outlinearray.com/85.235.130.71w461.widhost.net.iframe on compromised site leads to EK31034IT
2016/01/12_10:08www.ostsee-schnack.de/80.67.28.137dgws10s3-1-5db.ispgateway.de.compromised site leads to exploit kit34011DE
2009/08/30_00:00www.oiluk.net/cache/cache_94afbfb2f291e0bf253fcf222e9d238e_180836f9b956ab9d91a50f9add968699188.64.184.32bluechip3.ukhost4u.com.-47625GB
2009/11/15_16:09www.ohiomm.com/?page=bleach-244-vosta74.220.219.67box467.bluehost.com.redirects to Rogue if referer is a search engine11798US
2015/02/28_14:36www.officialrdr.com/b012dd3a-0871-4fc2-a5d8-8f6e6e30c33454.236.134.245ec2-54-236-134-245.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2013/02/11_08:24www.offerent.com/tmp/5lro65.php?receipt_print=825_417011330200.58.119.30texila.dattaweb.com.trojan inside zip file27823AR
2009/08/15_00:00www.obyz.de/webproxytest.txt85.13.138.226dd18438.kasserver.com.RFI34788DE
2016/06/17_12:10www.nuvon.com/64.207.96.72-iframe on compromised site leads to EK11598US
2014/02/07_13:34www.nothingcompares.co.uk/1.html82.165.204.223kundenserver.de.Leads to exploit at jolygoestobeinvester.ru8560DE
2014/02/18_15:40www.notaverde.com/Invoice.zip205.236.147.30www2.securenet.net.Trojan.Zbot14112CA
2016/05/30_11:34www.northpoleitalia.it/46.37.11.7host7-11-37-46.serverdedicati.aruba.it.iframe on compromised site leads to EK
2013/09/12_05:43www.moviedownloader.net/d/GraboidMovieDownloader-3.54.exe64.20.45.228-Adware.Fusenet19318UNKNOWN
2015/05/11_10:05www.motivacionyrelajacion.com/Z0H24k7E6A/50.62.31.207ip-50-62-31-207.ip.secureserver.net.trojan26496US
2014/06/26_14:27www.montacarichi.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2015/07/20_18:46www.mondoperaio.net/wp-content/plugins/cached_data/k1.exe62.149.144.66webx544.aruba.it.Trojan.P0ny31034IT
2014/06/26_14:27www.milardi.it/corteconti.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.milardi.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/04/29_08:25www.marss.eu/95.110.133.212host212-133-110-95.serverdedicati.aruba.it.obfuscated Javascript leads to fake flash player site31034IT
2014/06/26_14:27www.marinoderosas.com/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2011/07/31_19:47www.makohela.tk/kingofthelamers.jar72.20.53.34server9020.alkareklam.com.java exploit25761US
2014/07/15_07:26www.m-barati.de/contao/count.php?id=421324594.101.38.14three.rr1.revido.de.leads to exploit kit16097DE
2012/11/19_18:52www.lyzgs.com/track.php?c005203.158.16.75-redirects to exploit kit17964CN
2016/07/18_17:31www.luce.polimi.it/it/131.175.187.208web193.asict.polimi.it.iframe on compromised site leads to EK137IT
2013/07/11_12:54www.lowes-pianos-and-organs.com/images/d521c2a038/?zAXbu4Wah12XtNHf0YTNwgTNwIjM0ATMzIDfvgzMwEmMjFjM1Q2LzV2Zh1Wav02bj567.222.109.112d15.altserver.com.ycuF2Zy9WLk5WYtM3buFWaw1ycld3bs5yd3d3LvoDc0RHa8NnZ exploit kit33494US
2013/12/03_08:36www.lostartofbeingadame.com/wp-content/plugins/www.fotosupload.php70.88.182.38-redirects to trojan download7725US
2013/08/07_18:57www.litra.com.mk/wp-sts.php98.130.102.2rev.opentransfer.com.2.102.130.98.in-addr.arpa.Leads to exploit32392US
2017/01/25_20:15www.lifelabs.vn/api/get.php?id=aW5mb0BzYXBjdXBncmFkZXMuY29t118.69.196.199-Trojan.Backdoor, Office.Word.Downloader18403VN
2014/02/07_10:24www.lccl.org.uk/1.html67.231.249.62s62.EXCALIBURHOST.COM.Leads to exploit at jolygoestobeinvester.ru40244US
2009/07/21_00:00www.kjbbc.net/bbs/data/gallery/1207290228/inbox.txt112.216.25.75-RFI3786KR
2011/02/02_18:13www.kcta.or.kr/js/json.js210.109.97.193193.0-255.97.109.210.in-addr.arpa.obfuscated iframe leads to exploit9848KR
2013/08/07_18:57www.joomlalivechat.com/wp-stc.php174.129.234.86ec2-174-129-234-86.compute-1.amazonaws.com.Leads to exploit14618US
2016/08/09_20:02www.jcmarcadolib.com/hbc/a.php82.221.129.16esja.orangewebsite.com.phishing50613IS
2011/09/12_18:49www.infra.by/conflq.php91.149.157.133vh16.hoster.by.obfuscated iframe leads to exploit kit6697BY
2016/03/03_10:17www.inevo.co.il/212.199.114.168mx.standingdesk.co.il.iframe on compromised site leads to EK9116IL
2016/02/29_07:14www.icybrand.eu/pathway/created/accelerated/mailuserlg/savealife/trwrwbejtw/viewer.php192.185.194.21ns387.websitewelcome.com.Phishing20013US
2016/02/29_07:14www.icybrand.eu/pathway/created/accelerated/mailuserlg/savealife/trwrwbejtw.zip192.185.194.21ns387.websitewelcome.com.Phishing20013US
2009/07/24_00:00www.hospedar.xpg.com.br/nome.txt200.149.77.224-RFI7738BR
2017/03/06_21:09www.hjaoopoa.top/admin.php?f=1.gif52.207.234.89ec2-52-207-234-89.compute-1.amazonaws.com.Cerber ransomware14618US
2015/12/26_15:34www.hitekshop.vn/login.php112.78.2.101mb2d101.vdrs.net.Keybase keylogger web panel45538VN
2013/08/07_18:57www.hausnet.ru/wp-stc.php188.191.224.17ks17.hausnet.ru.Leads to exploit197624RU
2016/02/29_13:00www.gold-city.it/image/_vti_cnf/app/psi.exe31.11.33.82websn2s072.aruba.it.trojan31034IT
2014/04/02_08:53www.gmcjjh.org/DHL198.252.70.200stats.green.mysitehosted.com.Document.zip Trojan.Kryptic36351US
2014/06/26_14:27www.gliamicidellunicef.it/skiantos_in_concerto.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2016/06/27_08:07www.gennaroespositomilano.it/75.126.217.36web234.webfaction.com.iframe on compromised site leads to EK36351US
2016/01/18_14:18www.gasthofpost-ebs.de/81.169.251.136h2402507.stratoserver.net.iframe on compromised site leads to EK6724DE
2010/11/26_17:33www.gameangel.com/System/html/js/html.js121.156.126.10-iframe directs to exploit4766KR
2014/06/26_14:27www.galileounaluna.com/213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2016/06/21_10:21www.fsm-europe.eu/79.96.162.106cloudserver092054.home.net.pl.iframe on compromised site leads to EK12824PL
2014/06/26_14:27www.frosinonewesternshow.it/fws2013/calendario.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011/7tappa.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011/213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2006/3tappa.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2009/07/21_00:00www.freewebtown.com/atakus/Nokia/BotNetNew.txt208.75.230.43www.freewebtown.com.RFI36820US
2014/05/12_00:24www.freemao.com/pics/file.ecr195.110.150.4net150-004.mclink.it.Spyware.ZeuS.GO5396IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9597.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9551.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9540.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9445.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9378.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0138.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0119.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0068.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/05/27_04:02www.flowtec.com.br/vcard/Informazioni.zip200.195.192.45jurere.onda.com.br.Trojan.Zbot12140BR
2014/05/27_04:02www.flowtec.com.br/vcard/Informazioni.zip200.195.192.45jurere.onda.com.br.Trojan.Extension.Exploit12140BR
2016/06/24_12:43www.fiocchidiriso.com/81.31.147.98jmhlmd43.colt-engine.it.iframe on compromised site leads to EK47242IT

Page 0 ... 0 1 2 ... 22


You can find an overview of downloadable lists here