WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 1 2 3 ... 22

Date (UTC)DomainIPReverse LookupDescriptionASN
2013/08/07_18:57www.fasadobygg.com/wp-stc.php78.110.82.72host-78-110-82-72.n62.se.Leads to exploit31507SE
2016/10/13_14:03www.family-partners.fr/data.dpg95.142.169.132xvm-169-132.ghst.net.ransomware29169FR
2014/05/27_04:02www.fabioalbini.com/Pay.zip?2bMxG=heidi.kostic@aon.at195.110.150.4net150-004.mclink.it.Trojan.Zbot5396IT
2014/05/27_04:02www.fabioalbini.com/Pay.zip?2bMxG=heidi.kostic195.110.150.4net150-004.mclink.it.Trojan.Zbot5396IT
2014/05/27_04:02www.fabioalbini.com/Pay.zip195.110.150.4net150-004.mclink.it.Trojan.Extension.Exploit5396IT
2014/02/17_10:32www.fabioalbini.com/Order.zip?YIjoBgGhCBbs Trojan.Zbot195.110.150.4net150-004.mclink.it.-5396IT
2014/05/27_04:02www.fabioalbini.com/Order.zip?YIjoBgGhCBbs195.110.150.4net150-004.mclink.it.Trojan.Zbot5396IT
2014/05/27_04:02www.fabioalbini.com/Order.zip?snaVs8Hxk1UBauZlc5pQcGW7195.110.150.4net150-004.mclink.it.Trojan.Zbot5396IT
2014/05/27_04:02www.fabioalbini.com/Order.zip195.110.150.4net150-004.mclink.it.Trojan.Extension.Exploit5396IT
2014/02/18_15:40www.fabioalbini.com/Invoice.zip195.110.150.4net150-004.mclink.it.Trojan.Zbot5396IT
2016/06/23_15:01www.enchantier.com/176.31.73.196www.enchantier.com.iframe on compromised site leads to EK16276FR
2014/05/27_04:02www.emrlogistics.com/fr/to2.exe103.14.120.121103.14.120.121-static-reverse.gooddomainregistry.com.Trojan.Inject132322IN
2014/11/27_18:24www.email-login-support.com/index-10.html192.186.249.4ip-192-186-249-4.ip.secureserver.net.Browlock.FakeInfection26496US
2014/06/26_14:27www.elisaart.it/213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2014/06/26_14:27www.eivamos.com/rimessaggio/carrelliconver.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2015/12/14_22:05www.drteachme.com/wp-content/plugins/theme-check/misc.php198.154.254.250glulife.glulife.com.trojan46606US
2011/01/25_18:09www.downloaddirect.com/software/vlc-player/256767.55.67.250welcome23.webcamclub.com.trojan27257US
2016/05/02_10:23www.donneuropa.it/23.23.85.3ec2-23-23-85-3.compute-1.amazonaws.com.iframe on compromised site leads to EK14618US
2009/12/04_19:56www.doctor-alex.com/files/SetupDrAlex.exe69.89.20.48box48.bluehost.com.Rogue11798US
2016/04/28_07:49www.dezuiderwaard.nl/195.238.74.87www53.totaalholding.nl.iframe on compromised site leads to EK50673NL
2016/04/28_14:52www.del-marine.com/80.244.187.39mail.ebnserver1.com.iframe on compromised site leads to EK34934GB
2013/04/07_09:31www.daspar.net/components/.kkcpgr.php?action=ss00_323176.9.90.164stegro-cos-mpr-200.unaxus.net.Trojan.Krypt24940DE
2014/05/27_04:02www.cortesidesign.com/Avviso.zip213.205.40.169web-vip-it.eu.tiscali.it.Trojan.Zbot8612IT
2014/05/27_04:02www.cortesidesign.com/Avviso.zip213.205.40.169web-vip-it.eu.tiscali.it.Trojan.Inject8612IT
2014/11/27_18:24www.consumeralternatives.org/anti-virus-check.html64.235.60.164lasvegas-nv-datacenter.com.Browlock.FakeInfection26277US
2013/08/07_18:57www.coloritpak.by/wp-stc.php93.125.99.11vh41.hosterby.com.Leads to exploit6697BY
2016/01/21_13:06www.cifor.com/213.186.33.84basic-cdn-01.cluster003.ovh.net.iframe on compromised site leads to EK16276FR
2014/06/26_14:27www.chiaperottipaolo.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2016/02/29_13:00www.cerquasas.it/wp-admin/user/UPS_INVOICE.rar109.168.123.112srv-hs2-112.netsons.net.trojan5602IT
2014/06/26_14:27www.cellularbeton.it/js/jquery.js213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2016/05/24_17:36www.ceisystems.it/178.212.142.108ceisystems.it.iframe on compromised site leads to EK47316IT
2014/06/26_14:27www.catgallery.com/email.htm213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2011/05/30_10:22www.casamama.nl/109.72.86.5nl05.pcextreme.nl.obfuscated iframe on compromised site leads to exploit kit48635NL
2013/10/31_18:23www.blueimagen.com/Attachment/Invoice-List2013-10-20-Copy.jar65.99.225.72server79.neubox.net.Trojan.AdWind36024US
2014/06/26_14:27www.bcservice.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/05/27_04:02www.atousoft.com/img/2.exe88.190.253.247pf7-web.online.net.Spyware.Zbot.VXGen12322FR
2014/06/26_14:27www.assculturaleincontri.it/213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/05/27_04:02www.arkinsoftware.in/images/aveksynkens.exe216.151.164.53shared-hosting.njtech.com.Spyware.Zbot.ED7393US
2016/01/20_12:33www.areadiprova.eu/gardani/80.247.79.174mail.360at.net.compromised site leads to exploit kit12850IT
2014/06/26_14:27www.archigate.it/213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2014/06/26_14:27www.anticarredodolomiti.com/index.html213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2010/04/20_16:20www.angolotesti.it/J/testi_canzoni_jovanotti_168/testo_canzone_chissa_se_stai_dormendo_9566.html174.122.221.186ba.dd.7aae.static.theplanet.com.obfuscated iframe directs to exploits21844US
2016/06/28_20:52www.alphamedical02.fr/94.23.236.74ns308230.ip-94-23-236.eu.iframe on compromised site leads to EK16276FR
2016/05/12_08:36www.airsonett.se193.44.13.93193-44-13-93.net.tnm.se.iframe on compromised site leads to EK3301SE
2016/06/27_12:33www.airbornehydrography.com/194.9.95.65s210.loopia.se.iframe on compromised site leads to EK39570SE
2014/06/26_14:27www.aerreravasi.com/filmestensibile/filmestensibile.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/differenziata/differenziata.html213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/comeraggiungerci/comeraggiungerci.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/chisiamo/chisiamo.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com/bolle/bolle.html213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.aerreravasi.com213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/09/16_09:59www.advancesrl.eu/ukhclcatkr/brcybmsute.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to Upatre31034IT
2014/09/16_09:59www.advancesrl.eu/tjjyeqyfjz/gmiuxfhgsb.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to Upatre31034IT
2014/09/16_09:59www.advancesrl.eu/ryubfrytqb/dkdorvskxe.html62.149.142.94webx328.aruba.it.Compromised site (DHL malspam campaign), leads to Upatre31034IT
2016/03/31_13:34www.actiagroup.com/141.0.187.5-iframe on compromised site leads to EK30741FR
2014/02/21_08:54www.acquisizionevideo.com/download-software-free.html/uploads/4/9/4/6/4946671/mp3mymp3install.exe185.53.177.8-Trojan61969DE
2014/02/07_16:49www.3peaks.co.jp/1.html211.19.24.235usr235.g024.nabic.jp.Leads to exploit at jolygoestobeinvester.ru23641JP
2014/06/26_14:27www.3difx.com/serv010.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.3difx.com213.205.40.169web-vip-it.eu.tiscali.it.JS.Exploit8612IT
2014/03/11_22:39www.0uk.net/zaaqw/Pony.exe178.211.53.17server-178.211.53.17.as42926.net.Trojan.Pony42926TR
2014/03/11_22:39www.0uk.net/zaaqw/cs.exe178.211.53.17server-178.211.53.17.as42926.net.Trojan.Pony42926TR
2015/04/22_15:17wv-law.com/HSBC_STORAGE-DATA/new-secure.payment.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC_BANK_STORAGE/new-payment.document.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC_BANK_DATA/secure_payment.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC.BANK_STORAGE_DATA/new_payment_document.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC.BANK_STORAGE.DATA/secure_payment.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC-BANK-STORAGE.DATA/payment_document.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2015/04/22_15:17wv-law.com/HSBC-BANK-DATA/secure_payment.html160.153.48.70ip-160-153-48-70.ip.secureserver.net.Script.Exploit26496US
2016/08/30_12:25wuvac.agwebdigital.com/dsgajo3.html93.190.140.162customer.worldstream.nl.gateway to EK49981NL
2014/12/03_08:50wt10.haote.com/jywgxrjzd.exe218.75.155.41-Trojan.Backdoor4134CN
2009/06/30_00:00wroclawski.com.pl83.142.47.61www.linux.webserwer.pl.directs to exploits39168PL
2014/05/27_04:02writingassociates.com/img/lks.exe205.186.183.232ekiaioocio.gs07.gridserver.com.Trojan.Agent.ED31815US
2010/04/16_20:16wp9.ru/188.127.248.545.mirit.su.compromised site directs to exploits48172RU
2009/06/07_00:00worldgymperu.com74.54.143.242impulse.websitewelcome.com.directs to exploits21844US
2016/08/26_10:10wopper.bioblitzgaming.ca/pwigd3.html93.190.140.162customer.worldstream.nl.gateway to EK49981NL
2016/01/27_11:21wonchangvacuum.com.my/libraries/pear/mandate.htm103.6.196.156datousaurus.mschosting.com.Phishing46015MY
2016/08/26_16:55womsy.bobbutcher.net/rtuee3.html93.190.140.162customer.worldstream.nl.gateway to EK49981NL
2009/06/30_00:00womenslabour.org83.142.47.61www.linux.webserwer.pl.directs to exploits39168PL
2010/04/16_20:16wmserver.net/sgcg/?page_id=5217.30.180.48virtual22.nebula.fi.compromised site directs to exploits29422FI
2010/04/01_16:14wkmg.co.kr/bbs/lib/1.txt218.38.243.71-RFI17845KR
2016/08/26_11:55wixx.caliptopis.cl/lwwxx3.html93.190.140.162customer.worldstream.nl.gateway to EK49981NL
2015/06/02_07:16winsetupcostotome.easthamvacations.info/answered-polynomial-eccentricity-unserviceable/02928771821861481494.242.198.222ip-static-94-242-198-222.server.lu.exploit kit5577LU
2014/02/19_01:05winrar-soft.ru/download.php?file=winrar103.31.186.207103.31.186.207.reserved.voxility.com.Win32/Injector.AYAH39743HK
2014/02/19_01:05winrar-soft.ru103.31.186.207103.31.186.207.reserved.voxility.com.Win32/Injector.AYAH39743HK
2012/11/27_10:18winlock.usa.cc/k8uiaii89819aj/get.php?f=7109.163.231.219lh20422.voxility.net.backdoor39743RO
2013/08/30_07:38windspotter.net/?r=site/widget178.63.73.213static.213.73.63.178.clients.your-server.de.compromised site leads to Java exploit24940DE
2014/12/17_21:01whitehorsetechnologies.net/images/clients/x/mail.php208.91.199.150bh-7.webhostbox.net.Destination of banking phishing19905VG
2015/04/22_15:17whave.iptvdeals.com/panoowyxoz/oazicmitov/ptampordap/files/46.30.42.74veronikalife.ru.VBS.Trojan.Downloader35415RU
2015/04/22_15:17whabi.csheaven.com/ehetsusywh/yglegrehee/jitypsewhy/files/46.30.42.74veronikalife.ru.VBS.Trojan.Downloader35415RU
2009/08/12_00:00wfoto.front.ru/fotos.com194.186.88.45ftp.front.ru.trojan Banload3216RU
2015/04/22_15:17wetyt.tourstogo.us/shissashee/abekekurdi/oagrusteel/files/176.31.28.226-VBS.Trojan.Downloader16276FR
2012/07/03_13:17wetjane.x10.mx/69.175.121.66boru.x10hosting.com.Java exploit32475US
2016/06/29_08:48websitebuildersinfo.in166.62.28.83ip-166-62-28-83.ip.secureserver.net.fake infection page26496US
2010/02/01_11:14websalesusa.com/ken208.112.22.66-RFI20021US
2012/11/19_18:52weboxmedia.by/track.php?c00577.222.40.74-redirects to exploit kit44112RU
2012/12/26_19:46webordermanager.com98.124.199.1redirector-sjl.enom.com.Redirects to exploit21740US
2009/06/07_00:00webcom-software.ws/links/?153646e8b0a8864.70.19.33mailrelay.33.website.ws.exploits3561US
2009/07/21_00:00webcashmaker.com/v2/members/trade_traffic.php74.206.224.180-RFI27257US
2015/04/22_15:17web-sensations.com/js/jquery-1.40.15.js192.186.238.40ip-192-186-238-40.ip.secureserver.net.JS.Exploit26496US
2009/06/25_00:00web-olymp.ru81.176.232.104server4.neoweb.ru.directs to exploits8342RU

Page 0 ... 1 2 3 ... 22


You can find an overview of downloadable lists here