WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 1 ... 11

Date (UTC)DomainIPReverse LookupDescriptionASN
2010/04/27_06:45z32538.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=2ac11c971204a16811817c725e04d68a44f9d4987c472f66eb08d066.220.17.200-trojan Swizzor6939US
2009/07/01_00:00xoomer.alice.it/email02/bom.jpg62.211.68.12-trojan20580IT
2014/12/03_08:50xicaxique.com.br/catalog/view/theme/default/image/image102.jpg200.219.249.162static.200.219.249.162.datacenter1.com.br.Trojan.Banker.DE16397BR
2009/07/21_00:00www.wigglewoo.com/portfolio/contests/contest-006.png85.13.136.149dd15308.kasserver.com.RFI34788DE
2015/06/02_07:16www.volleyball-doppeldorf.de/templates/blau_weiss/n8jh3wbr.php?id=6071616337.218.254.115c15.webspace-verkauf.de.iframe on compromised site leads to exploit kit45031DE
2015/02/28_14:36www.vipcpms.com/watch?key=e722a8eea048590dd97760d8b657327b&scrWidth=1680&scrHeight=1050&tz=0209.200.44.228trgdbtest.webair.com.Malvertising, Android.FakeAV27257US
2014/12/03_08:50www.super8service.de/zf0yx81.169.145.164wa4.rzone.de.Trojan.Zeus.GO6724DE
2014/02/12_11:08www.studiochiarelli.eu/02-2014/clients/order.3757.zip195.110.124.133opus.register.it.Trojan39729IT
2013/12/20_15:23www.sj88.com/hezi/jm/s1000.exe202.97.174.68-Trojan.Dropper4837CN
2009/12/02_20:32www.sitepalace.com/w0rmreaper/NoVaC.jpeg216.45.58.150-trojan29761US
2015/02/28_14:36www.scanmyphones.com/fatalvirus/mx/101/index.php?countryname=United%20Kingdom&brand=&model=&isp=PlusNet%20Technologies%20Ltd&voluumdata=vid..00000008-5d87-4a50-8000-000000000000__vpid..15af7000-bf52-11e4-8afe-28ca782357aa__caid..b012dd3a-0871-4fc2-a5d8-8f6e6e30c334__lid..281f1d6a-3f5c-4aef-b00d-8178c6d9f00f__rt..D__oid1..14fdf5b9-f153-4ad7-9aec-c61b2432d31e54.209.159.227ec2-54-209-159-227.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2016/01/23_00:46www.proascolcolombia.com/portal/modules/mod_banners/Imprimir_IntimacaoCTI2015-03698541.rar?cli=Cliente&/yRpBKPujKU/nNqRc6QsuO.php190.8.176.235bartolome.colombiahosting.com.co.Trojan.Banload52335CO
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_saggese.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.poesiadelsud.it/rende_16_05_07_napolillo.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2013/08/07_18:57www.over50datingservices.com/wp-stc.php79.170.44.116web116.extendcp.co.uk.Leads to exploit31727GB
2009/08/30_00:00www.oiluk.net/cache/cache_94afbfb2f291e0bf253fcf222e9d238e_180836f9b956ab9d91a50f9add968699188.64.184.32bluechip3.ukhost4u.com.-47625GB
2015/02/28_14:36www.officialrdr.com/b012dd3a-0871-4fc2-a5d8-8f6e6e30c33454.236.134.245ec2-54-236-134-245.compute-1.amazonaws.com.Malvertising, Android.FakeAV14618US
2013/02/11_08:24www.offerent.com/tmp/5lro65.php?receipt_print=825_417011330200.58.119.30texila.dattaweb.com.trojan inside zip file27823AR
2015/05/11_10:05www.motivacionyrelajacion.com/Z0H24k7E6A/50.62.31.207ip-50-62-31-207.ip.secureserver.net.trojan26496US
2012/11/19_18:52www.lyzgs.com/track.php?c005203.158.16.75-redirects to exploit kit17964CN
2013/07/11_12:54www.lowes-pianos-and-organs.com/images/d521c2a038/?zAXbu4Wah12XtNHf0YTNwgTNwIjM0ATMzIDfvgzMwEmMjFjM1Q2LzV2Zh1Wav02bj567.222.109.112d15.altserver.com.ycuF2Zy9WLk5WYtM3buFWaw1ycld3bs5yd3d3LvoDc0RHa8NnZ exploit kit33494US
2017/01/25_20:15www.lifelabs.vn/api/get.php?id=aW5mb0BzYXBjdXBncmFkZXMuY29t118.69.196.199-Trojan.Backdoor, Office.Word.Downloader18403VN
2009/07/21_00:00www.kjbbc.net/bbs/data/gallery/1207290228/inbox.txt112.216.25.75-RFI3786KR
2014/06/26_14:27www.frosinonewesternshow.it/fws2013/calendario.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011/7tappa.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011/213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2011213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.frosinonewesternshow.it/fws2006/3tappa.htm213.205.40.169web-vip-it.eu.tiscali.it.iFrame.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_9540.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0138.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0119.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/06/26_14:27www.fotoidea.com/sport/4x4_san_ponso/slides/IMG_0068.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/11/27_18:24www.email-login-support.com/index-10.html192.186.249.4ip-192-186-249-4.ip.secureserver.net.Browlock.FakeInfection26496US
2013/04/07_09:31www.daspar.net/components/.kkcpgr.php?action=ss00_323176.9.90.164stegro-cos-mpr-200.unaxus.net.Trojan.Krypt24940DE
2013/10/31_18:23www.blueimagen.com/Attachment/Invoice-List2013-10-20-Copy.jar65.99.225.72server79.neubox.net.Trojan.AdWind36024US
2016/06/28_20:52www.alphamedical02.fr/94.23.236.74ns308230.ip-94-23-236.eu.iframe on compromised site leads to EK16276FR
2014/06/26_14:27www.3difx.com/serv010.html213.205.40.169web-vip-it.eu.tiscali.it.Script.Exploit8612IT
2014/03/11_22:39www.0uk.net/zaaqw/Pony.exe178.211.53.17server-178.211.53.17.as42926.net.Trojan.Pony42926TR
2014/03/11_22:39www.0uk.net/zaaqw/cs.exe178.211.53.17server-178.211.53.17.as42926.net.Trojan.Pony42926TR
2014/12/03_08:50wt10.haote.com/jywgxrjzd.exe218.75.155.41-Trojan.Backdoor4134CN
2015/06/02_07:16winsetupcostotome.easthamvacations.info/answered-polynomial-eccentricity-unserviceable/02928771821861481494.242.198.222ip-static-94-242-198-222.server.lu.exploit kit5577LU
2012/07/03_13:17wetjane.x10.mx/69.175.121.66boru.x10hosting.com.Java exploit32475US
2012/11/19_18:52weboxmedia.by/track.php?c00577.222.40.74-redirects to exploit kit44112RU
2009/06/07_00:00webcom-software.ws/links/?153646e8b0a8864.70.19.33mailrelay.33.website.ws.exploits3561US
2015/04/22_15:17web-sensations.com/js/jquery-1.40.15.js192.186.238.40ip-192-186-238-40.ip.secureserver.net.JS.Exploit26496US
2013/07/25_06:19wc0x83ghk.homepage.t-online.de/communed/ameba.js80.150.6.138b2c.t-online.de.redirects to exploit kit3320DE
2010/04/25_06:54w612.nb.host127-0-0-1.com/bins/int/kr3_znp.int?fxp=384bd820008ee37f030b3e65bca6e8a1a65beab33574f567a23b0a987ca83e6544e3e64566.220.17.200-trojan Swizzor6939US
2010/04/27_06:45w4988.nb.host127-0-0-1.com/bins/int/np_pkz.int?affid=NP_0104&fxp=85c26940bd074d9ebe8290842bca496331374b71c3b8806954f77f966.220.17.200-trojan Swizzor6939US
2014/02/07_13:34users173.lolipop.jp/~lolipop.jp-204f9d446b7f9eb/1.html210.157.22.62users173.phy.lolipop.jp.Leads to exploit at jolygoestobeinvester.ru7506JP

Page 0 1 ... 11


You can find an overview of downloadable lists here