WARNING: All domains on this website should be considered dangerous. If you do
not know what you are doing here, it is recommended you leave right away. This
website is a resource for security professionals and enthusiasts.
Search: Results to return: Include inactive sites

Page 0 ... 279 280 281 ... 1814

Date (UTC)DomainIPReverse LookupDescriptionASN
2009/06/19_00:00v4mq6.cn75.125.215.61--21844US
2010/04/20_16:20v3rsus.eu/_/index.php95.110.197.242host242-197-110-95.serverdedicati.aruba.it.CRiMEPACK v2.8.1, payload SpyEye31034IT
2010/04/20_16:20v3rsus.eu/_/admin.php95.110.197.242host242-197-110-95.serverdedicati.aruba.it.control panel of CRiMEPACK v2.8.131034IT
2010/05/29_17:53v3p2.com/index1.html174.139.86.250174.139.86.250.CUSTOMER.KRYPT.COM.86.139.174.in-addr.arpa.exploits4213US
2011/05/01_15:29v1ru5.co.cc/gate.php46.243.9.16-zeus v2 drop zone51852CY
2011/05/01_15:29v1ru5.co.cc/config.bin46.243.9.16-zeus v2 config file51852CY
2011/05/01_15:29v1ru5.co.cc/bot.exe46.243.9.16-zeus v2 trojan51852CY
2009/04/09_00:00v0id.cn/info/inbox.exe216.108.235.21serverpoint.comzeus v1 (non-RC4) trojan26277US
2009/04/09_00:00v0id.cn/info/cfg.bin216.108.235.21serverpoint.comzeus v1 (non-RC4) config file26277US
2009/06/19_00:00v057x.cn74.55.136.200c8.88.374a.static.theplanet.comredirects to Fake Antivirus21844US
2010/04/16_11:21v00d00.org/nod32/grabber.exe79.135.152.2727.152.135.79.microlines.lv.password stealing trojan2588LV
2010/01/30_17:37v00d00.org/download/index.php94.75.229.140psytrance.project.li.Liberty exploit kit16265NL
2010/01/30_17:37v00d00.org/download/download.php?expid=6&fid=194.75.229.140psytrance.project.li.-16265NL
2010/01/30_17:37v00d00.org/download/admin.php94.75.229.140psytrance.project.li.control panel of Liberty exploit kit16265NL
2011/10/02_13:51v.zappia.sites.uol.com.br/3natela.txt200.147.1.41200-147-1-41.static.uol.com.br.trojan Banker7162BR
2011/10/02_13:51v.zappia.sites.uol.com.br/1bandeira.txt200.147.1.41200-147-1-41.static.uol.com.br.trojan Banker7162BR
2013/07/22_11:48v.inigsplan.ru/lich/inc/v7675/?/90.156.212.70v7675.vps.masterhost.ru.redirects to Postbank phishing25532RU
2009/03/09_00:00v.bfgr5.cn/01/all.htm121.10.104.40-exploits/trojan4134CN
2009/04/30_00:00v-state.com/pool/?t=1212.117.185.40ip-212-117-185-40.server.luLuckysploit44042LU
2009/03/10_00:00v-security.info/alla91.193.108.239-Luckysploit-GB
2010/02/23_18:59v-murmanske.ru/zs/gate.php94.125.90.164h94-125-90-164.nettrans.ru.zeus v1 drop zone39660RU
2010/02/23_18:59v-murmanske.ru/zs/cfg.bin94.125.90.164h94-125-90-164.nettrans.ru.zeus v1 config file39660RU
2010/02/23_18:59v-murmanske.ru/zs/bot.exe94.125.90.164h94-125-90-164.nettrans.ru.zeus v1 trojan39660RU
2009/07/18_00:00v-i-e-w.net/xrun.tmp85.17.162.21785.17.162.217.trojan16265NL
2010/04/29_08:08uzunlu.net/media/loader.exe213.142.141.85213-142-141-085.reverse.adeox.com.trojan Cutwail16265TR
2010/04/29_08:08uzunlu.net/media/ast.exe213.142.141.85213-142-141-085.reverse.adeox.com.trojan16265TR
2011/03/10_23:37uzugonop.com/yusnu767hw.php?s=IBBAA213.239.213.219213-239-213-219.clients.your-server.de.Phoenix exploit kit24940DE
2011/03/10_23:37uzugonop.com/uoz.php?i=2213.239.213.219213-239-213-219.clients.your-server.de.TDSS downloader24940DE
2009/11/15_14:07uzudyfuhyw.lookseekpages.com/ojulozi.html192.41.60.10www1.0catch.com.redirects to exploits13951US
2009/11/15_14:07uzovobyf.digitalzones.com/anusany.html192.41.60.10www1.0catch.com.redirects to exploits13951US
2012/09/28_18:22uzoshkins.ru:8080/forum/links/column.php190.10.14.196cb9.creationsbank.com.Blackhole exploit kit 2.03790CR
2011/07/25_12:49uzmhpsjsrgrsmxq.org/news/?s=195341173.244.195.193173.244.195.193.static.midphase.com.Zeus config36351US
2011/07/30_18:04uzkrtoomtnjpohn.com/news/?s=195341173.255.237.159li247-159.members.linode.com.Zeus config8001US
2009/11/15_14:07uziwutege.virtue.nu/leqasesu.html192.41.60.10www1.0catch.com.redirects to exploits13951US
2012/06/05_13:55uzindexation.ru:8080/forum/w.php?f=182b5&e=2187.85.160.106-trojan28343BR
2012/06/05_13:55uzindexation.ru:8080/forum/showthread.php?page=5fa58bce769e5c2c187.85.160.106-Blackhole exploit kit28343BR
2009/09/19_00:00uzehayb.cn/in.cgi?9&tsk=&type=l&seoref=meter=$keyword&se=$se&ur=1&HTTP_REFERER=&default_keyword=XXX213.133.100.58static.213-133-100-58.clients.your-server.de.redirects to rogue24940DE
2010/11/14_19:25uzbekius20.ipq.co/office/e53d68e007fd45c2fccb502f2e7ccad5.php?u=47&s=48194429&c=47&195.54.162.126-trojan29632UA
2010/11/14_19:25uzbekius20.ipq.co/office/47195.54.162.126-exploit kit29632UA
2012/07/31_20:00uzanotomotiv.com.tr/28393467.html188.124.16.235mail.yildizlar.biz.Redkit exploit kit44565TR
2010/08/23_12:38uyyuyy.in/retn/n0520zhww2/po72ley9.php?s=7712058f1dbfa7e428adbf129f5fba3f109.196.134.33-exploit kit39150UA
2010/08/23_12:38uyyuyy.in/retn/n0520zhww2/euux35hw.php?spl=mdac&fh=109.196.134.33-trojan downloader small / gets trojan SpyEye39150UA
2011/02/24_21:30uywdbhewbd.com76.76.103.50reverse-mtl-76-76-103-50.gogax.com.fake AV21793CA
2009/11/03_21:46uyuoo.cn/new/a/zs5.bin210.51.166.235-zeus v1 config file9929CN
2010/03/28_21:08uytrec.cn/games/update.php58.23.64.207-zeus v1 drop zone4837CN
2010/03/30_09:59uytrec.cn/games/update.bla203.174.83.98203-174-83-98.rev.ne.com.sg.zeus v1 config file38001SG
2011/07/29_12:54uyqstrhisolqwq.com/news/?s=19534174.91.19.32-Zeus config32097US
2009/09/13_00:00uygarreklam.dnsalias.net:808070.85.241.242f2.f1.5546.static.theplanet.com.compromised server with nginx at port 808021844US
2010/02/02_18:06uyerfbvo.cn/primo/numo.bin195.78.108.150-zeus v1 config file49544CZ
2010/02/02_18:06uyerfbvo.cn/primo/maibotiii.php195.78.108.150-zeus v1 drop zone49544CZ

Page 0 ... 279 280 281 ... 1814


You can find an overview of downloadable lists here