0 Members and 1 Guest are viewing this topic.
Have DirectI returned to old form again, or is this just a coincidence?http://msmvps.com/blogs/spywaresucks/archive/2009/07/22/1704910.aspxThe screenshot above left, shows a domain used in an exploit campaign, registered via DirectI. Then of course, there's this lot (all exploit domains so DO NOT LOAD IN A BROWSER!), all of which resolve to:IP: 78.47.25.168PTR: static.168.25.47.78.clients.your-server.deDesc: FastVPS Ltd, St Petersburg, Russia