server 46.105.241.186:4201 found by _char hosting infos: http://whois.domaintools.com/46.105.241.186
193.106.172.80(irc botnet hosted in Russian Federation Moscow Iqhost Ltd)
server 193.106.172.80:7677 u have to find password to conect here chanel #xxAryaNxx# found by _char hosting infos: http://whois.domaintools.com/193.106.172.80
202.170.120.137(irc botnet hosted in Thailand Bangkok Proen Internet Internet Service Provider Bangkok Thailand)
server 202.170.120.137:4502 (Chanel: ##net) found by _char hosting infos: http://whois.domaintools.com/202.170.120.137
67.20.27.189(irc botnet hosted in United States Atlanta Fidelity Communication International Inc)
Ip 67.20.27.189 Port 8080 Nick ijJwtoxFq User yxihFekFB Channel ##+ this net is found by _char hosting infos: http://whois.domaintools.com/67.20.27.189
204.93.169.243(ngrBot hosted in United States San Jose Mochanin Corp)
Remote Host Port Number 199.15.234.7 80 204.93.169.243 1589 PASS 44640151 NICK n{US|XPa}xhuxjav USER xhuxjav 0 0 :xhuxjav PONG :8D10E066 JOIN #rndbot zrag hosting infos: http://whois.domaintools.com/204.93.169.243
Fubar the ngrBot creator hacking through RFI
This is fubar the ngrBot creator “made from scratch” #!/usr/bin/perl #system 'cd /tmp;rm -rf *'; # # PitBull Bot V5 PRiVaTE Sh3llBoT # # Last edited : 25/2/2008 # #[@[PitBull Bot V5 Commands List]@] #[@-----[Shellbot/Hacking Based]-----@] #!bot @admins #!bot @spread <rfi> #!bot @milw0rm #!bot @packetstorm #!bot @portscan <host> #!bot @logcleaner #!bot @md5 <hash> #!bot @sendmailRead more...
112.203.74.66(irc botnet hosted in Philippines Manila Pldt_mgoc10ki01_dhcp)
Remote Host Port Number 112.203.74.66 4244 PASS google_cache2.tmp 174.121.14.164 80 195.210.28.38 80 195.250.147.177 80 195.72.135.25 80 204.2.197.201 80 208.43.218.81 80 209.17.74.144 80 66.115.184.85 80 66.115.184.87 80 66.94.241.1 80 195.72.135.25 443 NICK new[iRooT-XP-USA]913396 USER 9133 “” “TsGh” :9133 JOIN #!N!# WTF PRIVMSG #!N!# :http://kajmak1.bloger.hr Has Been Visited! hosting infos: http://whois.domaintools.com/112.203.74.66
sparkles.no-ip.org(irc botnet hosted in COLOMBIA TELECOMUNICACIONES S.A. ESP)
Resolved : [sparkles.no-ip.org] To [190.68.67.187] sparkles.no-ip.org:6667 NICK ScAry4610520 USER krcdlijt 0 0 :ScAry4610520 USERHOST ScAry4610520 MODE ScAry4610520 +xi JOIN ##!misc fudude NOTICE ScAry4610520 :.VERSION eggdrop v1.6.20. PRIVMSG ##!misc :..m..ain …. Status: Ready. Bot Uptime: 0d 0h 0m. PRIVMSG ##!misc :..m..ain …. Bot ID: cyber. PRIVMSG ##!misc :..s..can …. Exploit Statistics: ASN.1-HTTP: 0, ASN.1-SMB: 0, ASN.1-SMBRead more...
Conversation between 2 hf botnet owners (one of them is used to be big big coder/seller of bots lol)
I had alot of fun reading this conversation this shit cant stay private i mean no way is to high level of hecking hahahah Unusable mIRCz 12:58 am (12:58:15 AM): I just got on to Jam3s’s server, it was on threat expert, he has the updated NgRbot tUSnipas 1:01 am (1:01:16 AM): lol. Unusable mIRCzRead more...
62.212.88.15(irc botnet hosted in Netherlands Nijmegen Leaseweb B.v)
Remote Host Port Number 62.212.88.15 5858 PASS cidayx10 NICK n{Ganja-USA|XP}044508 USER 0445 “” “TsGh” :0445 JOIN #ganj cidayx PONG :HTTP1.4 hosting infos: http://whois.domaintools.com/62.212.88.15