This bot is spreading around and is same shit as ngrBot here are commands for this crap Please note that this list only contains the default commands and prefix's, remember your commands and prefix and subsitute it accordingly. @Info - Displays the location from where your bot is running from. @Remove - Fully Removes theRead more...
ohaizor.info(ngrBot hosted in United States Morgantown Sharktech Internet Services)
Resolved : [ohaizor.info] To [204.188.221.156] Remote Host Port Number 199.15.234.7 80 63.223.121.212 80 204.188.221.156 3125 PASS .. PRIVMSG #ngr# :[HTTP]: Updated HTTP spread message to “lmao look at this pic http://areeba.dk/images/?IMG3181.jpg” PRIVMSG #ngr# :[DNS]: Blocked 1259 domain(s) – Redirected 0 domain(s) NICK n{US|XPa}wjhczdd USER wjhczdd 0 0 :wjhczdd JOIN #ngr# ngrBot PRIVMSG #ngr# :[MSN]: UpdatedRead more...
46.105.241.160(aryan bot hosted in United Kingdom Ovh Systems)
Remote Host Port Number 199.15.234.7 80 64.62.181.43 80 65.254.248.151 80 46.105.241.160 6667 PASS none or PASS passwd MODE New{US-XP-x86}8220715 +iMm JOIN #xxARYANxx# styggen JOIN #dl PRIVMSG #dl :[AryaN]: Downloading File: “http://ohnull.fileave.com/worm_crypt.exe” PRIVMSG #dl :[AryaN]: Successfully Downloaded File To: “C:Documents and SettingsUserNameApplication Data187831163825520.exe” PRIVMSG #dl :[AryaN]: Successfully Executed Process: “C:Documents and SettingsUserNameApplication Data187831163825520.exe” NICK New{US-XP-x86}8220715 USERRead more...
hackmeh.net(irc botnet hosted in United Kingdom Ovh Systems)
Resolved : [hackmeh.net] To [46.105.241.149] Remote Host Port Number 46.105.241.149 6667 NICK [USA-XP-x86]35857 USER unreal 8 * :unreal JOIN #Net hosting infos: http://whois.domaintools.com/46.105.241.149
193.106.172.80(Aryan bot hosted in Russian Federation Moscow Iqhost Ltd)
Remote Host Port Number 193.106.172.80 7677 PASS mike777% 199.15.234.7 80 JOIN #xxAryaNxx# mike321 NICK New{US-XP-x86}7648370 USER 7648370 “” “7648370” :7648370 MODE New{US-XP-x86}7648370 +iMm PONG :98DB0CE0 PONG :server.khan hosting infos: http://whois.domaintools.com/193.106.172.80
94.23.162.3(irc botnet hosted in Germany Ovh Systems)
Remote Host Port Number 94.23.162.3 6667 PASS 94.23.162.3 MODE [NESv5][USA|XP|LAN|20966] -ixs JOIN #1 NICK [NESv5][USA|XP|LAN|20966] USER NESv5 * 0 :[NESv5][USA|XP|LAN|20966] hosting infos: http://whois.domaintools.com/94.23.162.3
212.7.203.231(ngrBot hosted in Netherlands Amsterdam Dediserv Dedicated Servers Sp. Z O.o)
Remote Host Port Number 199.15.234.7 80 83.233.33.6 80 212.7.203.231 1866 PASS ngrBot PRIVMSG #!hot! :[DNS]: Blocked 1310 domain(s) – Redirected 0 domain(s) NICK n{US|XPa}msujxop USER msujxop 0 0 :msujxop JOIN #!hot! ngrBot PRIVMSG #!hot! :[HTTP]: Updated HTTP spread interval to “3” PRIVMSG #!hot! :[MSN]: Updated MSN spread interval to “2” PRIVMSG #!hot! :[HTTP]: Updated HTTPRead more...
theblackhat.sdeirc.net(Aryan bot hosted in United Kingdom Ovh Systems)
theblackhat.sdeirc.net DNS_TYPE_A 46.105.241.197 46.105.241.197:3814 Nick: New{FR-XP-x86}1328318 Username: 4178173 Joined Channel: #TheBlackHat with Password cubbie hosting infos: http://whois.domaintools.com/46.105.241.197
184.154.196.186(ngrBot hosted in United States Chicago Singlehop Inc)
Remote Host Port Number 184.154.196.186 1888 PASS strike 199.15.234.7 80 NICK n{US|XPa}urylxsv USER urylxsv 0 0 :urylxsv JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US hosting infos: http://whois.domaintools.com/184.154.196.186
124.232.138.51(ngrBot hosted in China Hunan Chinanet Hunan Province Network)
Remote Host Port Number 124.232.138.51 3800 PASS hax0r 199.15.234.7 80 70.38.98.238 80 PRIVMSG #ng :[DNS]: Blocked 1258 domain(s) – Redirected 0 domain(s) Channel #ng ng00 Channel #us hosting infos: http://whois.domaintools.com/124.232.138.51