Remote Host Port Number 199.15.234.7 80 204.93.169.243 1589 PASS 44640151 NICK n{US|XPa}xhuxjav USER xhuxjav 0 0 :xhuxjav PONG :8D10E066 JOIN #rndbot zrag hosting infos: http://whois.domaintools.com/204.93.169.243
Fubar the ngrBot creator hacking through RFI
This is fubar the ngrBot creator “made from scratch” #!/usr/bin/perl #system 'cd /tmp;rm -rf *'; # # PitBull Bot V5 PRiVaTE Sh3llBoT # # Last edited : 25/2/2008 # #[@[PitBull Bot V5 Commands List]@] #[@-----[Shellbot/Hacking Based]-----@] #!bot @admins #!bot @spread <rfi> #!bot @milw0rm #!bot @packetstorm #!bot @portscan <host> #!bot @logcleaner #!bot @md5 <hash> #!bot @sendmailRead more...
112.203.74.66(irc botnet hosted in Philippines Manila Pldt_mgoc10ki01_dhcp)
Remote Host Port Number 112.203.74.66 4244 PASS google_cache2.tmp 174.121.14.164 80 195.210.28.38 80 195.250.147.177 80 195.72.135.25 80 204.2.197.201 80 208.43.218.81 80 209.17.74.144 80 66.115.184.85 80 66.115.184.87 80 66.94.241.1 80 195.72.135.25 443 NICK new[iRooT-XP-USA]913396 USER 9133 “” “TsGh” :9133 JOIN #!N!# WTF PRIVMSG #!N!# :http://kajmak1.bloger.hr Has Been Visited! hosting infos: http://whois.domaintools.com/112.203.74.66
sparkles.no-ip.org(irc botnet hosted in COLOMBIA TELECOMUNICACIONES S.A. ESP)
Resolved : [sparkles.no-ip.org] To [190.68.67.187] sparkles.no-ip.org:6667 NICK ScAry4610520 USER krcdlijt 0 0 :ScAry4610520 USERHOST ScAry4610520 MODE ScAry4610520 +xi JOIN ##!misc fudude NOTICE ScAry4610520 :.VERSION eggdrop v1.6.20. PRIVMSG ##!misc :..m..ain …. Status: Ready. Bot Uptime: 0d 0h 0m. PRIVMSG ##!misc :..m..ain …. Bot ID: cyber. PRIVMSG ##!misc :..s..can …. Exploit Statistics: ASN.1-HTTP: 0, ASN.1-SMB: 0, ASN.1-SMBRead more...
Conversation between 2 hf botnet owners (one of them is used to be big big coder/seller of bots lol)
I had alot of fun reading this conversation this shit cant stay private i mean no way is to high level of hecking hahahah Unusable mIRCz 12:58 am (12:58:15 AM): I just got on to Jam3s’s server, it was on threat expert, he has the updated NgRbot tUSnipas 1:01 am (1:01:16 AM): lol. Unusable mIRCzRead more...
62.212.88.15(irc botnet hosted in Netherlands Nijmegen Leaseweb B.v)
Remote Host Port Number 62.212.88.15 5858 PASS cidayx10 NICK n{Ganja-USA|XP}044508 USER 0445 “” “TsGh” :0445 JOIN #ganj cidayx PONG :HTTP1.4 hosting infos: http://whois.domaintools.com/62.212.88.15
109.169.64.135(ngrBot hosted in United States Amsterdam Rapidswitch Ltd)
Remote Host Port Number 109.169.64.135 7777 PASS laekin0505x 199.15.234.7 80 NICK n{US|XPa}gdaslcv USER gdaslcv 0 0 :gdaslcv JOIN #totalrenovation2011 ngrBot hosting infos: http://whois.domaintools.com/109.169.64.135
luis-vuitton-elite.com(Trojan.Win32.Bredolab hosted in Germany Gunzenhausen Hetzner Online Ag)
Resolved : [luis-vuitton-elite.com] To [46.4.115.205] Resolved : [luis-vuitton-elite.com] To [46.4.115.204] Resolved : [luis-vuitton-elite.com] To [46.4.91.233] Remote Host Port Number 46.4.115.204 1001 46.4.115.205 1001 46.4.91.233 1001 46.4.115.204 1002 65.54.188.94 25 Exe sample :http://adf.ly/2Rw9m hosting infos: http://whois.domaintools.com/46.4.115.205
ngrBot Commands
Since ngrBot is now the bot for every hecker i m posting commands and let u know what this shit bot does ngrBot Commands Note: parameters within “[” and “]” are required, and parameters within “” are optional. !dl [url] The bot downloads and executes a file from the specified URL. Parameters url URL ofRead more...
92.241.164.84(ngrBot hosted in Russian Federation Moscow Oao Webalta)
Remote Host Port Number 199.15.234.7 80 217.174.203.4 80 92.241.164.84 6969 PASS ngrBot NICK n{US|XPa}rtiotgm USER rtiotgm 0 0 :rtiotgm JOIN ##cybercenter## ngrBot PRIVMSG ##cybercenter## :[DNS]: Blocked 0 domain(s) – Redirected 2 domain(s) hosting infos: http://whois.domaintools.com/92.241.164.84