Remote Host Port Number 213.251.170.52 80 72.55.132.187 2603 PASS ngrBot 78.47.10.199 21 NICK n{US|XPa}hjcbvjl USER hjcbvjl 0 0 :hjcbvjl JOIN #phcrulez ngrBot USER adi hosting infos: http://whois.domaintools.com/72.55.132.187
173.246.100.120(irc botnet hosted in United States Baltimore Gandi Us Inc)
Remote Host Port Number 173.246.100.120 8888 PASS ngrBot 213.251.170.52 80 PRIVMSG #spread :[MSN]: Updated MSN spread interval to “3” PRIVMSG #spread :[MSN]: Updated MSN spread message to “.” PRIVMSG #spread :[HTTP]: Updated HTTP spread interval to “5” PRIVMSG #spread :[HTTP]: Updated HTTP spread message to “.” JOIN #special NICK n{US|XPa}phessck USER phessck 0 0 :phessckRead more...
brainbox.dyndns.org(irc botnet hosted in United States Sparta Ispsystem At Nac)
Remote Host Port Number 213.186.33.87 80 82.146.51.173 4598 NICK n[XP-USA]855437 PONG 422 PRIVMSG ##Channel## : 09Executed Process Successfully. USER 8554 “” “TsGh” :8554 JOIN ##Channel3## PRIVMSG ##Channel3## : NICK [XP-USA]561757 USER 5617 “” “TsGh” :5617 JOIN ##Channel## hosting infos: http://whois.domaintools.com/82.146.51.173
72.20.14.87(irc botnet hosted in United States Staminus Communications)
Remote Host Port Number 72.20.14.87 38 JOIN #Internet# hosting infos: http://whois.domaintools.com/72.20.14.87
64.202.107.28(irc botnet hosted in United States Chicago Hostforweb Inc)
Remote Host Port Number 64.202.107.28 2345 NICK New[USA|00|P|90973] USER XP-0539 * 0 :COMPUTERNAME MODE New[USA|00|P|90973] -ix JOIN #!loco! PONG 22 MOTD hosting infos: http://whois.domaintools.com/64.202.107.28
75.102.22.20(irc botnet hosted in United States Chicago Hostforweb Inc)
Remote Host Port Number 75.102.22.20 2345 NICK New[USA|00|P|90973] USER XP-0539 * 0 :COMPUTERNAME MODE New[USA|00|P|90973] -ix JOIN #!loco! PONG 22 MOTD hosting infos: http://whois.domaintools.com/75.102.22.20
67.210.170.142(irc botnet hosted in Canada Ottawa Network Defence Intelligence Inc)
Remote Host Port Number 67.210.170.142 20000 PASS ohai NICK cqexck USER nnlucf “” “ftr” :nnlucf hosting infos: http://whois.domaintools.com/67.210.170.142
213.229.107.27(irc botnet hosted in United Kingdom Canonical Range For Bs2-hp1-le)
Remote Host Port Number 204.0.5.41 80 63.135.80.224 80 63.135.80.46 80 85.118.137.12 80 213.229.107.27 1234 PASS xxx NICK NEW-[USA|00|P|07451] USER XP-1167 * 0 :COMPUTERNAME MODE NEW-[USA|00|P|07451] -ix JOIN #!nn! test PONG 22 MOTD hosting infos: http://whois.domaintools.com/213.229.107.27
46.17.100.229(irc botnet hosted in Russian Federation Mir Telematiki Ltd)
Remote Host Port Number 46.17.100.229 4443 ircd here 46.28.64.99 444 46.28.64.99 80 79.142.67.113 80 NICK N[USA|XP][vsdyciq] USER vsdy “” “lol” :vsdy JOIN #b0ts PONG 422 PRIVMSG #b0ts :[Download]: Succeeded using primary method [WinInet: 279 KB] executables: # http://c0re.us/test.exe # http://waterforpeople.co.cc/crypted.exe Spyeye panel: http://quantummechanic.cc/controlpanel/ Spyeye executable: http://waterforpeople.co.cc/spyfud.exe.exe hosting info: http://whois.domaintools.com/46.17.100.229
gusan0.sin-ip.es(irc botnet hosted in United States Chicago Fdcservers.net)
Remote Host Port Number 50.7.247.10 6667 NICK NEW[XX][XP]8744609838 USER 8744 “” “TsGh” :8744 MODE NEW[XX][XP]8744609838 -d JOIN ##spam## PONG :irc.priv8net.com NICK {XPUSA698507} USER COMPUTERNAME * 0 :COMPUTERNAME MODE {XPUSA698507} -ix JOIN ##v5## MODE ##v5## -ix PRIVMSG ##v5## :.::[DDoS]::. Flooding 127.0.0.2:1234 with ddos.syn for 50 seconds PRIVMSG ##v5## :.::[DDoS]::. Done with flood (0KB/sec). NICK {XPUSA965601} MODERead more...