biofaction.no-ip.biz 74.233.196.245 Outgoing connection to remote server: biofaction.no-ip.biz TCP port 5150 exe file: http://7ae576c0.filesonthe.net infos about hecker: http://whois.domaintools.com/74.233.196.245
ramboflaco.com(botnet hosted in France Ovh Sas)
ramboflaco.com DNS_TYPE_A 94.23.13.163 YES udp 94.23.13.163:1063 Nick: n{FR|XPa}xwwjmuw Username: xwwjmuw Server Pass: ngrBot Joined Channel: #rootcrazy with Password rambomarica infos about hosting: http://whois.domaintools.com/94.23.13.163
irc.golput.org(linux bots hosted in Spain Albacete Isp)
around 400-500 linux bots inside var $config = array(“server”=>”irc.golput.org”, // ip/host da rede “port”=>”9191”, // porta da rede “pass”=>”jancuk”, // senha da rede “prefix”=>”ret”, // nick do bot “maxrand”=>”3”, // quantidade de numero no nick do bot “chan”=>”#dor”, // canal que os bots vao entrar “chan2″=>”#dor”, // canal aonde os bots v?o mandar as vulnsRead more...
213.165.70.210(linux bots hosted in Germany Berlin 1&1 Internet Ag)
var $config = array(“server”=>”213.165.70.210”, “port”=>”6667”, “pass”=>””, “prefix”=>”psychoz`x`”, “maxrand”=>”4”, “chan”=>”#!scann”, “chan2″=>”#2”, “key”=>”kimi”, “modes”=>”+p”, “password”=>”2002”, “trigger”=>”.”, “hostauth”=>”*” // infos about hosting: http://whois.domaintools.com/213.165.70.210
343.no-ip.info(canadian hecker using rat Canada Burnaby Telus Communications Inc)
343.no-ip.info 207.216.86.42 Outgoing connection to remote server: 343.no-ip.info TCP port 3998 Outgoing connection to remote server: 343.no-ip.info TCP port 3998 infos about hecker location: http://whois.domaintools.com/207.216.86.42
91.215.159.137(botnet hosted in Netherlands Amsterdam Infinite Technologies Internet Solutions Limited)
Remote Host Port Number 204.0.5.41 80 216.178.38.224 80 216.178.39.11 80 66.220.149.18 80 91.215.159.137 1866 PASS xxx MODE NEW-[USA|00|P|85802] -ix JOIN #!high! test PONG 22 MOTD NICK NEW-[USA|00|P|85802] USER XP-0865 * 0 :COMPUTERNAME infos about hosting: http://whois.domaintools.com/91.215.159.137
178.162.151.112(botnet hosted in Germany Berlin Idealhosting Managed Servers)
Remote Host Port Number 178.162.151.112 5858 PASS ciaxx MODE [USA|XP|012963] -ix JOIN #cia ciaxxx PRIVMSG #cia :DDoS: Thread Disabled. PONG www.xxx.com NICK [USA|XP|012963] USER kjvpaoq * 0 :COMPUTERNAME infos about hosting: http://whois.domaintools.com/178.162.151.112
188.132.196.171(botnet hosted in Turkey Mars-customer)
Remote Host Port Number 188.132.196.171 4411 PASS ciaxx NICK n{Ganja-USA|XP}169603 USER 1696 “” “TsGh” :1696 JOIN #ozel1 ciaxxx PONG :HTTP1.4 infos about hosting: http://whois.domaintools.com/188.132.196.171
92.241.165.156(botnet hosted in Russian Federation 2×4.ru Network)
92.241.165.156:1234 Nick: NEW-[AUT|00|P|66839] Username: XP-2398 Server Pass: xxx Joined Channel: #!nn! with Password test Channel Topic for Channel #!nn!: “D http://tygillmor.com/index.php?=” * Now talking in #!nn! * Topic is ‘.m.s|.m.e hahhahaha foto 😀 http://ialongsdor.net/facebook/index.php?= ‘ * Set by wd22 on Tue Apr 05 13:09:13 infos about hosting: http://whois.domaintools.com/92.241.165.156
62.213.4.174(botnet hosted in Russian Federation Moscow Samtel)
Remote Host Port Number 62.213.4.174 13001 NICK `hljvmflr USER `hljvmflr 0 0 :`hljvmflr JOIN #.serve6 hs USERHOST `hljvmflr PRIVMSG #.serve6 :scan(asn): random port scan 192.x.x.x:445 [delay 5 sec] [0 min] [100 threads] * Now talking in #.serve6 * Topic is ‘`adv.start asn 100 5 0 -a -r ‘ * Set by sd on Sun AprRead more...