SERVER INFO: Server: 178.63.165.121 Port: 7331 Channels: #UNIX or #Chat or #Admin == Logins: .l hexpro .l ciabkkthx .l elmo .l vHax .l murda .l 123456 CMDS .quick 123.123.123.123 – 60 sec Flood .udpflood iphere 6515555 Secs here – UDP flood .gtfo – Kicks all Bots out .speedtest – Test all the bots speed andRead more...
feb.scorevidic.net(botnet hosted in United States Baltimore Gandi Us Inc)
Remote Host Port Number feb.scorevidic.net 5900 Resolved : [feb.scorevidic.net] To [173.246.103.17] Resolved : [feb.scorevidic.net] To [173.246.103.19] NICK VirUs-zlxuiykn USER VirUs “” “zte” : 8Coded 8Ahmed.Ramzey@Hotmail.Com.. JOIN #Rana1# Virus PONG :TESTING1.VirUs.HERE 00000000 | 5041 5353 2056 6972 7573 0D0A 4E49 434B | PASS Virus..NICK 00000010 | 2056 6972 5573 2D78 7565 757A 7966 790D | VirUs-xueuzyfy.Read more...
aesc.modeldns.com.au(botnet hosted in Australia Perth Primus Telecommunications)
Remote Host Port Number 116.240.194.26 1234 PASS xxx 174.37.200.82 80 216.178.38.224 80 63.135.80.46 80 64.208.241.41 80 66.220.149.25 80 NICK NEW-[USA|00|P|59881] USER XP-8763 * 0 :COMPUTERNAME MODE NEW-[USA|00|P|59881] -ix JOIN #!nn! test PONG 22 MOTD infos about hosting: http://whois.domaintools.com/116.240.194.26
95.154.237.183(botnet hosted in Amsterdam)
Remote Host Port Number 95.154.237.183 6667 PASS timu MODE USA|87388 -x+i JOIN #1 timu USERHOST USA|87388 NICK USA|87388 USER otjzn 0 0 :USA|87388 infos about hosting: http://whois.domaintools.com/95.154.237.183
178.162.242.213(botnet hosted in Germany Idealhosting Managed Servers)
178.162.242.213 6667 NICK USA|4751322 USER ncmvmnh 0 0 :USA|4751322 JOIN #neon neo1 Channel: Ýslam Pass: #neo noksan PONG :irc.HTTP7 USERHOST USA|4751322 MODE USA|4751322 -x+i infos about hosting: http://whois.domaintools.com/178.162.242.213
209.59.221.26(botnet hosted in United States Burlington The Endurance International Group Inc)
209.59.221.26 7985 NICK [USA|XP|633220] USER ndcpzxy * 0 :COMPUTERNAME MODE [USA|XP|633220] -ix JOIN #LuKe pass infos about hosting: http://whois.domaintools.com/209.59.221.26
c.bravepath3.com(bfbotnet hosted in Russian Federation Vline Ltd)
– DNS Queries: Name Query Type Query Result Successful Protocol c.bravepath3.com DNS_TYPE_A 109.196.142.58 109.196.142.66 YES udp hubz.imfatguy.info DNS_TYPE_A 127.0.0.1 YES udp b.bravepath3.com DNS_TYPE_A 109.196.142.66 109.196.142.58 YES udp hubz.lebanonbot.com DNS_TYPE_A NO udp a.bravepath3.com DNS_TYPE_A 109.196.142.66 109.196.142.58 YES udp – TCP Connection Attempts: 109.196.142.58:1110 109.196.142.66:1110 109.196.142.66:1110 infos about hosting: http://whois.domaintools.com/109.196.142.58
61.100.9.220(botnet posted in Korea, Republic Of Krnic)
Remote Host Port Number 61.100.9.220 7000 NICK tnlxlcb USER utwalu 0 0 :tnlxlcb JOIN ##aa## b! USERHOST tnlxlcb MODE tnlxlcb -x PONG :irc.priv8net.com infos about hosting: http://whois.domaintools.com/61.100.9.220
15 mb exe files from diferent malwares
Here another link with 15 mb exe files from diferent malwares like (bots,banking trojans,passwords stealers etc) Download: http://13109f1c.theseblogs.com
dns.aswend.com(botnet hosted in Japan Kyoei Co. Ltd)
Remote Host Port Number dns.aswend.com 7000 NICK FL835823620348 USER esiuexzgqlzptu 0 0 :FL835823620348 USERHOST FL835823620348 MODE FL835823620348 +i JOIN #GL .x. NICK FL539494212430 USER uadfqtgvbtfj 0 0 :FL539494212430 USERHOST FL539494212430 MODE FL539494212430 +i NICK FL170074885810 USER cpfvdbtnvtbczk 0 0 :FL170074885810 USERHOST FL170074885810 MODE FL170074885810 +i NICK FL462091484949 USER dqvrrmetrdzqix 0 0 :FL462091484949 USERHOST FL462091484949 MODERead more...