DNS : hacksecurity.dyndns.info IP : 178.63.42.16 Port : 6667 Nick: raGe|VwyLaNJleo Username: bpddcu Joined Channel: ##vnc## with Password scan Channel Topic for Channel ##vnc##: “.rarworm .p2p .xpl 100 1 190 -b 3” Private Message to Channel ##vnc##: “^C14,1.:[^C15,1VNC^C14,1]:.^C15,1 range: 190 with 100 threads. (autorooting)” Private Message to Channel ##vnc##: “^C14,1.:[^C15,1VNC^C14,1]:.^C15,1 p2p spread started.” Private MessageRead more...
67.202.109.219(ngrBot hosted in United States Kansas City Steadfast Networks)
Remote Host Port Number 199.15.234.7 80 67.202.109.219 1888 PASS ngrBot NICK n{US|XPa}eechxgg USER eechxgg 0 0 :eechxgg JOIN ##center 1963.g3rb3rs1t0.3691 JOIN #XP JOIN #new JOIN #US Now talking in #xp Modes On: [ #xp ] [ +smntM ] Joins: {PE|XPa}vsyvzza [vsyvzza@2E710F5A.67294BC.28C8A9FB.IP] Joins: {PE|XPu}ctxapfg [ctxapfg@2FDEEB5D.B46253B1.36C54A63.IP] Joins: {PE|XPa}ytnyfsk [ytnyfsk@9ABA929D.9ACD4A9F.28C8A9FB.IP] Joins: n{ES|XPa}jdtltet [jdtltet@Crew-370EA58.dyn.user.ono.com] Joins: n{MX|XPu}mbjyydt [mbjyydt@DD10EA0D.A39565B0.72B527BA.IP] hosting infos:Read more...
Trojan-PWS.Banker5
Domains: cnt4cnt1.sites.uol.com.br www.netotransportes.com Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.17] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.1.41] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.19] Resolved : [cnt4cnt1.sites.uol.com.br] To [200.147.33.21] exe files: http://omeum4snovo.com/seuvideo/video.exe http://cnt4cnt1.sites.uol.com.br/bifpv.jpg
darkirc.net(irc bot hosted in Australia Exigent Enterprise Pty Ltd)
Remote Host Port Number 103.4.17.26 6667 NICK [nLh-VNC]utfmao USER sleknocoo “fo4.net” “rage” :sleknocoo PONG 7A4B242C JOIN #donangello donangello PRIVMSG #donangello : [RAGE SCAN:] range: 72.x.x.x/94 threads. Now talking in #donangello Topic On: [ #donangello ] [ !scan 94 1 72.x.x.x 3 1 72.x.x.x ] Topic By: [ donangello ] Modes On: [ #donangello ] [Read more...
204.188.197.39(ngrBot hosted in United States Morgantown Sharktech Internet Services)
Remote Host Port Number 199.15.234.7 80 50.19.232.207 80 204.188.197.39 8811 PASS ngrBot The data identified by the following URLs was then requested from the remote web server: http://api.wipmania.com http://dl.dropbox.com/u/32166345/dnsbl.txt NICK n{US|XPa}dpdqgxd USER dpdqgxd 0 0 :dpdqgxd JOIN #paradise klash PRIVMSG #paradise :[DNS]: Blocked 1260 domain(s) – Redirected 0 domain(s) hosting infos: http://whois.domaintools.com/204.188.197.39
92.243.1.61(ngrBot hosted in France Paris Gandi)
Remote Host Port Number 199.15.234.7 80 92.243.1.61 3211 PASS ngrBot 92.243.1.61 3212 PASS ngrBot 92.243.1.61 4949 PASS ngrBot 92.243.4.133 5900 PASS ngrBot Remote Host Port Number 199.15.234.7 80 92.243.5.149 80 92.243.18.75 3211 92.243.4.252 5900 92.243.5.149 3212 NICK n{US|XPa}hjdwljm USER hjdwljm 0 0 :hjdwljm NICK n{US|XPa}lalgnpf USER lalgnpf 0 0 :lalgnpf NICK n{US|XPa}hfklgat USER hfklgat 0Read more...
online.fgb.ae(trojan downloader hosted in United Arab Emirates Abu Dhabi Emirates Telecommunications Corporation)
* The data identified by the following URLs was then requested from the remote web server: o http://www.financetasksforce.com/ht.txt o http://aineyhosting.com/web.php o http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab o http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt o http://www.samair.ru/proxy/proxychecker/country.htm Remote Host Port Number 195.229.126.217 443 64.15.147.205 80 65.55.87.35 80 94.76.239.85 80 Download exe file here: http://adf.ly/2IA16 hosting infos: http://whois.domaintools.com/195.229.126.217
91.211.117.173(ngrBot hosted in Ukraine Zharkov Mukola Mukolayovuch)
Remote Host Port Number 199.15.234.7 80 91.211.117.173 1865 PASS ngrBot Closing Link: [x.x.x.x] (You are not welcome on this server: Bye :). Email you.are@a.stupid.mf for more information.) looks like heckers dont like my proxy i changed proxy and here we go: NICK n{US|XPa}sgwgywy USER sgwgywy 0 0 :sgwgywy Now talking in #main Topic On: [Read more...
leguin.acc.umu.se(irc bot hosted in Sweden Umea Umea University)
Remote Host Port Number 130.239.18.172 6667 188.93.150.22 80 74.125.157.104 80 Server: Notice — You need to identify via SASL to use this server Error: Closing Link: x.x.x.x (SASL access only) read more about SASL here:http://en.wikipedia.org/wiki/Simple_Authentication_and_Security_Layer JOIN #bogmachine MODE #bogmachine NICK ostouqegi USER ostouqegi “ComputerName.localdomain” “chat.freenode.net” :shutsuye hachosh Now talking in #bogmachine Topic On: [ #bogmachineRead more...
lulznet.in(irc botnet hosted in Netherlands Amsterdam Leaseweb B.v)
Remote Host Port Number 85.17.93.22 65000 NICK [USA]13717 USER [USA]13717 [USA]13717 [USA]13717 [USA]13717 JOIN #juicyj needs passwd to join hosting infos: http://whois.domaintools.com/85.17.93.22