Name servers matching IP 31.211.249.164 (Latest 50 additions)


Domain
Name servers / IPs
Network Name
Description
Listing date
owideker.ru ns1.boomsco.com => 31.211.249.164
ns2.boomsco.com => 81.198.251.48
ns3.boomsco.com => 46.247.229.114
ns4.boomsco.com => 115.252.40.102
ns5.boomsco.com => 219.86.200.214
ns6.boomsco.com => 188.129.194.228
 
(AS36114) RDTL Waledac botnet  2013-01-27
favickov.ru ns1.boomsco.com => 109.239.40.176
ns2.boomsco.com => 211.47.119.106
ns3.boomsco.com => 31.211.249.164
ns4.boomsco.com => 89.215.68.47
ns5.boomsco.com => 82.103.85.4
ns6.boomsco.com => 186.14.36.32
 
(AS36114) RDTL Waledac botnet  2013-01-27
tofujid.ru ns1.newrect.com => 78.139.246.24
ns2.newrect.com => 61.10.208.37
ns3.newrect.com => 174.108.16.253
ns4.newrect.com => 125.209.41.159
ns5.newrect.com => 31.211.249.164
ns6.newrect.com => 119.186.9.135
 
(AS) Domain awaiting malicious usage (Rogue AV botnet)  2013-01-07
siwebheb.ru ns1.biocruc.com => 31.211.249.164
ns2.biocruc.com => 89.73.25.87
ns3.biocruc.com => 31.192.14.140
ns4.systeat.com => 159.148.188.95
ns5.systeat.com => 94.251.217.21
ns6.systeat.com => 187.186.77.252
 
(AS39608) LANETUA Trojan / Rogue Antivirus (running on a botnet)  2012-11-23
gywilhof.ru ns1.biocruc.com => 111.184.104.118
ns2.biocruc.com => 187.186.77.252
ns3.biocruc.com => 136.169.13.69
ns4.systeat.com => 188.175.32.224
ns5.systeat.com => 31.211.249.164
ns6.systeat.com => 176.98.200.154
 
(AS44327) DELTANET-NET Trojan / Rogue Antivirus (running on a botnet)  2012-11-23
rizsebym.ru ns1.biocruc.com => 219.198.196.24
ns2.biocruc.com => 92.246.1.164
ns3.biocruc.com => 31.129.115.249
ns4.systeat.com => 186.79.40.198
ns5.systeat.com => 31.211.249.164
ns6.systeat.com => 178.149.12.241
 
(AS17488) HATHWAY-NET-AP Rogue Antivirus (Running on a botnet)  2012-11-10
qutgagnu.ru ns1.systeat.com => 188.246.92.41
ns2.systeat.com => 190.209.100.194
ns3.systeat.com => 31.211.249.164
ns4.systeat.com => 95.57.11.84
ns5.systeat.com => 216.106.162.22
ns6.systeat.com => 219.198.196.24
 
(AS31252) STARNET Rogue Antivirus (Running on a botnet)  2012-11-11