chuabenhvosinhhiemmuon.com
|
ns2.alidns.com => 140.205.41.22 ns1.alidns.com => 140.205.41.21 |
(AS45102) CNNIC-ALIBABA-CN-NET-AP |
Trojan JS |
2021-06-18
|
paeonystore.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.22 |
(AS45102) CNNIC-ALIBABA-CN-NET-AP |
Leads to Trojan FormBook |
2021-02-22
|
https.kernel-sys.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS7713) TELKOMNET-AS-AP |
Trojan |
2020-04-18
|
d01-7k7.676711.net
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.41.12 |
(AS4134) China Telecom |
Android malware |
2020-04-10
|
agufu.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS37963) CNNIC-ALIBABA-CN-NET-AP |
Android malware |
2020-03-29
|
d02-xj8.676711.net
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS4134) China Telecom |
Android malware |
2020-03-29
|
d02-kvw.676711.net
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS4134) China Telecom |
Android malware |
2020-03-29
|
jialeyigou.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.41.12 |
(AS45102) CNNIC-ALIBABA-CN-NET-AP |
Phishing |
2020-02-12
|
plastic-wiremesh.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.112 |
(AS37963) CNNIC-ALIBABA-CN-NET-AP |
Trojan Emotet |
2020-01-24
|
dj5595.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.12 |
(AS133199) SONDERCLOUDLIMITED-AS-AP |
Trojan JS |
2019-08-25
|
8958.org
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS133199) SONDERCLOUDLIMITED-AS-AP |
Trojan JS |
2019-08-22
|
cm8438.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS133199) SONDERCLOUDLIMITED-AS-AP |
Trojan JS |
2019-08-22
|
688873.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS133199) SONDERCLOUDLIMITED-AS-AP |
Trojan JS |
2019-08-22
|
ushi168.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.122 |
(AS17444) NWT-AS-AP |
Exploit HTML IframeRef.gen |
2019-05-22
|
ke81.cn
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS4134) China Telecom |
Trojan JS |
2019-04-30
|
media.zapya.us
|
ns2.alidns.com => 140.205.81.12 ns1.alidns.com => 140.205.41.21 |
(AS33438) HIGHWINDS2 |
Trojan |
2019-03-22
|
tx.win-team.cn
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.112 |
(AS4837) CNC |
Android malware |
2018-09-20
|
d.ky558.cn
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.122 |
(AS134764) CT-FOSHAN-IDC |
Trojan JS |
2018-05-08
|
gipareg.it
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.22 |
(AS39729) REGISTER |
Trojan JS Redirector.GX |
2017-02-07
|
cuzziolscavi.it
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.22 |
(AS26496) PAH-INC |
Trojan JS Redir |
2017-01-15
|
eyuyan.cc
|
ns2.alidns.com => 106.11.141.122 ns1.alidns.com => 140.205.41.21 |
(AS37963) CNNIC-ALIBABA-CN-NET-AP |
Trojan |
2017-01-03
|
vaniavalbusa.it
|
ns2.alidns.com => 106.11.211.52 ns1.alidns.com => 140.205.41.21 |
(AS31034) ARUBA |
Trojan |
2017-01-03
|
cdn.cpcp.la
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.22 |
(AS13335) CLOUDFLARENET |
Trojan Inject |
2017-03-11
|
pk.aoool.cn
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS4837) CNC |
Virus |
2017-03-23
|
www123.aliapp.com
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.211.62 |
(AS37963) CNNIC-ALIBABA-CN-NET-AP |
Virus VBS Ramnit.C |
2016-04-20
|
fretai.it
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS22552) ESITED |
Fraud / Scam (Counterfeit products) |
2015-11-24
|
disegnopositivo.it
|
ns2.alidns.com => 106.11.211.52 ns1.alidns.com => 140.205.41.21 |
(AS12327) IDEAR4BUSINESS-INTERNATIONAL-LTD |
Fraud / Scam (Counterfeit products) |
2015-04-28
|
jpay.aliapp.com
|
ns2.alidns.com => 106.11.141.112 ns1.alidns.com => 140.205.41.21 |
(AS37963) CNNIC-ALIBABA-CN-NET-AP |
Trojan |
2013-11-25
|
cheaprealjordans.org
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.112 |
(AS20248) PSINETA |
Fraud / Scam |
2013-02-10
|
zhaosheng.la
|
ns2.alidns.com => 140.205.81.12 ns1.alidns.com => 140.205.41.21 |
(AS9929) CNCNET |
Trojan HTML Redirector.AD |
2012-08-13
|
hanson.net9.org
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS4538) GDUFS |
Trojan Malat |
2011-10-13
|
defender-counx.vv.cc
|
ns2.alidns.com => 106.11.211.52 ns1.alidns.com => 140.205.41.21 mxw.mxhichina.com => 198.11.189.243 mxn.mxhichina.com => 205.204.101.145 |
(AS42267) SHIRYO |
Fake scan page / Rogue Antivirus |
2011-06-15
|
defender-ubknx.vv.cc
|
ns2.alidns.com => 140.205.41.22 ns1.alidns.com => 140.205.41.21 mxw.mxhichina.com => 198.11.189.243 mxn.mxhichina.com => 205.204.101.145 |
(AS42267) SHIRYO |
Fake scan page / Rogue Antivirus |
2011-06-15
|
akgtools.vv.cc
|
ns2.alidns.com => 106.11.211.62 ns1.alidns.com => 140.205.41.21 mxw.mxhichina.com => 198.11.189.243 mxn.mxhichina.com => 205.204.101.145 |
(AS12695) DINET |
Exploit kit |
2011-05-24
|
dayandlane.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS51630) SIABAS |
Exploit kit |
2011-05-24
|
shanguoyane.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.12 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS51630) SIABAS |
Exploit kit |
2011-05-24
|
allrightsupervse.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS50244) ITELECOM |
Exploit kit |
2011-05-24
|
clicked.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS50244) ITELECOM |
Exploit kit |
2011-05-24
|
elsoma.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS50244) ITELECOM |
Exploit kit |
2011-05-24
|
koherezu111.vv.cc
|
ns2.alidns.com => 106.11.211.52 ns1.alidns.com => 140.205.41.21 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS50244) ITELECOM |
Exploit kit |
2011-05-24
|
superandy.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS50244) ITELECOM |
Exploit kit |
2011-05-24
|
imagestorage.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.41.12 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS25847) SERVINT |
Exploit kit |
2011-05-20
|
mommaandme.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS25847) SERVINT |
Exploit kit |
2011-05-20
|
seoulheroes.vv.cc
|
ns2.alidns.com => 106.11.211.62 ns1.alidns.com => 140.205.41.21 mxw.mxhichina.com => 198.11.189.243 mxn.mxhichina.com => 205.204.101.145 |
(AS25847) SERVINT |
Exploit kit |
2011-05-20
|
grillstix.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.41.12 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS12695) DINET |
Exploit kit |
2011-05-15
|
163yuandan.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 140.205.81.12 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS12695) DINET |
Exploit kit |
2011-05-15
|
tvled3d.vv.cc
|
ns2.alidns.com => 140.205.81.12 ns1.alidns.com => 140.205.41.21 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS25847) SERVINT |
Exploit kit |
2011-05-13
|
yahan-fs.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.122 mxw.mxhichina.com => 198.11.189.243 mxn.mxhichina.com => 205.204.101.145 |
(AS12695) DINET |
Exploit kit |
2011-05-11
|
paid-ads.vv.cc
|
ns1.alidns.com => 140.205.41.21 ns2.alidns.com => 106.11.141.112 mxn.mxhichina.com => 205.204.101.145 mxw.mxhichina.com => 198.11.189.243 |
(AS25847) SERVINT |
Exploit kit |
2011-05-11
|
nukethereef.vv.cc
|
ns2.alidns.com => 140.205.81.22 ns1.alidns.com => 140.205.41.21 |
(AS25847) SERVINT |
Exploit kit |
2011-05-11
|