CLEAN MX realtime database    
public access query for virus URL statistics
Totally watched: 3635904 As of 2014-04-23 09:58:22 CEST
Subscribe to the VirusWatch Mailing list, updated hourly

This database consists of Virus URI, collected and verified since Feb 2006
Tweet
If you detect URI'S concerning your netblock, already closed... you have made a good job, otherwise please close them as soon as possible.

to look at some nice charts, there are complete statisticsstatistics for this database
Attention: all URI'S are manually verified, but not cross-checked for real viruses function in this moment you make this query.(Sites may have been closed already..)
Our automatic Viruswalker process is scheduled every hour, so you may see now a incident and this one will be resolved later on.
So please keep on sending close-feedbacks to us...

if you have questions, criticism, wishes or ... do not hesitate to contact us at abuse@clean-mx.de
Our PBX is down you may reach us by cell phone +49 171 4802507 ...
Query as xml: Same query as xml output
TIMERS: Runtime Query: 0.3394 Seconds 4 hits
helpLine help#descendigascending helpDatedescendigascending helpCloseddescendigascending helphours helpcontributordescendigascending helpvirusnamedescendigascending helpURLdescendigascending helpip state helpresponsedescendigascending helpIp initialdescendigascending helpAS#descendigascending helpip reviewdescendigascending helpURLdescendigascending helpDomaindescendigascending helpcountrydescendigascending helpsourcedescendigascending helpemaildescendigascending helpinetnumdescendigascending helpnetnamedescendigascending helpdescrdescendigascending helpns1descendigascending helpns2descendigascending helpns3descendigascending helpns4descendigascending helpns5descendigascending helpURLdescendigascending
1 follow up this item(11210992) 11210992  2013-05-20 17:50:46 2013-05-21 19:37:24 25.8 follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
0/43 (0.0%) 
 no
vt
result 
 lookup in virustotal.com (5427c6818612957cdf9b8c9ee8c15dd2)-->[http://www.virustotal.com/latest-report.html?resource=5427c6818612957cdf9b8c9ee8c15dd2]follow up this md5sum(5427c6818612957cdf9b8c9ee8c15dd2)follow up this itemfollow up this virusname (unknown_html) as RSS-Feedfollow up this malware(unknown_html) for scanner (undef) in md5 table0/43 (0.0%) unknown_html
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php?optio ...  up No previous evidence recordedSaved evidence (10194 Bytes) of last contact as txt May 21 2013 01:38:52 CEST. closedSaved log of last contact as txt May 21 2013 01:38:53 CEST. follow up this ip (ip=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(ip) in same window 116.213.5.17 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS38809) in networks tablefollow up this itemfollow up this AS (AS38809) as RSS-Feed AS38809 follow up this ip (review=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(review) in same window 116.213.5.17 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php?optio ... follow up this domain (rcpamanual.edu.au) as RSS-Feedlookup rcpamanual.edu.au at virustotalfollow up this domain(rcpamanual.edu.au) rcpamanual.edu.au follow up this itemfollow up this country (AU) as RSS-Feed AU follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (netadmin@ozhosting.com) as RSS-Feed netadmin@ozhosting.com follow up this itemfollow up this item 116.213.5.0 - 116.213.5.255 follow up this item OZHOSTING-AS-AP follow up this item Ozhosting.com Pty LtdLevel 10220 George St follow up this item ns2.bigair.net.au follow up this item ns1.bigair.net.au follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php?optio ...
2 follow up this item(11210991) 11210991  2013-05-20 17:50:46 2013-05-21 01:40:17 7.8 follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
0/47 (0.0%) 
  
 lookup in virustotal.com (94964882ff52836bf674b754304793ac)-->[http://www.virustotal.com/latest-report.html?resource=94964882ff52836bf674b754304793ac]follow up this md5sum(94964882ff52836bf674b754304793ac)follow up this itemfollow up this virusname (unknown_html) as RSS-Feedfollow up this malware(unknown_html) for scanner (undef) in md5 table0/47 (0.0%) unknown_html
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php  up No previous evidence recordedSaved evidence (13723 Bytes) of last contact as txt May 21 2013 01:39:11 CEST. closedSaved log of last contact as txt May 21 2013 01:39:11 CEST. follow up this ip (ip=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(ip) in same window 116.213.5.17 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS38809) in networks tablefollow up this itemfollow up this AS (AS38809) as RSS-Feed AS38809 follow up this ip (review=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(review) in same window 116.213.5.17 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php follow up this domain (rcpamanual.edu.au) as RSS-Feedlookup rcpamanual.edu.au at virustotalfollow up this domain(rcpamanual.edu.au) rcpamanual.edu.au follow up this itemfollow up this country (AU) as RSS-Feed AU follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (netadmin@ozhosting.com) as RSS-Feed netadmin@ozhosting.com follow up this itemfollow up this item 116.213.5.0 - 116.213.5.255 follow up this item OZHOSTING-AS-AP follow up this item Ozhosting.com Pty LtdLevel 10220 George St follow up this item ns2.bigair.net.au follow up this item ns1.bigair.net.au follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://rcpamanual.edu.au/index.php
3 follow up this item(637835) 637835  2010-08-18 10:59:50 2010-09-30 00:18:36 1021.3 follow up this itemfollow up this contributor (own RFI's from netpilot.net hosting platform) as RSS-Feed sub7possible lookup Evidence at malwaredomainlist.com
24/37 (64,86%) 
 
HTML/Phpinfo
SPR/PHP.ID
PHP/Info.A
PHP:PHPInfo-A
PHP/BackDoor.H
Trojan.Script.54384
PHP.Id-2
UnclassifiedMalware
PHP/Coverka.A
PHP/Info.A
Trojan.Script.54384
PHP/Zapchast.YR!tr
Trojan.Script.54384
Trojan.PHPInfo
Backdoor.PHP.Agent.hc
Backdoor:PHP/Shell. 
 lookup in virustotal.com (431a239a1f3c349ed1b1ea19597cd614)-->[http://www.virustotal.com/latest-report.html?resource=431a239a1f3c349ed1b1ea19597cd614]follow up this md5sum(431a239a1f3c349ed1b1ea19597cd614) multiple instances recorded!follow up this itemfollow up this virusname (SPR%2FPHP.ID) as RSS-Feedlookup Virusname at avirafollow up this malware(SPR%2FPHP.ID) for scanner (avira) in md5 table24/37 (64,86%) SPR/PHP.ID
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ...  up No previous evidence recordedNo evidence recorded deadSaved log of last contact as txt September 30 2010 00:18:36 CEST. follow up this ip (ip=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(ip) in same window 116.213.5.17 follow up this ip (review=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(review) in same window 116.213.5.17 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ... follow up this domain (rcpamanual.edu.au) as RSS-Feedlookup rcpamanual.edu.au at virustotalfollow up this domain(rcpamanual.edu.au) rcpamanual.edu.au follow up this itemfollow up this country (AU) as RSS-Feed AU follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (abuse@bluecentral.com) as RSS-Feed abuse@bluecentral.com follow up this itemfollow up this item 116.66.116.0 - 118.242.119.255 follow up this item BLUECENTRAL-AU follow up this item Bluecentral Pty LtdHosting and Colocation Services,Australia follow up this item ns2.bigair.net.au follow up this item ns1.bigair.net.au follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ...
4 follow up this item(637799) 637799  2010-08-18 09:55:50 2010-09-30 00:22:03 1022.4 follow up this itemfollow up this contributor (RFI's from Host europe) as RSS-Feed sub11possible lookup Evidence at malwaredomainlist.com
24/37 (64,86%) 
 
HTML/Phpinfo
SPR/PHP.ID
PHP/Info.A
PHP:PHPInfo-A
PHP/BackDoor.H
Trojan.Script.54384
PHP.Id-2
UnclassifiedMalware
PHP/Coverka.A
PHP/Info.A
Trojan.Script.54384
PHP/Zapchast.YR!tr
Trojan.Script.54384
Trojan.PHPInfo
Backdoor.PHP.Agent.hc
Backdoor:PHP/Shell. 
 lookup in virustotal.com (431a239a1f3c349ed1b1ea19597cd614)-->[http://www.virustotal.com/latest-report.html?resource=431a239a1f3c349ed1b1ea19597cd614]follow up this md5sum(431a239a1f3c349ed1b1ea19597cd614) multiple instances recorded!follow up this itemfollow up this virusname (SPR%2FPHP.ID) as RSS-Feedlookup Virusname at avirafollow up this malware(SPR%2FPHP.ID) for scanner (avira) in md5 table24/37 (64,86%) SPR/PHP.ID
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ...  up No previous evidence recordedNo evidence recorded deadSaved log of last contact as txt September 30 2010 00:22:03 CEST. follow up this ip (ip=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(ip) in same window 116.213.5.17 follow up this ip (review=116.213.5.17) as RSS-FeedSenderBaselookup 116.213.5.17 at virustotallookup 116.213.5.17 at Rus CERT university stuttgart germanylookup 116.213.5.17 at apnicfollow up this item(review) in same window 116.213.5.17 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ... follow up this domain (rcpamanual.edu.au) as RSS-Feedlookup rcpamanual.edu.au at virustotalfollow up this domain(rcpamanual.edu.au) rcpamanual.edu.au follow up this itemfollow up this country (AU) as RSS-Feed AU follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (abuse@bluecentral.com) as RSS-Feed abuse@bluecentral.com follow up this itemfollow up this item 116.66.116.0 - 118.242.119.255 follow up this item BLUECENTRAL-AU follow up this item Bluecentral Pty LtdHosting and Colocation Services,Australia follow up this item ns2.bigair.net.au follow up this item ns1.bigair.net.au follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.rcpamanual.edu.au//language/p ...
Click here for other already closed incidents for your domain (rcpamanual.edu.au)

Click here for other vital incidents



Protected by clean MX [Valid RSS] Valid HTML 4.01 Transitional CSS ist valide!
Access is provided for free and subject to these Terms and Conditions.