CLEAN MX realtime database    
public access query for virus URL statistics
Totally watched: 3572774 As of 2014-04-18 20:17:05 CEST

you have also some portals incidents open see: click here for these incidents (1)

Subscribe to the VirusWatch Mailing list, updated hourly

This database consists of Virus URI, collected and verified since Feb 2006
Tweet
If you detect URI'S concerning your netblock, already closed... you have made a good job, otherwise please close them as soon as possible.

to look at some nice charts, there are complete statisticsstatistics for this database
Attention: all URI'S are manually verified, but not cross-checked for real viruses function in this moment you make this query.(Sites may have been closed already..)
Our automatic Viruswalker process is scheduled every hour, so you may see now a incident and this one will be resolved later on.
So please keep on sending close-feedbacks to us...

if you have questions, criticism, wishes or ... do not hesitate to contact us at abuse@clean-mx.de
Our PBX is down you may reach us by cell phone +49 171 4802507 ...
Query as xml: Same query as xml output
TIMERS: Runtime Query: 0.0220 Seconds 2 hits
helpLine help#descendigascending helpDatedescendigascending helpCloseddescendigascending helphours helpcontributordescendigascending helpvirusnamedescendigascending helpURLdescendigascending helpip state helpresponsedescendigascending helpIp initialdescendigascending helpAS#descendigascending helpip reviewdescendigascending helpURLdescendigascending helpDomaindescendigascending helpcountrydescendigascending helpsourcedescendigascending helpemaildescendigascending helpinetnumdescendigascending helpnetnamedescendigascending helpdescrdescendigascending helpns1descendigascending helpns2descendigascending helpns3descendigascending helpns4descendigascending helpns5descendigascending helpURLdescendigascending
1 follow up this item(24381402) 24381402 Report false positive Report closed case make a suggestion 2014-04-05 10:50:30     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
18/50 (36%) 
 
HTML:Iframe-YU
Trj
Trojan.Iframe.BJG
IFrame.gen
Trojan.Iframe.BJG
(B)
Trojan.Iframe.BJG
(B)
IFrame.gen
Trojan.Iframe.BJG
Trojan.Iframe.BJG
HEUR:Trojan.Script.Generic
Trojan.Iframe.BJG
Trojan.Url.IframeB.lbbmn
Redirector.LL
HTML:Trojan.Clicker.Script.JS. 
 lookup in virustotal.com (ef22298b40bcf312f4bd04468c581e6b)-->[http://www.virustotal.com/latest-report.html?resource=ef22298b40bcf312f4bd04468c581e6b]follow up this md5sum(ef22298b40bcf312f4bd04468c581e6b)follow up this itemfollow up this virusname (HTML%3AIframe-YU+Trj) as RSS-Feedfollow up this malware(HTML%3AIframe-YU+Trj) for scanner (Avast) in md5 table18/50 (36%) HTML:Iframe-YU Trj
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://eyesys.kr/  up No previous evidence recordedSaved evidence (1053 Bytes) of last contact as txt March 24 2012 19:45:28 CET. aliveSaved log of last contact as txt April 05 2014 12:08:29 CEST. follow up this ip (ip=39.119.158.19) as RSS-FeedSenderBaselookup 39.119.158.19 at virustotallookup 39.119.158.19 at Rus CERT university stuttgart germanylookup 39.119.158.19 at apnicfollow up this item(ip) in same window 39.119.158.19 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS9318) in networks tablefollow up this itemfollow up this AS (AS9318) as RSS-Feed AS9318 follow up this ip (review=39.119.158.19) as RSS-FeedSenderBaselookup 39.119.158.19 at virustotallookup 39.119.158.19 at Rus CERT university stuttgart germanylookup 39.119.158.19 at apnicfollow up this item(review) in same window 39.119.158.19 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://eyesys.kr/ follow up this domain (eyesys.kr) as RSS-Feedlookup eyesys.kr at virustotalfollow up this domain(eyesys.kr) eyesys.kr follow up this itemfollow up this country (KR) as RSS-Feed KR follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (ip-adm@skbroadband.com) as RSS-Feed ip-adm@skbroadband.com follow up this itemfollow up this item 39.112.0.0 - 39.127.255.255 follow up this item broadNnet follow up this item SK Broadband Co LtdJung-gu SK NamsanGreen Bldg,Namdaemunno 5(o)-ga, Seoul*******************************************Allocated to KRNIC Member.If you would like to find assignmentinformation in detail please refer tothe KRNIC Whois Database athttp******** follow up this item ns30.dnsever.com follow up this item ns60.dnsever.com follow up this item ns259.dnsever.com follow up this item ns19.dnsever.com follow up this item ns231.dnsever.com Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://eyesys.kr/
2 follow up this item(17100428) 17100428 Report false positive Report closed case make a suggestion 2013-11-15 21:32:39 OVERDUE! Overdue!3698.8 follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
6/47 (12.8%) 
 Artemis!71EF8D7201CB
Adware.KorAd
Agent.UIOU
malicious
Artemis!71EF8D7201CB
RemoteAdmin/Win32.WinVNC.gen 
 lookup in virustotal.com (71ef8d7201cb8f5cf48e3491ec3dc9a7)-->[http://www.virustotal.com/latest-report.html?resource=71ef8d7201cb8f5cf48e3491ec3dc9a7]lookup in threatexpert.comlookup the sha256(42e6fd16cd9b8ef33b17db24d76c8305012b371905fcf3d144ccb502d09105fb) in comodo.comfollow up this md5sum(71ef8d7201cb8f5cf48e3491ec3dc9a7)follow up this itemfollow up this virusname (Win.Trojan.Qqpass-2283) as RSS-Feedlookup Virusname at viruspoolfollow up this malware(Win.Trojan.Qqpass-2283) for scanner (clamav) in md5 table6/47 (12.8%) Win.Trojan.Qqpass-2283
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://bgsys.co.kr/wp-content/uploads/20 ...  up No previous evidence recordedSaved evidence (334010 Bytes) of last contact as txt July 10 2012 06:32:54 CEST. aliveSaved log of last contact as txt November 16 2013 03:35:57 CET. follow up this ip (ip=39.114.9.30) as RSS-FeedSenderBaselookup 39.114.9.30 at virustotallookup 39.114.9.30 at Rus CERT university stuttgart germanylookup 39.114.9.30 at apnicfollow up this item(ip) in same window 39.114.9.30 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS9318) in networks tablefollow up this itemfollow up this AS (AS9318) as RSS-Feed AS9318 follow up this ip (review=39.114.9.30) as RSS-FeedSenderBaselookup 39.114.9.30 at virustotallookup 39.114.9.30 at Rus CERT university stuttgart germanylookup 39.114.9.30 at apnicfollow up this item(review) in same window 39.114.9.30 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://bgsys.co.kr/wp-content/uploads/20 ... follow up this domain (bgsys.co.kr) as RSS-Feedlookup bgsys.co.kr at virustotalfollow up this domain(bgsys.co.kr) bgsys.co.kr follow up this itemfollow up this country (KR) as RSS-Feed KR follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (ip-adm@skbroadband.com) as RSS-Feed ip-adm@skbroadband.com follow up this itemfollow up this item 39.112.0.0 - 39.127.255.255 follow up this item broadNnet follow up this item SK Broadband Co LtdJung-gu SK NamsanGreen Bldg,Namdaemunno 5(o)-ga, Seoul*******************************************Allocated to KRNIC Member.If you would like to find assignmentinformation in detail please refer tothe KRNIC Whois Database athttp******** follow up this item ns259.dnsever.com follow up this item ns11.dnsever.com follow up this item ns17.dnsever.com follow up this item ns231.dnsever.com follow up this item ns18.dnsever.com Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://bgsys.co.kr/wp-content/uploads/20 ...
Click here for other already closed incidents for your email (ip-adm@skbroadband.com)

Click here for other vital incidents



Protected by clean MX [Valid RSS] Valid HTML 4.01 Transitional CSS ist valide!
Access is provided for free and subject to these Terms and Conditions.