CLEAN MX realtime database    
public access query for virus URL statistics
Totally watched: 3617376 As of 2014-04-20 08:44:23 CEST
Subscribe to the VirusWatch Mailing list, updated hourly

This database consists of Virus URI, collected and verified since Feb 2006
Tweet
If you detect URI'S concerning your netblock, already closed... you have made a good job, otherwise please close them as soon as possible.

to look at some nice charts, there are complete statisticsstatistics for this database
Attention: all URI'S are manually verified, but not cross-checked for real viruses function in this moment you make this query.(Sites may have been closed already..)
Our automatic Viruswalker process is scheduled every hour, so you may see now a incident and this one will be resolved later on.
So please keep on sending close-feedbacks to us...

if you have questions, criticism, wishes or ... do not hesitate to contact us at abuse@clean-mx.de
Our PBX is down you may reach us by cell phone +49 171 4802507 ...
Query as xml: Same query as xml output
TIMERS: Runtime Query: 0.2248 Seconds 10 hits
helpLine help#descendigascending helpDatedescendigascending helpCloseddescendigascending helphours helpcontributordescendigascending helpvirusnamedescendigascending helpURLdescendigascending helpip state helpresponsedescendigascending helpIp initialdescendigascending helpAS#descendigascending helpip reviewdescendigascending helpURLdescendigascending helpDomaindescendigascending helpcountrydescendigascending helpsourcedescendigascending helpemaildescendigascending helpinetnumdescendigascending helpnetnamedescendigascending helpdescrdescendigascending helpns1descendigascending helpns2descendigascending helpns3descendigascending helpns4descendigascending helpns5descendigascending helpURLdescendigascending
1 follow up this item(25309909) 25309909 Report false positive Report closed case make a suggestion 2014-04-18 19:01:36     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (8e61a277a70d530cc2f0ae18c6c7cf00)follow up this md5sum(8e61a277a70d530cc2f0ae18c6c7cf00)follow up this itemfollow up this virusname (unknown_html_RFI_shell) as RSS-Feedfollow up this malware(unknown_html_RFI_shell) for scanner (undef) in md5 table0/43 (0.0%) unknown_html_RFI_shell
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/common/unsubscribe/ ...  up No previous evidence recordedSaved evidence (5999 Bytes) of last contact as txt April 19 2014 05:37:50 CEST. aliveSaved log of last contact as txt April 19 2014 05:37:50 CEST. follow up this ip (ip=46.4.73.106) as RSS-FeedSenderBaselookup 46.4.73.106 at virustotallookup 46.4.73.106 at Rus CERT university stuttgart germanylookup 46.4.73.106 at Ripefollow up this item(ip) in same window 46.4.73.106 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS24940) in networks tablefollow up this itemfollow up this AS (AS24940) as RSS-Feed AS24940 follow up this ip (review=213.239.201.125) as RSS-FeedSenderBaselookup 213.239.201.125 at virustotallookup 213.239.201.125 at Rus CERT university stuttgart germanylookup 213.239.201.125 at Ripefollow up this item(review) in same window 213.239.201.125 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/common/unsubscribe/ ... follow up this domain (iqelite.com) as RSS-Feedlookup iqelite.com at virustotalfollow up this domain(iqelite.com) iqelite.com follow up this itemfollow up this country (DE) as RSS-Feed DE follow up this itemfollow up this region (RIPE) as RSS-Feed RIPE follow up this itemfollow up this enail (abuse@hetzner.de) as RSS-Feed abuse@hetzner.de follow up this itemfollow up this item 46.4.0.0 - 46.4.255.255 follow up this item HETZNER-RZ-NBG-NET2 follow up this item Hetzner Online AGDatacenter NuernbergHETZNER-RZ-NBG-BLK2 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/common/unsubscribe/ ...
2 follow up this item(25293256) 25293256 Report false positive Report closed case make a suggestion 2014-04-18 11:00:27     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (e60138c36a9c3a41f042fbf4d2a07ca5)follow up this md5sum(e60138c36a9c3a41f042fbf4d2a07ca5)follow up this malware() for scanner () in md5 table0/43 (0.0%) 
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/j/KQ5IMt/zus/?au=Fk ...  up No previous evidence recordedSaved evidence (7805 Bytes) of last contact as txt April 19 2014 09:13:55 CEST. aliveSaved log of last contact as txt April 19 2014 09:13:55 CEST. follow up this ip (ip=213.239.201.125) as RSS-FeedSenderBaselookup 213.239.201.125 at virustotallookup 213.239.201.125 at Rus CERT university stuttgart germanylookup 213.239.201.125 at Ripefollow up this item(ip) in same window 213.239.201.125 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS24940) in networks tablefollow up this itemfollow up this AS (AS24940) as RSS-Feed AS24940 follow up this ip (review=46.4.73.106) as RSS-FeedSenderBaselookup 46.4.73.106 at virustotallookup 46.4.73.106 at Rus CERT university stuttgart germanylookup 46.4.73.106 at Ripefollow up this item(review) in same window 46.4.73.106 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/j/KQ5IMt/zus/?au=Fk ... follow up this domain (iqelite.com) as RSS-Feedlookup iqelite.com at virustotalfollow up this domain(iqelite.com) iqelite.com follow up this itemfollow up this country (DE) as RSS-Feed DE follow up this itemfollow up this region (RIPE) as RSS-Feed RIPE follow up this itemfollow up this enail (abuse@hetzner.de) as RSS-Feed abuse@hetzner.de follow up this itemfollow up this item 213.239.200.0 - 213.239.201.255 follow up this item DE-HETZNER-20100819 follow up this item Hetzner Online AG follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/j/KQ5IMt/zus/?au=Fk ...
3 follow up this item(25292125) 25292125 Report false positive Report closed case make a suggestion 2014-04-18 09:36:57     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (4e00536c4d7bcbc0c30f5859c7d8847b)lookup in threatexpert.comlookup the sha256(85961a09f92d7f823d474d6566855e6aac5814aebd73c3f8a11cbe44cf6f6d7d) in comodo.comfollow up this md5sum(4e00536c4d7bcbc0c30f5859c7d8847b)follow up this itemfollow up this virusname (TR%2FDropper.Gen) as RSS-Feedlookup Virusname at avirafollow up this malware(TR%2FDropper.Gen) for scanner (avira) in md5 table0/43 (0.0%) TR/Dropper.Gen
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://dlnjic.filecondo.com/download_reg ...  up No previous evidence recordedSaved evidence (2242356 Bytes) of last contact as txt April 19 2014 08:04:18 CEST. aliveSaved log of last contact as txt April 19 2014 08:04:18 CEST. follow up this ip (ip=111.223.32.201) as RSS-FeedSenderBaselookup 111.223.32.201 at virustotallookup 111.223.32.201 at Rus CERT university stuttgart germanylookup 111.223.32.201 at apnicfollow up this item(ip) in same window 111.223.32.201 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS23884) in networks tablefollow up this itemfollow up this AS (AS23884) as RSS-Feed AS23884 follow up this ip (review=111.223.32.201) as RSS-FeedSenderBaselookup 111.223.32.201 at virustotallookup 111.223.32.201 at Rus CERT university stuttgart germanylookup 111.223.32.201 at apnicfollow up this item(review) in same window 111.223.32.201 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://dlnjic.filecondo.com/download_reg ... follow up this domain (filecondo.com) as RSS-Feedlookup filecondo.com at virustotalfollow up this domain(filecondo.com) filecondo.com follow up this itemfollow up this country (TH) as RSS-Feed TH follow up this itemfollow up this region (APNIC) as RSS-Feed APNIC follow up this itemfollow up this enail (kittipan@proen.co.th) as RSS-Feed kittipan@proen.co.th follow up this itemfollow up this item 111.223.32.0 - 111.223.42.255 follow up this item VisualWeb follow up this item WebHosting Bangkok Thailand follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://dlnjic.filecondo.com/download_reg ...
4 follow up this item(25291791) 25291791 Report false positive Report closed case make a suggestion 2014-04-18 09:30:26     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (83fee281217dff684f35fccc09dc78cc)follow up this md5sum(83fee281217dff684f35fccc09dc78cc)follow up this malware() for scanner () in md5 table0/43 (0.0%) 
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://api.oemoe.com/  up No previous evidence recordedSaved evidence (73 Bytes) of last contact as txt April 19 2014 09:00:11 CEST. aliveSaved log of last contact as txt April 19 2014 08:54:02 CEST. follow up this ip (ip=162.209.122.21) as RSS-FeedSenderBaselookup 162.209.122.21 at virustotallookup 162.209.122.21 at Rus CERT university stuttgart germanylookup 162.209.122.21 at ARINfollow up this item(ip) in same window 162.209.122.21 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS19994) in networks tablefollow up this itemfollow up this AS (AS19994) as RSS-Feed AS19994 follow up this ip (review=162.209.122.21) as RSS-FeedSenderBaselookup 162.209.122.21 at virustotallookup 162.209.122.21 at Rus CERT university stuttgart germanylookup 162.209.122.21 at ARINfollow up this item(review) in same window 162.209.122.21 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://api.oemoe.com/ follow up this domain (oemoe.com) as RSS-Feedlookup oemoe.com at virustotalfollow up this domain(oemoe.com) oemoe.com follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@rackspace.com) as RSS-Feed abuse@rackspace.com follow up this itemfollow up this item 162.209.0.0 - 162.209.127.255 follow up this item RACKS-8-NET-12 follow up this item Rackspace Hosting RACKS-8 5000 Walzem Road San Antonio TX 78218 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://api.oemoe.com/
5 follow up this item(25197634) 25197634 Report false positive Report closed case make a suggestion 2014-04-17 07:04:19     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (6ab29b7c4194ba37b540b0878c20fb9f)follow up this md5sum(6ab29b7c4194ba37b540b0878c20fb9f)follow up this itemfollow up this virusname (a+variant+of+Win32%2FELEX.AF) as RSS-Feedfollow up this malware(a+variant+of+Win32%2FELEX.AF) for scanner () in md5 table0/43 (0.0%) a variant of Win32/ELEX.AF
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/smt_qone8.e ...  up No previous evidence recordedSaved evidence (564336 Bytes) of last contact as txt March 25 2014 09:08:07 CET. aliveSaved log of last contact as txt April 17 2014 09:01:29 CEST. follow up this ip (ip=208.43.232.118) as RSS-FeedSenderBaselookup 208.43.232.118 at virustotallookup 208.43.232.118 at Rus CERT university stuttgart germanylookup 208.43.232.118 at ARINfollow up this item(ip) in same window 208.43.232.118 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS36351) in networks tablefollow up this itemfollow up this AS (AS36351) as RSS-Feed AS36351 follow up this ip (review=173.193.180.130) as RSS-FeedSenderBaselookup 173.193.180.130 at virustotallookup 173.193.180.130 at Rus CERT university stuttgart germanylookup 173.193.180.130 at ARINfollow up this item(review) in same window 173.193.180.130 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/smt_qone8.e ... follow up this domain (po114.us) as RSS-Feedlookup po114.us at virustotalfollow up this domain(po114.us) po114.us follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@softlayer.com) as RSS-Feed abuse@softlayer.com follow up this itemfollow up this item 208.43.0.0 - 208.43.255.255 follow up this item SOFTLAYER-4-8 follow up this item SoftLayer Technologies Inc. SOFTL 4849 Alpha Rd. Dallas TX 75244 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/smt_qone8.e ...
6 follow up this item(25121041) 25121041 Report false positive Report closed case make a suggestion 2014-04-16 14:51:42     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (5e3fc1c6b03357e913f2f5f64e2f15e9)follow up this md5sum(5e3fc1c6b03357e913f2f5f64e2f15e9)follow up this malware() for scanner () in md5 table0/43 (0.0%) 
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/entry/new_message/2 ...  up No previous evidence recordedSaved evidence (7805 Bytes) of last contact as txt April 16 2014 15:43:06 CEST. aliveSaved log of last contact as txt April 16 2014 15:43:06 CEST. follow up this ip (ip=213.239.201.125) as RSS-FeedSenderBaselookup 213.239.201.125 at virustotallookup 213.239.201.125 at Rus CERT university stuttgart germanylookup 213.239.201.125 at Ripefollow up this item(ip) in same window 213.239.201.125 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS24940) in networks tablefollow up this itemfollow up this AS (AS24940) as RSS-Feed AS24940 follow up this ip (review=46.4.73.106) as RSS-FeedSenderBaselookup 46.4.73.106 at virustotallookup 46.4.73.106 at Rus CERT university stuttgart germanylookup 46.4.73.106 at Ripefollow up this item(review) in same window 46.4.73.106 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/entry/new_message/2 ... follow up this domain (iqelite.com) as RSS-Feedlookup iqelite.com at virustotalfollow up this domain(iqelite.com) iqelite.com follow up this itemfollow up this country (DE) as RSS-Feed DE follow up this itemfollow up this region (RIPE) as RSS-Feed RIPE follow up this itemfollow up this enail (abuse@hetzner.de) as RSS-Feed abuse@hetzner.de follow up this itemfollow up this item 213.239.200.0 - 213.239.201.255 follow up this item DE-HETZNER-20100819 follow up this item Hetzner Online AG follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://a.iqelite.com/entry/new_message/2 ...
7 follow up this item(25078302) 25078302 Report false positive Report closed case make a suggestion 2014-04-15 18:31:45     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (7bc9e37ef8c958d55cdc6be1220a5a9a)follow up this md5sum(7bc9e37ef8c958d55cdc6be1220a5a9a)follow up this malware() for scanner () in md5 table0/43 (0.0%) 
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://wasnior.com/  up No previous evidence recordedSaved evidence (4897 Bytes) of last contact as txt April 15 2014 21:59:06 CEST. aliveSaved log of last contact as txt April 15 2014 21:59:06 CEST. follow up this ip (ip=66.55.143.100) as RSS-FeedSenderBaselookup 66.55.143.100 at virustotallookup 66.55.143.100 at Rus CERT university stuttgart germanylookup 66.55.143.100 at ARINfollow up this item(ip) in same window 66.55.143.100 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS20473) in networks tablefollow up this itemfollow up this AS (AS20473) as RSS-Feed AS20473 follow up this ip (review=66.55.143.100) as RSS-FeedSenderBaselookup 66.55.143.100 at virustotallookup 66.55.143.100 at Rus CERT university stuttgart germanylookup 66.55.143.100 at ARINfollow up this item(review) in same window 66.55.143.100 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://wasnior.com/ follow up this domain (wasnior.com) as RSS-Feedlookup wasnior.com at virustotalfollow up this domain(wasnior.com) wasnior.com follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@choopa.com) as RSS-Feed abuse@choopa.com follow up this itemfollow up this item 66.55.128.0 - 66.55.159.255 follow up this item CHOOPA-NETBLK02 follow up this item Choopa, LLC CHOOP-1 2400 Main Street Extension Suite 12 Sayreville NJ 08872 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://wasnior.com/
8 follow up this item(25069573) 25069573 Report false positive Report closed case make a suggestion 2014-04-15 15:33:11     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (ab9795cd5daec274e7eb11f2133302fa)follow up this md5sum(ab9795cd5daec274e7eb11f2133302fa)follow up this itemfollow up this virusname (Adware.Win32.Natzoo.aai) as RSS-Feedfollow up this malware(Adware.Win32.Natzoo.aai) for scanner () in md5 table0/43 (0.0%) Adware.Win32.Natzoo.aai
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/bdo_qone8.e ...  up No previous evidence recordedSaved evidence (564888 Bytes) of last contact as txt April 10 2014 05:46:45 CEST. aliveSaved log of last contact as txt April 15 2014 17:09:13 CEST. follow up this ip (ip=208.43.232.118) as RSS-FeedSenderBaselookup 208.43.232.118 at virustotallookup 208.43.232.118 at Rus CERT university stuttgart germanylookup 208.43.232.118 at ARINfollow up this item(ip) in same window 208.43.232.118 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS36351) in networks tablefollow up this itemfollow up this AS (AS36351) as RSS-Feed AS36351 follow up this ip (review=173.193.180.132) as RSS-FeedSenderBaselookup 173.193.180.132 at virustotallookup 173.193.180.132 at Rus CERT university stuttgart germanylookup 173.193.180.132 at ARINfollow up this item(review) in same window 173.193.180.132 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/bdo_qone8.e ... follow up this domain (po114.us) as RSS-Feedlookup po114.us at virustotalfollow up this domain(po114.us) po114.us follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@softlayer.com) as RSS-Feed abuse@softlayer.com follow up this itemfollow up this item 208.43.0.0 - 208.43.255.255 follow up this item SOFTLAYER-4-8 follow up this item SoftLayer Technologies Inc. SOFTL 4849 Alpha Rd. Dallas TX 75244 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://www.po114.us/hpnt/new/bdo_qone8.e ...
9 follow up this item(25056169) 25056169 Report false positive Report closed case make a suggestion 2014-04-15 10:31:12     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
lookup in virustotal.com (057e34bb37d70114c08c37510fc91e66)follow up this md5sum(057e34bb37d70114c08c37510fc91e66)follow up this itemfollow up this virusname (Troj%2FPHPRed-D) as RSS-Feedfollow up this malware(Troj%2FPHPRed-D) for scanner () in md5 table0/43 (0.0%) Troj/PHPRed-D
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://firstrussianbank.com/dishonest.ph ...  up No previous evidence recordedSaved evidence (314 Bytes) of last contact as txt April 15 2014 16:49:54 CEST. aliveSaved log of last contact as txt April 15 2014 16:49:54 CEST. follow up this ip (ip=68.178.254.126) as RSS-FeedSenderBaselookup 68.178.254.126 at virustotallookup 68.178.254.126 at Rus CERT university stuttgart germanylookup 68.178.254.126 at ARINfollow up this item(ip) in same window 68.178.254.126 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS26496) in networks tablefollow up this itemfollow up this AS (AS26496) as RSS-Feed AS26496 follow up this ip (review=68.178.254.126) as RSS-FeedSenderBaselookup 68.178.254.126 at virustotallookup 68.178.254.126 at Rus CERT university stuttgart germanylookup 68.178.254.126 at ARINfollow up this item(review) in same window 68.178.254.126 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://firstrussianbank.com/dishonest.ph ... follow up this domain (firstrussianbank.com) as RSS-Feedlookup firstrussianbank.com at virustotalfollow up this domain(firstrussianbank.com) firstrussianbank.com follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@godaddy.com) as RSS-Feed abuse@godaddy.com follow up this itemfollow up this item 68.178.128.0 - 68.178.255.255 follow up this item GO-DADDY-SOFTWARE-INC follow up this item GoDaddy.com, Inc. GODAD 14455 N Hayden Road Suite 226 Scottsdale AZ 85260 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://firstrussianbank.com/dishonest.ph ...
10 follow up this item(25042252) 25042252 Report false positive Report closed case make a suggestion 2014-04-15 05:00:38     follow up this itemfollow up this contributor (test) as RSS-Feed sub16possible lookup Evidence at malwaredomainlist.com
13/50 (26%) 
 
JS/Clicker
JS:Autolike-Q
Trj
TrojWare.JS.FBook.A
JS/FBook.NAP
JS/FBJack.A!tr
Trojan.JS.Clicker
HEUR:Trojan.Script.Generic
JS/Faceliker.b
JS/Faceliker.b
TrojanClicker:JS/Faceliker.D
Fbjack.J
Mal/FBJack-A
Trojan.JS.Faceliker.d
(v) 
 lookup in virustotal.com (d5edfba32347191f91f308f516b74b70)-->[http://www.virustotal.com/latest-report.html?resource=d5edfba32347191f91f308f516b74b70]follow up this md5sum(d5edfba32347191f91f308f516b74b70)follow up this itemfollow up this virusname (JS%3AAutolike-Q+Trj) as RSS-Feedfollow up this malware(JS%3AAutolike-Q+Trj) for scanner (Avast) in md5 table13/50 (26%) JS:Autolike-Q Trj
Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://androidpk.net/viewtopic.php?f=5&t ...  up No previous evidence recordedSaved evidence (36603 Bytes) of last contact as txt April 15 2014 10:54:51 CEST. aliveSaved log of last contact as txt April 15 2014 10:54:51 CEST. follow up this ip (ip=160.153.1.1) as RSS-FeedSenderBaselookup 160.153.1.1 at virustotallookup 160.153.1.1 at Rus CERT university stuttgart germanylookup 160.153.1.1 at ARINfollow up this item(ip) in same window 160.153.1.1 possible lookup  in maliciousnetworks.org (FIRE: FInding RoguE Networks) pagepossible lookup in google safebrowsing pagefollow up this AS (AS26496) in networks tablefollow up this itemfollow up this AS (AS26496) as RSS-Feed AS26496 follow up this ip (review=160.153.1.1) as RSS-FeedSenderBaselookup 160.153.1.1 at virustotallookup 160.153.1.1 at Rus CERT university stuttgart germanylookup 160.153.1.1 at ARINfollow up this item(review) in same window 160.153.1.1 Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://androidpk.net/viewtopic.php?f=5&t ... follow up this domain (androidpk.net) as RSS-Feedlookup androidpk.net at virustotalfollow up this domain(androidpk.net) androidpk.net follow up this itemfollow up this country (US) as RSS-Feed US follow up this itemfollow up this region (ARIN) as RSS-Feed ARIN follow up this itemfollow up this enail (abuse@godaddy.com) as RSS-Feed abuse@godaddy.com follow up this itemfollow up this item 160.153.0.0 - 160.153.255.255 follow up this item GO-DADDY-COM-LLC follow up this item GoDaddy.com, LLC GODAD 14455 N Hayden Road Suite 226 Scottsdale AZ 85260 follow up this item ns33.domaincontrol.com follow up this item ns34.domaincontrol.com follow up this item  follow up this item  follow up this item  Safe Virus-Viewer and Analyser may take a minute to completelookup in virustotal http://androidpk.net/viewtopic.php?f=5&t ...
Click here for other vital incidents



Protected by clean MX [Valid RSS] Valid HTML 4.01 Transitional CSS ist valide!
Access is provided for free and subject to these Terms and Conditions.