Help
RSS
API
Feed
Maltego
Contact
Domain > dt.tongji.linezing.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to dt.tongji.linezing.com
MD5
A/V
4ae4e154df5df80ebf7baaf8e115ae56
[
HW32.CDB.49b4
] [
WS.Reputation.1
] [
TrojWare.Win32.FlowSpirit.H
] [
Trojan.DownLoader10.29061
] [
TR/Zusy.57368.3
] [
Win32.Heur.KVMF39.hy.(kcloud)
] [
Trojan/Win32.Clicker
] [
Win32.Trojan.Falsesign.Pgwy
]
18d5e0c3e53e927b0eedbcb258ec1431
[
HW32.CDB.5746
] [
Artemis!18D5E0C3E53E
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.7
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
Trj/CI.A
] [
AdWare.SuspectCRC
] [
SHeur4.BUNC
] [
Win32/Virus.Adware.89c
]
bb2a4b95111a2321350f8fb2e5c4686c
[
W32.Clod76c.Trojan.fd9b
] [
Artemis!BB2A4B95111A
] [
HKTL_CLICKER
] [
Riskware.FlowSpirit!
] [
Trojan.DownLoader8.21721
] [
Win32.Heur.KVMF26.hy.(kcloud)
] [
Win32/FlowSpirit
] [
Win32/Trojan.Adware.37e
] [
Heur.Suspicious
] [
Trojan/Win32.Clicker
]
0c4b83d9baeb335600f9890b03a6b4e6
[
HW32.CDB.5cef
] [
Artemis!0C4B83D9BAEB
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.4
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
W32/Trojan.EGOI-7762
] [
AdWare.SuspectCRC
] [
SHeur4.BUND
] [
Trj/CI.A
]
16a8cb6ce98a152ecb4cb15cacde44a1
[
HW32.CDB.9035
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
Trj/CI.A
] [
AdWare.SuspectCRC
] [
SHeur4.BUYP
]
43ce9823e1b35b58a709516f8979f3b0
[
HW32.CDB.4270
] [
Artemis!43CE9823E1B3
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.5
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
W32/Trojan.SFPY-4486
] [
Trj/CI.A
] [
Dropper
] [
SHeur4.BUNA
] [
Win32/Virus.7d9
]
05dc10e71b1ed675cd8343e78e1ae6d0
[
Artemis!05DC10E71B1E
] [
Trojan.Win32.Click2.crhghj
] [
WS.Reputation.1
] [
Trojan.Click2.35671
] [
Win32.Troj.Undef.(kcloud)
] [
W32/Trojan.KRMP-0807
] [
Trj/CI.A
] [
Dropper
] [
Win32/Virus.Adware.358
]
005cd7cd57265779de98834cd64c5ac6
[
HW32.CDB.412f
] [
Artemis!005CD7CD5726
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
Trj/CI.A
] [
AdWare.SuspectCRC
] [
SHeur4.BUJE
]
aacba21e9b71e9ff2d5abf75d199ca91
[
W32.OnGamesLT180912HKGHAAI.Trojan
] [
Trojan-Downloader.Win32.VB!O
] [
Backdoor.Bot
] [
W32/Behav-Heuristic-060
] [
Trojan.DL.VB!NKMd94PFscg
] [
W32/Heuristic-210!Eldorado
] [
Trojan.Dropper
] [
Win32/SillyDl.YSH
] [
TSPY_ONLINEG.FYU
] [
Trojan-Downloader.Win32.VB.hbou
] [
Trojan.Win32.VB.csmvzm
] [
Packed.Win32.UPack
] [
Packed.Win32.MUPACK.~KW
] [
Trojan.Click1.62589
] [
Downloader.VB.Win32.17957
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.K
] [
Trojan/PSW.OnLineGames.awgh
] [
Trojan[Downloader]/Win32.VB
] [
Win32.TrojDownloader.VB.(kcloud)
] [
TrojanDownloader:Win32/VB.P
] [
Win-Trojan/Xema.variant
] [
W32/Trojan.HVTM-2163
] [
Trojan.VBS.01765
] [
Trojan.
]
870c309871d61e82a671391190bdc42e
[
Artemis!870C309871D6
] [
PUP.Optional.Startpage
] [
Win32.Troj.Undef.(kcloud)
] [
W32/StartPage.NY!tr
]
4a2afb6cefcf5caef0eddde122d4e5e1
[
HW32.CDB.F8bc
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.7
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
Trj/CI.A
] [
AdWare.SuspectCRC
] [
SHeur4.BUNC
]
084167d9d615bc48dde19ca351a944d6
[
HW32.CDB.67be
] [
Artemis!084167D9D615
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.7
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
AdWare.SuspectCRC
] [
SHeur4.BUNC
] [
Trj/CI.A
] [
Win32/Virus.Adware.89c
]
f6c0b7207456a73936279c324961f887
[
TrojanDropper.VB.HV3
] [
Trojan/VBKrypt.kkr
] [
Riskware
] [
Trojan.Win32.StartPage.cqjna
] [
Win32/VBKrypt.DQ
] [
Trojan.Win32.VBKrypt.kkr
] [
Trojan.VBKrypt!0FqkaZCJTtw
] [
BackDoor.Pigeon.61745
] [
TROJ_VBDROP.SMIA
] [
Heuristic.LooksLike.Win32.Suspicious.J!80
] [
Mal/StartP-Z
] [
Win32.Troj.VBKrypt.k.(kcloud)
] [
TrojanDropper:Win32/VB.HV
] [
Trojan.VBKrypt.kkr
] [
Trojan.Popsenong!3D9B
] [
Trojan.Win32.Pasta
] [
W32/VBDropper.XC!tr
]
12fbaacb83fa976be8d75f161e5611d0
[
HW32.CDB.77eb
] [
Artemis!12FBAACB83FA
] [
WS.Reputation.1
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.7
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
W32/Trojan.DEXT-7811
] [
Trj/CI.A
] [
Dropper
] [
SHeur4.BUNC
] [
Win32/Virus.Adware.89c
]
304e61b9d0e27a78ff6e42bd199c2c91
[
W32.excCloud16a.PE
] [
Win32.VJadtre.3
] [
Virus.Win32.Otwycal.1!O
] [
W32.Otwyacal.C
] [
W32/Simfect
] [
Virus.Win32.Otwycal.dszex
] [
W32.Wapomi.C!inf
] [
Win32/Wapomi.CD
] [
Virus.Win32.Otwycal.a
] [
Win32.Otwycal.A
] [
Virus.Win32.Wapomi.AA
] [
Win32.HLLP.Protil.1
] [
W32/Jadtre.A
] [
PE_WAPOMI.SM
] [
Heuristic.LooksLike.Win32.SuspiciousPE.F
] [
W32/Patched-AG
] [
Win32/Protil.e
] [
Virus/Win32.Otwycal.a
] [
Win32.Otwycal.xp.112128
] [
Virus:Win32/Mikcer.A
] [
Win32/Wampori
] [
Virus.Win32.Heur.d
] [
Virus.Otwycal.a
] [
Win32/Wapomi.AA
] [
Virus.Win32.Dropper.a
] [
Trojan.Win32.Pincav
] [
Win32/Wapomi
] [
Virus.Win32.Otwycal.$a
] [
Virus.Win32.Downloader.AB
]
645d60825b362448151387d060593635
[
W32.Clod9e1.Trojan.1d9a
] [
Trojan.Win32.DownLoader10.cqvkbc
] [
WS.Reputation.1
] [
HKTL_CLICKER
] [
Trojan.Win32.S.Clicker.649728
] [
UnclassifiedMalware
] [
Trojan.DownLoader10.26566
] [
SPR/Surfairy.A
] [
Trj/CI.A
] [
Trojan.SuspectCRC
] [
Malware_fam.NB
] [
Hacktool.Win32.RiskTool.77
] [
Win32/DH{DyAiJQ}
]
de9d855c48d0801c2820d6b39ce3fb6a
[
W32.Clod6b9.Trojan.0a6b
] [
Artemis!DE9D855C48D0
] [
Heur.Suspicious
] [
Trojan/Win32.Clicker
] [
Win32/FlowSpirit
] [
W32/FlowSpirit
]
51e8432c002b3f5db6af293d8914db20
[
HW32.CDB.C343
] [
Trojan-Dropper/W32.Dorgam.719360
] [
Dropper.Dorgam.Win32.511
] [
Trojan.DR.Dorgam!X+JE5hDRm6s
] [
WS.Reputation.1
] [
Trojan-Dropper.Win32.Dorgam.qrd
] [
Trojan.Win32.Dorgam.cwlzbs
] [
Virus.Win32.Heur.l
] [
Trojan.DownLoader10.48426
] [
TR/Zusy.81792.5
] [
Heuristic.LooksLike.Win32.Suspicious.F
] [
Mal/FakeAV-US
] [
TrojanDropper.Dorgam.nd
] [
Trojan[Dropper]/Win32.Dorgam
] [
Win32.Troj.Dorgam.q.(kcloud)
] [
W32/Trojan.TEME-9381
] [
Packed/Win32.MultiPacked
] [
Trojan-Dropper.Win32.Dorgam
] [
Trojan.Win32.Dorgam.As
] [
Win32/Virus.bf0
]
0495c1de8c5b9c20cfc313542fc48d20
[
Artemis!0495C1DE8C5B
] [
Trojan.Win32.Click2.crhghj
] [
WS.Reputation.1
] [
Trojan.Click2.35671
] [
Win32.Troj.Undef.(kcloud)
] [
W32/Trojan.HSRT-6243
] [
Trj/CI.A
] [
Dropper
]
4299b565747828a9510958a82008cf80
[
HW32.CDB.Bbc6
] [
Artemis!4299B5657478
] [
TrojWare.Win32.Injector.jm2
] [
Trojan.Click2.35671
] [
Adware/Rogue.683817.5
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Win32.Troj.Undef.(kcloud)
] [
Trj/CI.A
] [
Dropper
] [
SHeur4.BUNA
] [
Win32/Virus.7d9
]
Whois
Property
Value
Email
dnsadmin@hk.alibaba-inc.com
NameServer
NS5.TAOBAO.COM
Created
2008-12-28 00:00:00
Changed
2014-11-27 00:00:00
Expires
2016-12-28 00:00:00
Registrar
MARKMONITOR INC.