Help RSS API Feed Maltego Contact                        

Domain > genie.co.uk

More information on this domain is in AlienVault OTX

Is this malicious?

Files that talk to genie.co.uk

MD5A/V
5e5f2ba73005a54ea71e591feff2b1d7[Artemis!5E5F2BA73005] [Trojan.Win32.Jorik.Cutwail.pgy]
d2f2c9e7b5d32c5114a2f8511d9efcc2
a472f9d1a78fa6cb3eb6896d9c319726[TrojanDownloader.Cutwail.bs] [Backdoor.Bot] [Riskware] [Trojan.Win32.Pushdo.btelgd] [WS.Reputation.1] [BKDR_PUSHDO.FC] [Backdoor.Win32.Pushdo.qgz] [Backdoor.Pushdo!+jNmAzmKgNc] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor/Win32.Pushdo] [W32/Backdoor.RMSR-3833] [Trojan.CryptHWZ] [W32/Pushdo.QGZ!tr.bdr] [Crypt.CHWZ] [Trj/Pushdo.L]
a0b0bde17bb93f2af14fcc3771aef4f3
6bd3a60b66efb707e894f2717cccf17b
2c2371e95bb5d87ccd5d19a114492f70[HW32.CDB.18af] [Packed.Win32.Katusha.3!O] [WS.Reputation.1] [Kryptik.CDQY] [TrojWare.Win32.Kryptik.CBCJ] [BackDoor.Slym.13873] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Tepfer] [Heur.Trojan.Hlux] [Backdoor.Win32.Kelihos] [Crypt_s.GNC] [Trojan.Win32.Kryptik.CBCJ] [Win32/Trojan.0de]
8b7c5fe0eaad467bb999a2c1f7dd7486[TrojanDownloader.Cutwail] [Backdoor.Bot] [Riskware] [Trojan.Win32.Pushdo.btaipu] [W32.Pilleuz] [TROJ_CUTWAIL.CNA] [Win32.Trojan] [Backdoor.Win32.Pushdo.qhe] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor/Win32.Pushdo] [W32/Backdoor.IQVD-6602] [Trojan.CryptILH] [W32/Pushdo.QHE!tr.bdr] [Crypt.CILH] [Trj/Pushdo.L]
3be8faf7b111dadde0d8e17b428125b0[Backdoor/W32.Androm.39936.C] [Trojan.Androm.vsg.cw4] [Trojan.Inject] [Trojan/Kryptik.bdbi] [Trojan.Win32.Androm.btkkib] [WS.Reputation.1] [TROJ_CUTWAIL.PQP] [Backdoor.Win32.Androm.vsg] [Backdoor.Androm!mmztmFLZ69E] [UnclassifiedMalware] [BackDoor.Bulknet.958] [Win32.HeurC.KVMH004.a.(kcloud)] [TrojanDownloader:Win32/Cutwail] [Client-SMTP.39936] [W32/Backdoor.DIPS-1259] [Backdoor.Androm] [Virus.Win32.Cryptor] [W32/Androm.VSG!tr.bdr] [Win32/Cryptor] [W32/Palevo.GEZ.worm]
5ea646ffdc1e9bc7759fdfc926de7660[PWS-FASY!5EA646FFDC1E] [Malware.Packer.EGX7] [Password-Stealer] [Trojan] [Hlux.XD] [Trojan-PSW.Win32.Tepfer.ijnk] [BackDoor.Slym.1498] [TR/Rogue.14575.23] [Heuristic.BehavesLike.Win32.Suspicious-BAY.G] [Troj/Tepfer-Q] [Backdoor:Win32/Kelihos.F] [Trojan/Win32.Foreign] [HeurEngine.MaliciousPacker] [Win32/Kelihos.F] [Trojan-PWS.Win32.Tepfer] [W32/Kryptik.X!tr] [Trj/Tepfer.B]
b4f310f5cc7b9cd68d919d50a8415974[HW32.Laneul.zqwg] [Trojan/W32.Jorik.40448.U] [TrojanDownloader.Cutwail] [Trojan] [Trojan.Win32.Jorik.byfbdv] [W32.Pilleuz] [Win32/Cutwail.RfLHODC] [TROJ_SPNR.0BGS13] [Trojan.Win32.Jorik.Cutwail.prm] [Trojan.Cutwail!Vn3uTMMB5CM] [UnclassifiedMalware] [BackDoor.Bulknet.958] [TR/Graftor.103216] [Win32.Troj.Undef.(kcloud)] [TrojanDownloader:Win32/Cutwail.BS] [Client-SMTP.40448.A] [Dropper/Win32.Vidro] [BScope.Trojan.Pushdo] [Malware.Pilleuz!rem] [Trojan-Downloader.Win32.Cutwail] [W32/Pushdo.YOY!tr] [SHeur4.BNRB] [Trj/CI.A] [TrojanDownloader*Win32/Cutwail.BS]
152fbf67adaa5455ac89003f69528244[BackDoor-FAYA!152FBF67ADAA]
3d79b35a81f544862ae5a347831857c6[HW32.CDB.Eb76] [Packed.Win32.Katusha.3!O] [WS.Reputation.1] [Kryptik.CCFN] [Backdoor.Win32.Hlux.dtjw] [UnclassifiedMalware] [BackDoor.Slym.13011] [Backdoor:Win32/Kelihos] [Heur.Trojan.Hlux] [Win32/Kryptik.CBNK] [Trojan.Crypt_s] [W32/Kryptik.BD!tr] [Crypt_s.GPC] [Backdoor.Win32.Hlux.Ae] [Win32/Trojan.337]
06d40abb65ee157ff2574df8d24743f1
89c64a4ee7b13dd2dbdcf4a05f71312a[TrojanDownloader*Win32/Cutwail.BS]
43415b6d9537a142cec2c22c31f8bfae[Cutwail-FBYD!43415B6D9537] [Backdoor.Pushdo] [Backdoor.Win32.Pushdo.qev] [Trojan.Kryptik!NPQTFtfoX4A] [UnclassifiedMalware] [BackDoor.Bulknet.893] [Artemis!43415B6D9537] [TrojanDownloader:Win32/Cutwail] [Trojan.CryptCQK] [W32/Pushdo.QEV!tr.bdr] [Crypt.CCQK] [Trj/Dtcontx.E]
82d62080e472af17170f4752ebd4ebd1[W32.Pilleuz] [Pushdo.G] [Backdoor.Win32.Pushdo.pwz] [Heur.Suspicious] [BackDoor.Bulknet.847] [TrojanDownloader:Win32/Cutwail.BS] [Backdoor.Win32.S.Pushdo.36864] [W32/Backdoor.SFNI-6924] [Malware.Pilleuz!rem] [Win32/Wigon.PH] [Trojan.Crypt] [W32/Pushdo.PWZ!tr.bdr] [SHeur4.BFXO]
a423bbddf78450753f1a239711408b91[Crypt_c.ABJD] [TrojanDownloader*Win32/Cutwail.BS]
b50e50a9a6c3d407f4b1fac8759d95f6
63e2d975b940af1a4ae7c80f7f6f7052[TrojanDownloader*Win32/Cutwail.BS]
f0eec37a33ad2efee7080820ec596e83[Win.Trojan.Ransom-2439]

Whois

PropertyValue
NameO2 Holdings Limited
Address 354 Buckingham Avenue
Zip Code SL1 4PF
City Slough
State Berkshire
Country United Kingdom
NameServer ns1.02.net
Created before Aug-1996
Changed 2014-08-06 00:00:00
Expires 2016-09-09 00:00:00
Registrar TELEF?NICA UK LIMITE

DNS Resolutions

DateIP Address
2013-06-1982.132.141.84 (ClassC)
2014-03-27217.10.79.197 (ClassC)
2025-06-0282.132.141.84 (ClassC)

Subdomains

DateDomainIP
you.genie.co.uk2025-05-2382.132.141.84
www.genie.co.uk2025-05-2182.132.141.84
my.genie.co.uk2025-05-2282.132.141.84
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information