Help
RSS
API
Feed
Maltego
Contact
Domain > go.id
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to go.id
MD5
A/V
40707cdcd4220213b9ef2545043d6c99
[
W32.RansomBitmanAB.Trojan
] [
Trojan/W32.TeslaCrypt.397312
] [
Ransomware.Teslacrypt.A5
] [
Ransom.TeslaCrypt
] [
Trojan.TeslaCrypt.Win32.26
] [
Trojan.Win32.AVKill.eanowu
] [
Trojan.Cryptolocker.N
] [
Win32/Filecoder.TeslaCrypt.I
] [
Ransom_CRYPTESLA.YUYAIH
] [
Trojan-Banker.Win32.Shifu.cxf
] [
Trojan.PWS.Shifu!
] [
Troj.Banker.W32.Shifu!c
] [
Win32.Trojan-banker.Shifu.Palk
] [
Mal/Ransom-EK
] [
TrojWare.Win32.Ransom.TeslaCrypt.~O
] [
Trojan.AVKill.60094
] [
Ransom_CRYPTESLA.YUYAIH
] [
BehavesLike.Win32.Backdoor.fm
] [
Trojan.Banker.Shifu.hd
] [
TR/Crypt.ZPACK.230282
] [
Trojan[Banker]/Win32.Shifu
] [
Ransom:Win32/Tescrypt!rfn
] [
Trojan/Win32.Teslacrypt
] [
Ransomware-FFD!40707CDCD422
] [
Trojan-Ransom.Locky
] [
W32/Kryptik.EPFR!tr
] [
FileCryptor.HPZ
]
19abd8bcd698dcdbcfe2637af16e95bf
36c2253e7672ed747b11d886c722496a
[
JS/Nemucod.jg
] [
Script.Troj.Downloader!c
] [
JS.Trojan-Downloader.Nemucod.oa
] [
Trojan.Script.Heuristic-js.iacgm
] [
JS/Nemucod.jg
] [
Troj/JSDwnldr-W
] [
JS/Nemucod.CA1!Eldorado
] [
JS/Nemucod.BJJ!tr
] [
Js.Trojan.Raas.Auto
] [
Script.Trojan-Downloader.Locky.CQ
]
1f869624fd7318284e1b7fa4da7d625a
[
JS/Nemucod.jg
] [
JS.Trojan-Downloader.Nemucod.oa
] [
Trojan.Script.Heuristic-js.iacgm
] [
Troj/JSDwnldr-W
] [
JS/Nemucod.jg
] [
Script.Trojan-Downloader.Locky.CQ
] [
JS/Nemucod.BJJ!tr
]
3567d09b02d35f9508e50fba2efdb0bf
[
JS/Nemucod.jg
] [
JS.Trojan-Downloader.Nemucod.oa
] [
JS/Nemucod.CA1!Eldorado
] [
JS/TrojanDownloader.Nemucod.BJM
] [
Trojan.Script.Heuristic-js.iacgm
] [
Troj/JSDwnldr-W
] [
JS/Nemucod.jg
] [
Script.Trojan-Downloader.Locky.CQ
] [
Js.Trojan.Raas.Auto
] [
JS/Nemucod.BJJ!tr
]
da27c1b110249d9f9b00ff349539eca7
[
JS.Trojan-Downloader.Nemucod.od
] [
JS_NEMUCOD.SMK9
] [
Trojan.Script.Heuristic-js.iacgm
] [
JS_NEMUCOD.SMK9
]
806981e87036066fd61f90dbf540e9f5
9e6e8db890bcb7d256817fd00658d20c
cf6ade6c7593c81a1671549f9a82c10a
[
W32/ZAccess.AE!tr
]
0dd56a0b8ea7bedb57cebf9aacdac40f
[
Malware.Packer.HGX1
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
W32/Kryptik.AXUE!tr
]
08683b9b64e4591ff831047af73fa568
[
JS:Trojan.Downloader.Nemucod.AB
] [
JS.Downloader
] [
Trojan.Script.Nemucod.ebdqck
] [
Trojan.Obfus/JS!1.A51E
] [
JS:Trojan.Downloader.Nemucod.AB
] [
JS:Trojan.Downloader.Nemucod.AB
] [
JS:Trojan.Downloader.Nemucod.AB
] [
JS:Trojan.Downloader.Nemucod.AB
] [
JS/Nemucod.jf
] [
Win32.Outbreak
] [
JS/Nemucod.YP!tr.dldr
]
b8f9f5d5d7dc4351e633e6ffb069387a
6afa251279c646aee1c52e3f14c54ed0
ed7dc12a7c9a3f953e365e24eaebe2c9
461ce5d46cb74a656d29d1825f76b6c9
56f9d3f478166807217bff6dc690decc
edec92ecf45fae80dbb2ef35586913cd
[
JS.Swabfex.HG
] [
JS.Trojan.Nemucod.fb
] [
JS/Locky.AM4!Eldorado
] [
JS.Downloader
] [
JS/TrojanDownloader.Nemucod.AHJ
] [
JS_NEMUCOD.DLDUH
] [
Trojan.Script.Heuristic-js.iacgm
] [
Trojan.Obfus/JS!1.A5EB
] [
Troj/JSDwnld-F
] [
JS.DownLoader.1697
] [
JS_NEMUCOD.DLDUH
] [
JS/Nemucod.jt
] [
JS/Locky.AM4!Eldorado
] [
TrojanDownloader.JS.bhrb
] [
TrojanDownloader:JS/Nemucod.FJ
] [
JS/Obfus.S67
] [
JS/Nemucod.jt
] [
Js.Trojan.Raas.Auto
] [
Trojan.JS.Reverser
] [
JS/Nemucod.F2A!tr
] [
trojan.js.downloader.2
]
1a7a91d772560bd842f99ee92d711f7d
3223f61af50aa26a1c3bb96fe1779011
[
HW32.CDB.D56b
] [
Packed.Win32.Katusha.3!O
] [
Backdoor.Hlux.r3
] [
Backdoor.Hlux.Win32.9065
] [
Trojan.Win32.Kryptik.czfnsp
] [
Trojan.FakeAV
] [
Kryptik.CCQY
] [
Backdoor.Win32.Hlux.dueu
] [
Backdoor.Hlux!DdFHfWii/ns
] [
UnclassifiedMalware
] [
TR/Kryptik.oenzk
] [
Backdoor:Win32/Kelihos
] [
Trojan/Win32.FakeAV
] [
Heur.Trojan.Hlux
] [
Backdoor.Win32.Hlux.cri
] [
Trojan.Crypt3
] [
W32/Kryptik.CBOM!tr
] [
Crypt3.ORV
] [
Backdoor.Win32.Hlux.Acmu
] [
Win32/Trojan.7bf
]
2c05ffe297116df3062faac792c44c91
[
HW32.CDB.B4b9
] [
Packed.Win32.Katusha.3!O
] [
WS.Reputation.1
] [
Kryptik.CDQY
] [
UnclassifiedMalware
] [
BackDoor.Slym.13873
] [
Win32.Troj.Undef.(kcloud)
] [
Backdoor:Win32/Kelihos.F
] [
Trojan/Win32.Tepfer
] [
Heur.Trojan.Hlux
] [
Trojan.Crypt_s
] [
W32/Kryptik.BD!tr
] [
Crypt_s.GNC
] [
Win32/Trojan.0de
]
Whois
Property
Value
Organization
Perkumpulan Pengelola Nama Domain Internet Indonesia (PANDI)
Email
aidil@pandi.or.id
NameServer
E.DNS.ID
Created
1993-02-27 00:00:00
Changed
2015-05-01 00:00:00