Help
RSS
API
Feed
Maltego
Contact
Domain > infected.1.vg
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to infected.1.vg
MD5
A/V
10c65a919cd40e513d540ac576deb95f
[
W32/Backdoor.UHHF-6376
] [
Trojan.Mybot-5834
] [
Win32.HLLW.Agobot
] [
Win32/Agobot.ADS
] [
Worm/Agobot.54.AC
] [
Backdoor.Win32.Agobot
] [
Worm*Win32/Gaobot
] [
Suspicious.IRCBot
] [
Backdoor.Agobot
]
8d66bec5b2d8804499facb2489ea1016
[
W32.Clod518.Trojan.ea39
] [
I-Worm.Kolabc.ccr
] [
W32/Kolabc.ccr
] [
Trojan.Win32.Kolabc.oxid
] [
W32/AgobotX.ZX
] [
Suspicious.IRCBot
] [
Smalltroj.LBPR
] [
Trojan.Mybot-5834
] [
Net-Worm.Win32.Kolabc.ccr
] [
Worm.Kolabc!INxLRiBOr90
] [
Heur.Packed.MultiPacked
] [
Win32.HLLW.Agobot
] [
Heuristic.LooksLike.Win32.Suspicious.C
] [
Backdoor/Agobot.cse
] [
Worm[Net]/Win32.Kolabc
] [
Win32.Hack.Agobot.(kcloud)
] [
Worm:Win32/Gaobot
] [
Backdoor.Win32.S.IRCBot.226304.B
] [
W32/Agobot.FVNJ-4908
] [
Win32/IRCBot.worm.variant
] [
Backdoor.Agobot
] [
Trj/CI.A
] [
Win32/Agobot.ADS
] [
Backdoor.Win32.Agobot
] [
Worm/Agobot.54.AC
] [
Worm.Win32.Kolabc.AV
]
DNS Resolutions
Date
IP Address
2024-08-28
138.201.129.184
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Mon, 04 Dec 2023 11:22:43 GMTServer: Apache/2.4.48 (Ubuntu)Location: https://infected.1.vg/Content-Length: 309Content-Type: text/html; charsetiso-8859-1 !DOCTYPE HTML PUBLIC -//IETF//DTD HTML 2.0//EN>html>head>title>301 Moved Permanently/title>/head>body>h1>Moved Permanently/h1>p>The document has moved a hrefhttps://infected.1.vg/>here/a>./p>hr>address>Apache/2.4.48 (Ubuntu) Server at infected.1.vg Port 80/address>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]