Help
RSS
API
Feed
Maltego
Contact
Domain > taykon.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to taykon.com
MD5
A/V
c05f0c46dbc6bfe046ad7ca12cf9f98e
[
W32.Cloda2c.Trojan.5c7a
] [
PWSZbot-FLN!C05F0C46DBC6
] [
Spyware.Zbot
] [
TrojanSpy.Zbot!d3kAaGLa0Gg
] [
Suspicious.Cloud
] [
TSPY_ZBOT.WGJ
] [
Trojan-Spy.Win32.Zbot.qqte
] [
Trojan.Win32.Zbot.cmzhij
] [
Trojan.PWS.Panda.4379
] [
TR/Spy.ZBot.anb.1
] [
Win32.Troj.Zbot.qq.(kcloud)
] [
PWS:Win32/Zbot
] [
Win32/Spy.Zbot.AAU
] [
Trojan-PWS.Win32.Zbot
] [
W32/Zbot.QQTE!tr
] [
Trojan.Win32.Zbot.Ax
]
33d59790d4d3544afd6451254ec798b1
[
W32.DalverT.Trojan
] [
Backdoor/W32.Pushdo.89600.B
] [
Backdoor.Pushdo.rw4
] [
Spyware.ZeuS
] [
Trojan.Win32.Bulknet.czolua
] [
W32/Trojan2.OEJI
] [
Backdoor.Trojan
] [
Win32/Cutwail.CCE
] [
TROJ_CUTWAIL.YAI
] [
Backdoor.Win32.Pushdo.rmj
] [
Backdoor.Pushdo!XgbPif+v0XE
] [
Backdoor.Win32.A.Pushdo.89600
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.1442
] [
Backdoor.Pushdo.Win32.715
] [
TR/Cutwail.A.75
] [
Mal/Zbot-QL
] [
Trojan[Backdoor]/Win32.Pushdo
] [
TrojanDownloader:Win32/Cutwail
] [
W32/Trojan.RRZR-0800
] [
Backdoor.Pushdo
] [
Trj/WLT.A
] [
Win32/Wigon.PH
] [
Win32.Backdoor.Pushdo.Lkxp
] [
Trojan.Cutwail
] [
W32/Pushdo.RMJ!tr.bdr
] [
Trojan.Win32.Wigon.bPH
] [
Win32/Trojan.3ea
] [
Backdoor.Pushdo.r4
]
5345aff5ce85c0d99c484f2716071b7a
[
Win32.Heur.KVMF58.hy.(kcloud)
]
27d68493cb15b516c63e7785a65af8e7
[
BC.Heuristic.Trojan.SusPacked.BF-6.A
] [
Trojan.Win32.Zbot.20992.D
] [
Trojan.DownLoad3.28161
] [
Troj/Mdrop-FPG
] [
Win32.Troj.Bublik.bm.(kcloud)
] [
TrojanDownloader:Win32/Upatre.A
] [
Win32/TrojanDownloader.Waski.A
] [
PE:Malware.FakePDF!1.9C28
]
42d2401c479fc20e5d1d8c6efca7f19e
[
Trojan.Downloader.JQRA
] [
Trojan.Cutwail.rw4
] [
RDN/Downloader.a!qm
] [
Trojan.Cutwail!mQbvvMquKfg
] [
W32/Trojan2.OEGP
] [
ZBot.UPRE
] [
Win32/Cutwail.ReCaaAD
] [
TROJ_SPNR.0BEM14
] [
Trojan.Win32.Cutwail.ctz
] [
Trojan.Win32.Cutwail.cydmbj
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.1150
] [
TR/Jaik.1660.4
] [
Mal/Zbot-PT
] [
Trojan/Win32.Cutwail
] [
Win32.Troj.Cutwail.c.(kcloud)
] [
TrojanDownloader:Win32/Cutwail
] [
W32/Trojan.AFBM-0787
] [
Win32/Wigon.PI
] [
Trj/WLT.A
] [
Win32.Trojan.Cutwail.Pdmg
] [
Trojan-Downloader.Win32.Cutwail
] [
W32/Cutwail.CTZ!tr
] [
Trojan.Win32.Wigon.bPI
] [
Win32/Trojan.a00
]
b84dc225a3c93b1a2a403a332a27257c
[
W32.WingMaI.Trojan
] [
RDN/Downloader.a!qm
] [
WS.Reputation.1
] [
Cutwail.COY
] [
Backdoor.Win32.Pushdo.rmc
] [
Backdoor.Pushdo!JByiFQxqnkU
] [
TR/Cutwail.A.68
] [
Mal/Zbot-PY
] [
TrojanDownloader:Win32/Cutwail
] [
Trj/dtcontx.L
] [
Win32/Wigon.PI
] [
Win32.Backdoor.Pushdo.Pezl
] [
Trojan-Downloader.Win32.Cutwail
] [
W32/Wigon.PI!tr
] [
Backdoor.Win32.Pushdo.Awv
] [
Win32/Trojan.9f9
]
3ac0df25ff3cd15c4a55069d1a140c0d
[
Artemis!3AC0DF25FF3C
] [
WS.Reputation.1
] [
Backdoor.Win32.Pushdo.rgg
] [
W32/Etap.B
] [
Backdoor.Win32.Pushdo.Anx
]
8043461e3d18f379dfd5c1d3dda25c6f
[
TrojanDownloader.Cutwail.BS4
] [
PWS-FBOF!
] [
Spyware.Zbot
] [
Trojan.Cutwail!ksLthdR/J5A
] [
W32/Trojan2.OBNX
] [
Backdoor.Trojan
] [
Kryptik.CDDW
] [
Win32/Cutwail.CAK
] [
BKDR_PUSHDO.IP
] [
Trojan.Win32.Cutwail.chg
] [
Trojan.Win32.Cutwail.cucyjl
] [
Trojan.Win32.A.Cutwail.87552
] [
TrojWare.Win32.Spy.Zbot.FRIN
] [
Trojan.PWS.Panda.5756
] [
TR/Injector.90112.43
] [
Trojan/Cutwail.ab
] [
Trojan/Win32.Cutwail
] [
Win32.Troj.Cutwail.c.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Spyware/Win32.Zbot
] [
W32/Trojan.WQFW-5190
] [
Trj/WLT.A
] [
Win32/Wigon.PI
] [
Win32.Trojan.Cutwail.Dxcl
] [
Trojan-Downloader.Win32.Cutwail
] [
W32/Cutwail.CHG!tr
] [
SHeur4.BRVM
] [
Trojan.Win32.Cutwail.aG
]
005b480a6b845bbd5286e699c29b9426
[
Backdoor.Bot
] [
BC.Heuristic.Trojan.SusPacked.BF-6.A
] [
Heuristic.LooksLike.Win32.Suspicious.J!81
] [
Win32/Heur
] [
Virus.Win32.Heur
]
f15be0daa762c12cda891a6390d77e86
[
WS.Reputation.1
] [
TROJ_CRILOCK.RNT
] [
Backdoor.Win32.Pushdo.rks
] [
TR/Crypt.ZPACK.40047
] [
Trojan[Backdoor]/Win32.Pushdo
] [
W32/Pushdo.RKS!tr.bdr
] [
SHeur4.BTFZ
]
5b88188ee5306549b12d14aabea25e4f
[
Cutwail-FCWE!5B88188EE530
] [
Trojan.Downloader
] [
Backdoor.Trojan
] [
Kryptik.CCOH
] [
TROJ_SPNV.01J013
] [
BackDoor.Bulknet.1150
] [
TR/Dldr.Cutwail.BS.274
] [
Trj/Ransom.BB
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor/Win32.Trojan
] [
Win32/Wigon.PH
] [
Trojan-Downloader.Win32.Cutwail
] [
W32/Kryptik.BMDF
] [
Trojan.Win32.Kryptik.BMDF
]
556c3819778ac91261be8821206aa1ca
[
Trojan.Zbot.cw3
] [
Trojan.Crypt.NKN
] [
Trojan.VBKrypt.Win32.226775
] [
Trojan.Win32.VBKrypt.cvwaev
] [
W32/Trojan4.AFNE
] [
WS.Reputation.1
] [
Win32/Zbot.IDY
] [
TROJ_FORUCON.BMC
] [
Trojan.Win32.VBKrypt.uqco
] [
Trojan.VBKrypt!sgvTFCNPRto
] [
UnclassifiedMalware
] [
BackDoor.Andromeda.273
] [
TR/Dropper.VB.12577
] [
Trojan/VBKrypt.jafc
] [
PWS:Win32/Zbot
] [
Backdoor/Win32.Androm
] [
W32/Trojan.XEYN-6246
] [
Virus.Win32.Heur.p
] [
Trj/WLT.A
] [
Win32/Wigon.PH
] [
Virus.Win32.VBInject
] [
W32/VBKrypt.PH!tr
] [
SHeur4.BSLG
] [
Trojan.Win32.VBKrypt.ahI
] [
Win32/Trojan.Multi.daf
]
9e79c93a017e5a7232fb2c8de35d3d19
[
RDN/Downloader.a!qh
] [
Spyware.ZeuS
] [
Trojan.Cutwail!YdjtHWnkh+w
] [
WS.Reputation.1
] [
ZBot.UPRE
] [
TROJ_CUTWAIL.XZQ
] [
Trojan.Win32.Cutwail.csw
] [
UnclassifiedMalware
] [
TR/Changeling.A.1489
] [
Mal/Zbot-PT
] [
TrojanDownloader:Win32/Cutwail
] [
Trojan/Win32.Cutwail
] [
W32/Trojan.IGDL-1304
] [
Trojan.Cutwail
] [
Win32/Wigon.PH
] [
Trojan-Dropper.Necurs
] [
W32/Cutwail.CSW!tr
] [
Trojan.Win32.Wigon.PH
] [
Win32/Trojan.Multi.daf
]
5a39cb50b1ae4f84cbda561194969220
[
W32.VariantCgripkE.Trojan
] [
Backdoor.Pushdo.r4
] [
RDN/Downloader.a!qf
] [
Trojan/Kryptik.caki
] [
WS.Reputation.1
] [
ZBot.STQQ
] [
TROJ_SPNR.1ADP14
] [
Backdoor.Win32.Pushdo.rlq
] [
Trojan.Inject1.41930
] [
TR/Dldr.Cutwail.120
] [
Troj/Wonton-BX
] [
TrojanDownloader:Win32/Cutwail
] [
Dropper/Win32.Necurs
] [
W32/Trojan.QKYI-1976
] [
Trojan.Win32.Kryptik.CAKI
] [
Trojan-Dropper.Necurs
] [
W32/KRYPTIK.BX!tr
] [
Win32/Backdoor.8e5
]
c6da1ec05de4dc102209acb4df0a6d8e
[
TrojanPWS.Zbot
] [
PWSZbot-FEY
] [
Trojan.Inject
] [
Trojan/Spy.Zbot.aau
] [
Trojan.Win32.Yakes.cfhaiy
] [
Infostealer.Bancos
] [
ZBot.NAIF
] [
TSPY_ZBOT.VNA
] [
Trojan.Win32.Yakes.depm
] [
Trojan.Yakes!t2ImEqK95FY
] [
TrojWare.Win32.Yakes.DEPM
] [
Trojan.PWS.Panda.4379
] [
TR/Crypt.ZPACK.7596
] [
PWSZbot-FDN!C6DA1EC05DE4
] [
Trojan/Yakes.rde
] [
Trojan/Win32.Yakes
] [
PWS:Win32/Zbot
] [
W32/Trojan.YDOM-8167
] [
Trojan.Yakes
] [
Trj/Yakes.B
] [
Win32/Spy.Zbot.AAU
] [
Trojan.Win32.Yakes
] [
W32/Yakes.AAU!tr
] [
Trojan.Win32.Zbot.axoN
]
364f24c920dc07e3f8f8b0766c41a69e
[
HW32.Laneul.ceai
] [
Spyware.Zbot
] [
Backdoor.Trojan
] [
Trojan.Win32.Cutwail.clj
] [
BackDoor.Bulknet.1150
] [
TR/Cutwail.A.42
] [
Artemis!364F24C920DC
] [
Backdoor/Win32.Pushdo
] [
Win32/Wigon.PI
] [
Trojan.Win32.Cutwail
] [
W32/Cutwail.CLJ!tr
] [
SHeur4.BSAS
] [
Trojan.Win32.Cutwail.ay
] [
Trojan.Cutwail.cw5
] [
Trojan/Wigon.pi
] [
Trojan.Cutwail!ZBDbTanDOOE
] [
W32/Backdoor2.HUFB
] [
Cutwail.CHY
] [
Win32/Cutwail.WRIaLRD
] [
TROJ_CUTWAIL.XZC
] [
Trojan.Win32.Cutwail.cuflxg
] [
Trojan/Win32.Cutwail
] [
TrojanDownloader:Win32/Cutwail
] [
W32/Backdoor.AJWN-4315
] [
Trojan.Cutwail.clj
] [
Trj/WLT.A
]
8bb8a34edd755c342e3755ab3490e182
[
W32/Trojan3.GLN
] [
Trojan.Zbot
] [
Trojan.Win32.Bublik.bkef
] [
Trojan.DownLoad3.28161
] [
TR/Drop.Zbot.Q
] [
Heuristic.LooksLike.Win32.Suspicious.J!81
] [
Mal/EncPk-ZC
] [
W32/Trojan.VYIA-4984
] [
Trojan/Win32.Zbot
] [
Trojan.Spy.Zbot.FHM
] [
Trojan.Dropper
] [
Trojan-Spy.Zbot
] [
W32/Small.BS!tr.dldr
]
da53b7983185de17e67579e2de0231be
[
Trojan-Dropper.Win32.Dorifel.aguj
] [
W32/Injector.ALPQ!tr
]
1c5953fcd6ba3a14a1480058ca561ad6
[
HW32.CDB.Fc8d
] [
Cutwail.CAS
] [
Heuristic.LooksLike.Win32.SuspiciousPE.J
]
e0dd0139dda0decec433d4ca03bcf98b
[
Backdoor.Pushdo!EjcShSXKblg
] [
Kryptik.CDNW
] [
Backdoor.Win32.Pushdo.rko
] [
Trojan.Win32.Pushdo.cwbpfm
] [
Backdoor.Win32.A.Pushdo.96256
] [
TR/Crypt.ZPACK.35529
] [
Trojan[Backdoor]/Win32.Pushdo
] [
Spyware/Win32.Zbot
] [
Virus.Win32.Injector
] [
W32/Pushdo.RKO!tr.bdr
] [
Pakes_c.BLLI
] [
Trojan.Win32.Kryptik.BYZC
] [
Win32/Trojan.a4e
]
Whois
Property
Value
Email
domains@atakweb.com
NameServer
KARA.NS.CLOUDFLARE.COM
Created
2002-05-10 00:00:00
Changed
2014-04-10 00:00:00
Expires
2016-05-10 00:00:00
Registrar
FBS INC.
DNS Resolutions
Date
IP Address
2013-07-29
94.102.11.39
(
ClassC
)
2013-08-07
141.101.116.127
(
ClassC
)
2013-08-19
141.101.117.127
(
ClassC
)
2013-09-27
141.101.117.127
(
ClassC
)
2013-10-06
108.162.193.145
(
ClassC
)
2013-10-11
108.162.192.145
(
ClassC
)
2013-10-11
108.162.193.145
(
ClassC
)
2013-10-11
108.162.192.145
(
ClassC
)
2013-11-08
108.162.192.101
(
ClassC
)
2013-11-08
108.162.193.101
(
ClassC
)
2013-11-18
94.102.11.89
(
ClassC
)
2013-12-11
94.102.11.89
(
ClassC
)
2014-05-13
108.162.194.26
(
ClassC
)
2014-05-16
108.162.195.26
(
ClassC
)
2014-05-17
108.162.195.26
(
ClassC
)
2014-05-18
108.162.192.9
(
ClassC
)
2014-06-13
108.162.194.121
(
ClassC
)
2014-06-16
108.162.193.82
(
ClassC
)
2014-06-18
108.162.192.82
(
ClassC
)
2014-07-03
108.162.193.82
(
ClassC
)
2014-07-03
141.101.116.127
(
ClassC
)
2014-08-21
104.28.7.18
(
ClassC
)
2014-11-04
104.28.7.18
(
ClassC
)
2014-11-18
104.28.6.18
(
ClassC
)
2019-05-10
94.73.145.120
(
ClassC
)
2019-06-19
85.159.66.62
(
ClassC
)
2019-07-27
18.211.9.206
(
ClassC
)
2020-05-07
23.20.239.12
(
ClassC
)
2020-12-30
3.223.115.185
(
ClassC
)
2023-12-12
3.18.7.81
(
ClassC
)
2023-12-29
3.94.41.167
(
ClassC
)
2024-03-06
52.86.6.113
(
ClassC
)
2024-04-12
34.205.242.146
(
ClassC
)
2024-04-25
3.130.204.160
(
ClassC
)
2024-05-03
52.71.57.184
(
ClassC
)
2024-05-26
3.19.116.195
(
ClassC
)
2024-06-08
18.119.154.66
(
ClassC
)
2024-06-13
3.130.253.23
(
ClassC
)
Subdomains
Date
Domain
IP
www.taykon.com
2014-04-12
141.101.117.127
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]