Help RSS API Feed Maltego Contact                        

Domain > wpa.qq.com

Welcome! Right click nodes and scroll the mouse to navigate the graph.
More information on this domain is in AlienVault OTX

Is this malicious?

Most users have voted this as not malicious

Files that talk to wpa.qq.com

MD5A/V
13d7dcd3a14b2e682a4b7f60d128de7c[Trojan.Script.CF] [HTML:Script-inf] [Trojan.Url.IframeB.lcarg] [Mal/Badsrc-C] [Trojan.JS.Redirector] [JS/Redir]
b21b4af6bc067657534a7551026e57d7[Heuristic.BehavesLike.Win32.Suspicious-BAY.K]
b373e3c3013f96b5fde63c8de0f2c5e3
03893aacdb93cae023140a1c04eb4739[W32.IsertIfr.Worm] [Trojan.Iframe.KX] [HTML/Iframe.REF] [Trojan.Url.Iframe.bgznd] [HTML/IFrame] [W32.Virut!html] [Iframe.IL] [HTML/Virut] [HTML_IFRAME.LCA] [HTML.Iframe-63] [Trojan.HTML.Iframe.gb] [HTML.Malurl.G] [TrojWare.JS.Iframe.AM] [JS.IFrame.393] [HTML/TrojanDownloader.IFrame] [HTML:Hack.Exploit.Script.HTML.IFrame.DL!1588056] [Exploit.HTML.IframeRef] [HTML/Virut.CE!tr] [HTML/Framer] [virus.html.url]
754380a6c87595265650108d1241a85b[Artemis!754380A6C875] [Trojan.NSIS.StartPage.ed] [TrojWare.Win32.StartPage.KPY] [Trojan.DownLoader9.11773] [Heuristic.BehavesLike.Win32.Suspicious-PKR.S] [Win32.Troj.NSIS.ed.(kcloud)] [WS.Reputation.1] [Startpage.ITTF] [Riskware.Nsis.StartPage.cuhkxp] [Mal/DwnLdr-AJ] [Trojan.StartPage] [Trojan.NSIS] [W32/StartPage.ED!tr] [Trj/CI.A] [Win32/SillyDl.EYbLOdC] [Nsis.Trojan.Startpage.Agbb] [Trojan.StartPage.Win32.20827]
0bf4ee44abe44eb4e670ab19c4a08d37[Redirector.GN] [Troj/Lololo-A] [Heuristic.BehavesLike.JS.Suspicious.A] [Trojan.Script.2964] [JS/Lololo.A!tr]
194c4a5a481660c14e9a93b0dc4c166e[W32.IsertIfr.Worm] [Trojan.Iframe.KX] [HTML/Iframe.REF] [Trojan.Url.Iframe.bgznd] [HTML/IFrame] [W32.Virut!html] [Iframe.IL] [HTML/Virut] [HTML_IFRAME.LCA] [HTML.Iframe-63] [Trojan.HTML.Iframe.gb] [HTML.Malurl.G] [TrojWare.JS.Iframe.AM] [JS.IFrame.393] [HTML/TrojanDownloader.IFrame] [HTML:Hack.Exploit.Script.HTML.IFrame.DL!1588056] [Exploit.HTML.IframeRef] [HTML/Virut.CE!tr] [HTML/Framer]
104b5d02f29e6b08ddebbd19e5b64b0f[W32.IsertIfr.Worm] [Trojan.IFrame.KP] [HTML/Iframe.REF] [HTML.Malurl.G] [HTML/IFrame] [W32.Virut!html] [Iframe.IL] [HTML/Virut] [HTML.Iframe-63] [Trojan.HTML.IFrame.dh] [Trojan.Url.Iframe.bgznd] [Html.Win32.Script.1500691] [TrojWare.JS.Iframe.AM] [JS.IFrame.393] [HTML_IFRAME.SMS] [HTML/TrojanDownloader.IFrame] [HTML:Hack.Exploit.Script.HTML.IFrame.DL!1588056] [Exploit.HTML.IframeRef] [HTML/Virut.CE!tr] [HTML/Framer] [virus.html.url]
61235a5722cff00cb96fcf96e3262474[JS/Obfuscated.r] [Script.BD] [Mal/WinDocWr-A] [Trojan.JS.Obfuscated] [JS/WinDocW.A!tr]
294a68e980ad94ec83e01e937dd9c4f2[Trojan.Script.CF] [HTML:Script-inf] [Trojan.Url.IframeB.lcarg] [Mal/Badsrc-C] [Trojan.JS.Redirector] [JS/Redir]
c47d4c5742f110b0f949d90289098cbf[JS/Obfuscated.r] [Script.BD] [Mal/WinDocWr-A] [Trojan.JS.Obfuscated] [JS/WinDocW.A!tr]
acc20e6f3b277a9b9342d4efa1b38520[HW32.Paked.415E] [Trojan.Packed.193]
c400d25e8c610d738b3ede1481e460f5
c4a249f58cbc6322b77a3b3c79f09814[W32.GartanaH.Trojan] [Artemis!C4A249F58CBC] [WS.Reputation.1] [Delfiles.BP] [BDS/Rogue.766668] [W32/Backdoor.CCZS-4992] [Trojan/Win32.Downloader] [Backdoor.Win32.SuspectCRC]
09c39e9e86f9fd0fe7195c2eaba05599[WS.Reputation.1] [Trojan.DownLoader10.59807]
363e7b957595d482dc675a9f73aaf3f2
229edcf1395823181835f267481c92ea[Artemis!229EDCF13958] [Trojan.Startpage] [Trojan.ADH] [Startpage.ITVE] [TROJ_SPNV.01AU14] [Trojan.NSIS.StartPage.ed] [Mal/DwnLdr-AJ] [TrojWare.Win32.StartPage.KPY] [Trojan.DownLoader9.20353] [Heuristic.BehavesLike.Win32.Suspicious-PKR.S] [Win32.Troj.NSIS.ed.(kcloud)] [W32/StartPage.ED!tr]
94707b87917cbf9dd54361bb9e8255e3
db0864763927a5cf79319ac2a616bc73
11463da7f3f77ca1b7581ba861f51e0a

Whois

PropertyValue
Email dns@tencent.com
NameServer NS2.QQ.COM
Created 1995-05-04 00:00:00
Changed 2015-01-21 00:00:00
Expires 2018-05-05 00:00:00
Registrar HICHINA ZHICHENG TEC

DNS Resolutions

DateIP Address
2013-04-01121.14.77.159 (ClassC)
2013-04-01183.60.14.10 (ClassC)
2013-04-01121.14.77.186 (ClassC)
2013-04-01112.90.141.82 (ClassC)
2013-04-12119.147.192.15 (ClassC)
2013-04-15183.60.17.115 (ClassC)
2013-04-17183.60.17.175 (ClassC)
2013-08-19103.7.28.63 (ClassC)
2013-08-20103.7.28.64 (ClassC)
2013-08-20103.7.28.62 (ClassC)
2013-10-12183.60.17.189 (ClassC)
2013-10-13119.147.192.13 (ClassC)
2013-10-13183.60.17.211 (ClassC)
2013-10-16183.60.17.112 (ClassC)
2013-10-16119.147.192.14 (ClassC)
2013-10-17119.147.192.10 (ClassC)
2013-11-07103.7.28.62 (ClassC)
2013-12-30112.95.242.171 (ClassC)
2013-12-30112.95.243.216 (ClassC)
2014-01-01112.90.143.118 (ClassC)
2014-01-02103.7.28.63 (ClassC)
2014-01-03112.90.143.119 (ClassC)
2014-01-19103.7.28.64 (ClassC)
2014-05-27112.90.83.87 (ClassC)
2014-06-30112.90.83.87 (ClassC)
2018-05-28119.147.192.16 (ClassC)
2019-05-2614.215.158.24 (ClassC)
2022-09-0113.127.247.216 (ClassC)
2023-04-19202.83.24.75 (ClassC)
2023-07-0858.251.100.24 (ClassC)
2023-12-13157.255.220.247 (ClassC)
2025-04-1343.159.234.172 (ClassC)
2025-07-1943.129.2.11 (ClassC)

Port 80

Subdomains

DateDomainIP
0.qq.com2025-07-150.0.0.1
1010.qq.com2021-07-21203.205.137.227
2010.qq.com2015-03-24163.177.65.160
gz2010.qq.com2025-07-120.0.0.1
110.qq.com2025-07-10203.205.232.81
tg110.qq.com2025-04-2543.135.106.42
weixin110.qq.com2023-08-04129.226.102.161
wx110.qq.com2025-06-24101.91.34.216
update.win10.qq.com2025-06-1043.135.105.195
2020.qq.com2025-07-12129.226.107.210
aps0550.qq.com2014-12-26202.55.10.165
cf0.qq.com2024-04-1436.250.242.248
isdimg0.qq.com2014-11-15113.108.88.110
1.qq.com2015-08-27101.226.62.63
1001.qq.com2020-10-301.31.108.213
101.qq.com2023-07-19203.205.234.24
pick.101.qq.com2025-07-170.0.0.1
pick101.qq.com2025-07-120.0.0.1
2011.qq.com2025-07-120.0.0.1
1111.qq.com2025-07-150.0.0.1
masterconn11.qq.com2025-07-12157.255.4.39
nba2021.qq.com2025-07-12203.205.137.78
61.qq.com2018-11-12103.7.30.123
81.qq.com2018-09-14101.206.209.12
91.qq.com2025-07-030.0.0.1
wpa1.qq.com2025-07-05129.226.107.210
omgmta1.qq.com2024-07-14119.45.78.184
legopic1.qq.com2024-07-2242.56.64.130
ns-cnc1.qq.com2025-05-27140.207.180.96
d1.qq.com2025-07-110.0.0.1
dlied1.qq.com2013-11-28121.10.26.71
View on OTX | View on ThreatMiner








Data with thanks to AlienVault OTX, VirusTotal, Malwr and others. [Sitemap]



� Copyright 2019 AlienVault, Inc. | Legal| Status| Do Not Sell My Personal Information