Help
RSS
API
Feed
Maltego
Contact
Domain > www.2012tj.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to www.2012tj.com
MD5
A/V
631e785bee54e992892ce1ae424d90e5
[
W32.SafeDrvHAR.Worm
] [
Worm.Autorun.DM8
] [
Artemis!631E785BEE54
] [
Trojan.Downloader
] [
Trojan
] [
Trojan.Win32.Buzus.bnskj
] [
W32.Buzus
] [
Suspicious_F.E
] [
Win32/Autorun.K
] [
Mal_Otorun5
] [
Trojan.Win32.Diple.aoyk
] [
Trojan.Buzus!1xqIPjvIXyo
] [
Trojan.Win32.Buzus.59401
] [
TrojWare.Win32.Buzus.ebgb
] [
Trojan.MulDrop2.64109
] [
TR/Spy.Hacko.3
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Troj/Buzus-FX
] [
Trojan/Buzus.abqg
] [
Trj/Buzus.AH
] [
Worm.Autorun.(kcloud)
] [
Worm:Win32/Yeltminky.A
] [
Trojan/Win32.Buzus
] [
Virus.Win32.Heur.a
] [
BScope.P2P-Worm.Palevo
] [
Malware.Buzus
] [
Win32/AutoRun.Delf.EP
] [
Worm.Win32.Autorun.tux
] [
Trojan-Spy.Hacko
] [
W32/Delf.EP!worm
] [
Worm.Win32.AutoRun.40
]
7787e98b23d9a7e7875e4b9ae564a0ba
[
W32.SafeDrvHAR.Worm
] [
Worm.Autorun.DM8
] [
Artemis!7787E98B23D9
] [
Trojan.Downloader
] [
Riskware
] [
Trojan
] [
Trojan/Buzus.eeux
] [
Trojan.Win32.Buzus.bnskj
] [
W32.Buzus
] [
Suspicious_F.E
] [
Mal_Otorun5
] [
Win32:Virut-AGQ
] [
Worm.Win32.AutoRun.gcpp
] [
Trojan.Buzus!1xqIPjvIXyo
] [
Troj/Buzus-FX
] [
Win32.HLLW.Autoruner.45767
] [
TR/Spy.Hacko.3
] [
Mal_Otorun5
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Trojan/Buzus.abqg
] [
Win32.Troj.Buzus.(kcloud)
] [
Worm:Win32/Yeltminky.A
] [
Trojan.Win32.Buzus.59401
] [
Virus.Win32.Heur.a
] [
BScope.P2P-Worm.Palevo
] [
Win32/AutoRun.Delf.EP
] [
Worm.Win32.Autorun.tux
] [
Trojan-Spy.Hacko
] [
W32/Delf.EP!worm
]
c0f49dc98720e9ab38c2bff809af7c23
[
W32.SafeDrvHAR.Worm
] [
Packed.Win32.TDSS!O
] [
Worm.Autorun.DM8
] [
Artemis!C0F49DC98720
] [
Trojan.Downloader
] [
Trojan.Buzus!1xqIPjvIXyo
] [
W32.Buzus
] [
Suspicious_F.E
] [
Win32/Autorun.K
] [
Worm.Win32.AutoRun.gcpp
] [
Trojan.Win32.Buzus.bnskj
] [
Trojan.Win32.Buzus.59401
] [
Virus.Win32.Heur.a
] [
Worm.Win32.AutoRun.aag
] [
TrojWare.Win32.Buzus.ebgb
] [
Worm.Win32.AutoRun
] [
Mal_Otorun5
] [
Heuristic.BehavesLike.Win32.Suspicious-BAY.G
] [
Troj/Buzus-FX
] [
Trojan/Win32.Buzus
] [
Worm.Autorun.(kcloud)
] [
Worm:Win32/Yeltminky.A
] [
Trojan/Win32.Buzus
] [
Win32/AutoRun.Delf.EP
] [
BScope.P2P-Worm.Palevo
] [
Trj/Buzus.AH
] [
Trojan-PWS.Win32.Lmir
] [
W32/Delf.EP!worm
] [
Trojan.Win32.Buzus.AmVX
] [
Win32/Trojan.a1b
]
Whois
Property
Value
Email
test_download110@163.com
NameServer
DNS.IDCSH.NET
Created
2014-11-23 00:00:00
Changed
2014-11-23 00:00:00
Expires
2015-11-23 00:00:00
Registrar
XIN NET TECHNOLOGY C
DNS Resolutions
Date
IP Address
2013-10-08
2019-05-13
185.106.3.106
(
ClassC
)
2019-06-12
185.106.3.249
(
ClassC
)
2019-06-13
185.106.3.250
(
ClassC
)
2019-08-10
185.106.3.189
(
ClassC
)
2019-08-26
185.106.3.184
(
ClassC
)
2019-09-17
185.106.3.187
(
ClassC
)
2019-10-08
185.106.3.188
(
ClassC
)
2019-12-31
185.106.3.251
(
ClassC
)
2020-01-20
185.106.3.190
(
ClassC
)
2020-01-20
185.106.3.185
(
ClassC
)
2020-02-08
185.106.3.252
(
ClassC
)
2020-08-26
13.75.95.168
(
ClassC
)
2020-10-07
35.220.240.242
(
ClassC
)
2021-01-31
35.221.192.134
(
ClassC
)
2021-04-22
103.44.31.15
(
ClassC
)
2021-06-18
185.216.248.56
(
ClassC
)
2021-07-10
156.245.15.20
(
ClassC
)
2021-08-06
45.207.62.139
(
ClassC
)
2021-09-25
156.245.15.21
(
ClassC
)
2021-10-07
119.8.233.226
(
ClassC
)
2022-01-07
20.195.93.43
(
ClassC
)
2022-08-09
20.205.38.175
(
ClassC
)
2022-08-09
20.205.38.5
(
ClassC
)
2023-03-21
20.205.46.214
(
ClassC
)
2024-07-08
20.205.118.3
(
ClassC
)
2024-07-11
20.239.17.84
(
ClassC
)
2024-07-27
20.205.11.135
(
ClassC
)
2024-08-17
20.6.176.99
(
ClassC
)
2024-11-13
20.255.104.129
(
ClassC
)
2025-01-08
20.255.208.255
(
ClassC
)
2025-01-23
20.255.200.238
(
ClassC
)
2025-04-26
154.89.120.150
(
ClassC
)
2025-05-03
156.224.139.108
(
ClassC
)
2025-06-13
154.89.120.142
(
ClassC
)
2025-09-04
156.224.139.198
(
ClassC
)
2025-09-23
156.224.139.146
(
ClassC
)
2025-10-23
154.89.120.137
(
ClassC
)
2025-12-30
203.168.128.246
(
ClassC
)
2026-01-19
103.204.13.98
(
ClassC
)
2026-02-06
103.224.212.200
(
ClassC
)
Port 443
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/html; charsetutf-8eb6d8: 3085f695946eb0c53c0e4f3810fX-Frame-Options: SAMEORIGINSet-Cookie: nohostname_ip3FE5BB93G125D0FD9A95A; expiresSun, 08-Se !DOCTYPE html>html idng-app ng-appportalApp meidon-time2019/09/07 06:14:02 moment-langen-US ng-init吉祥坊>head> title>吉祥坊 - 吉祥坊官方网站/title> meta http-equivX-UA-Compatible contentIEedge,chrome1> link relshortcut icon hrefhttps://cdn.weibo-hk.com/Web.Portal/BB001-01.Portal/Content/Views/Shared/images/favicon.ico /> link hrefhttps://cdn.weibo-hk.com/Web.Portal/_Common/Content/jquery-ui/v1.11.3/jquery-ui.min.css relstylesheet/> link hrefhttps://cdn.weibo-hk.com/Web.Portal/_Common/Content/jquery-ui/v1.11.3/jquery-ui.theme.min.css relstylesheet/> link hrefhttps://cdn.weibo-hk.com/Web.Portal/_Common/Content/normalize/v3.0.1/normalize.min.css relstylesheet/> link hrefhttps://cdn.weibo-hk.com/Web.Portal/_Common/Content/font-awesome5.min.css relstylesheet/> link href/bundles/custom?vOhUSla4fGsNUvSXpeFjt4d3yGzprEi8M5kpn4HwVda81 relstylesheet/> link href/bundles/custom-modal?vJIu2PLSJUwqXv07psuObehUvwuC-1mrvG54pEhISNuI1 relstylesheet/> link href/bundles/site?vhitshnQgVCqgC8Q19KCTK2GTYJZWk0mD0e0vKn1me2Y1 relstylesheet/> link href/Content/Views/Shared/en-US.css?version20150116 relstylesheet /> link href/bundles/home?veNZMiJ6PQuC3re7xWTNpj1DImRld-RyFZShs5W089ag1 relstylesheet/> link href/Content/Views/Home/en-US.css?version201404141731 relstylesheet /> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/jquery/v1.12.4/jquery.min.js>/script> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/jquery-marquee/jquery.marquee.min.js>/script> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/jquery-ui/v1.11.3/jquery-ui.min.js>/script> script src/bundles/common?vHNgwom0Dzrx_ZWnmf34LgV_TQUJqznH90A6VSugf2eM1>/script> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/angularjs/v1.2.14/angular.min.js>/script> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/moment/v2.9.0/moment-with-locales.min.js>/script> script srchttps://cdn.weibo-hk.com/Web.Portal/_Common/Scripts/moment/v2.9.0/moment
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]