Help
RSS
API
Feed
Maltego
Contact
Domain > za.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
Files that talk to za.net
MD5
A/V
24a034d09222c5370365c4cdadde0f65
[
HW32.CDB.Da0d
] [
Packed.Win32.Katusha.3!O
] [
Kryptik.CDQY
] [
TrojWare.Win32.Kryptik.CBCJ
] [
Trojan.Packed.26581
] [
Backdoor:Win32/Kelihos.F
] [
Trojan/Win32.Tepfer
] [
Heur.Trojan.Hlux
] [
Trojan.Crypt_s
] [
W32/Kryptik.BD!tr
] [
Crypt_s.GNC
] [
Trojan.Win32.Kryptik.CBCJ
] [
Win32/Trojan.0de
]
8853f5fd8f3fd57284ad4c702fcb40a1
[
Win32/Zbot.G
] [
W32/Ramnit.C
] [
Virus*Win32/Ramnit.P
] [
W32.Ramnit-1
]
2422279645dc3f8f9201bf042122d6d5
[
W32.Clod317.Trojan.772f
] [
Backdoor/W32.Pushdo.36280.C
] [
Trojan.Cutwail.AQ
] [
Trojan.Win32.XPACK.bdjuve
] [
W32.Pilleuz
] [
Pushdo.B
] [
TROJ_CUTWAIL.KK
] [
Trojan.Wigon!3W+DBvqt2Q0
] [
Backdoor.Win32.A.Pushdo.36280.A
] [
UnclassifiedMalware
] [
Trojan.DownLoad3.17030
] [
Heuristic.BehavesLike.Win32.Suspicious-DTR.K
] [
Troj/FakeAV-GDI
] [
Backdoor/Pushdo.dr
] [
Win32.Hack.Pushdo.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BW
] [
Trojan/Win32.Zbot
] [
Backdoor.Pushdo
] [
Backdoor.Win32.Pushdo
] [
W32/CutMail.EE!tr
] [
SHeur4.ATIK
] [
Trojan.Win32.Kryptik.aN
]
34961ffc0f75d89da0b9464a4c7a02b1
[
Backdoor.Win32.Pushdo.qag
] [
BackDoor.Bulknet.893
] [
Win32.Heur.KVMF58.hy.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor/Win32.Pushdo
] [
Trojan-Downloader.Win32.Cutwail
]
17c3b162c4f71c7aef83c9e7644b6752
8b7c5fe0eaad467bb999a2c1f7dd7486
[
TrojanDownloader.Cutwail
] [
Backdoor.Bot
] [
Riskware
] [
Trojan.Win32.Pushdo.btaipu
] [
W32.Pilleuz
] [
TROJ_CUTWAIL.CNA
] [
Win32.Trojan
] [
Backdoor.Win32.Pushdo.qhe
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.893
] [
Win32.HeurC.KVMH004.a.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor/Win32.Pushdo
] [
W32/Backdoor.IQVD-6602
] [
Trojan.CryptILH
] [
W32/Pushdo.QHE!tr.bdr
] [
Crypt.CILH
] [
Trj/Pushdo.L
]
d3be3c4282a9d5158080d8023e5f2efa
[
TrojanRansom.Foreign.cyzc
] [
Fake-Rena-FNQ!D3BE3C4282A9
] [
Trojan.Inject.RRE
] [
Trojan
] [
WS.Reputation.1
] [
TROJ_RANSOM.FCN
] [
Trojan-Ransom.Win32.Foreign.cyzc
] [
UnclassifiedMalware
] [
Trojan.PWS.Panda.547
] [
TR/Ransom.Foreign.cyzc
] [
Win32.Troj.Undef.(kcloud)
] [
VirTool:Win32/Injector
] [
Trojan/Win32.Foreign
] [
W32/Trojan.CVXL-5426
] [
Virus.Win32.Cryptor
] [
W32/Injector.ZVR!tr
] [
Win32/Cryptor
] [
Trj/Dtcontx.E
]
622bf7ba2317ae03b0682a650bac03d8
[
TrojanDownloader.Cutwail
] [
Cutwail-FBPN!622BF7BA2317
] [
W32.Pilleuz
] [
Pushdo.I
] [
TROJ_SPNR.1ADR13
] [
Backdoor.Win32.Pushdo.pyz
] [
Backdoor.Pushdo!kokJ8DxObyw
] [
Heur.Suspicious
] [
BackDoor.Bulknet.893
] [
Win32.Hack.Pushdo.p.(kcloud)
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor.Win32.U.Pushdo.41472
] [
Backdoor/Win32.Pushdo
] [
W32/Backdoor.PJEO-2224
] [
Backdoor.Pushdo
] [
Malware.Pilleuz!rem
] [
Trojan-Downloader.Win32.Cutwail
] [
W32/Pushdo.PYZ!tr.bdr
] [
SHeur4.BGUF
] [
Trj/OCJ.D
]
152fbf67adaa5455ac89003f69528244
[
BackDoor-FAYA!152FBF67ADAA
]
89c64a4ee7b13dd2dbdcf4a05f71312a
[
TrojanDownloader*Win32/Cutwail.BS
]
82d62080e472af17170f4752ebd4ebd1
[
W32.Pilleuz
] [
Pushdo.G
] [
Backdoor.Win32.Pushdo.pwz
] [
Heur.Suspicious
] [
BackDoor.Bulknet.847
] [
TrojanDownloader:Win32/Cutwail.BS
] [
Backdoor.Win32.S.Pushdo.36864
] [
W32/Backdoor.SFNI-6924
] [
Malware.Pilleuz!rem
] [
Win32/Wigon.PH
] [
Trojan.Crypt
] [
W32/Pushdo.PWZ!tr.bdr
] [
SHeur4.BFXO
]
a423bbddf78450753f1a239711408b91
[
Crypt_c.ABJD
] [
TrojanDownloader*Win32/Cutwail.BS
]
f0eec37a33ad2efee7080820ec596e83
[
Win.Trojan.Ransom-2439
]
b3a2add36f28dad15b6901eca370af87
[
W32/Trojan.ROYM-5986
] [
TrojanDownloader.Cutwail.r4
] [
BackDoor.Bulknet.958
] [
Win32/Kryptik.BECW
] [
W32/KRYPTK.SMO2!tr
] [
Win32/Heur
] [
Trojan.Crypt
] [
Trojan.Win32.Cutwail.epf
] [
RDN/Downloader.a!th
] [
TrojanDownloader*Win32/Cutwail.BS
] [
TROJ_KRYPTK.SMO2
] [
BScope.Trojan.Pushdo
]
66db43669a9cb80274d2ba6a1f44945e
[
TrojanDownloader*Win32/Cutwail.BS
]
37855cde21892acf5680660ae9b8668d
[
Artemis!37855CDE2189
] [
W32.Pilleuz
] [
Win32.HeurC.KVMH004.a.(kcloud)
] [
TrojanDownloader:Win32/Cutwail
] [
Cryptic.YD
]
a1c6f433289e28861c8876b0c161afee
38ef07dad08020039c3ae06e9b27b83a
[
Cutwail-FBYD!38EF07DAD080
] [
WS.Reputation.1
] [
Pushdo.J
] [
Backdoor.Win32.Pushdo.qfd
] [
UnclassifiedMalware
] [
BackDoor.Bulknet.893
] [
Artemis!38EF07DAD080
] [
Win32.HeurC.KVMH004.a.(kcloud)
] [
W32/Kryptik.BAVK
] [
Crypt.CDMH
]
Whois
Property
Value
NameServer
NS0.IS.CO.ZA
Created
1997-06-20 00:00:00
Changed
2015-03-27 00:00:00
Expires
2016-06-19 00:00:00
Registrar
TUCOWS DOMAINS INC.