Bad web-IP, gate-redirect for malware....JS/TrojanDownloader.FakejQuery.A trojan

See recent reports on IP here: http://urlquery.net/report.php?id=1478885494973
Re: https://www.projecthoneypot.org/ip_81.169.145.158
Threat miner scan: https://www.threatminer.org/host.php?q=81.169.145.158
Threatcloud report: https://www.threatcrowd.org/ip.php?ip=81.169.145.158
and https://www.scumware.org/report/81.169.145.158 → JS/TrojanDownloader.FakejQuery.A trojan
and Angler-EK malware analysis: http://www.malware-traffic-analysis.net/2014/11/10/index.html

An IP to block? → http://toolbar.netcraft.com/site_report?url=http://81.169.145.158

polonus

Its hosted at STRATO AG here in germany :stuck_out_tongue:

Hi Steven,

The security on -http://w9e.rzone.de/ is or was at least under par.

Just read on what I have seen there through 3rd party scanning,
and re-combining several scan results while searching the terms.

For instance see here what this A.S. is hosting: http://sitevet.com/db/asn/AS6724
and that is almost all the flaws of abuse in the book,
playing out on 205 blacklisted URLs at present there at that AS.

And from the Historical Badness picture we see that the situation at STRATO STRATO AG has been much worse in the past.

Time for a crypto report on the hostname: -w9e.rzone.de which gives a 404 (closed for port 80/443)
as it is known to have a very bad web rep,and here it is parading too:

https://www.malwaredomainlist.com/mdl.php?inactive=on&sort=Reverse&search=&colsearch=All&ascordesc=DESC&quantity=50&page=57 (quite a list of baddies there
for that particular IP)
with finds Redkit exploit kit, iFrame on compromise leading to Angler EK badware, Spyware.ZeuS.GO
(heh, SiteVet report forgot about that one).

Also FreeSAS seems interested in that IP, and this is Organization:
IP Pool for Iliad-Entreprises Business Hosting Cus, that recently came to scan that IP.

21/tcp open ftp ftpd.bin round-robin file server 3.4.0r12
|_ftp-anon: Anonymous FTP login allowed (FTP code 230) -

Just one has to check if there is an Anonymous Acount open
and they are feed for the proverbial birds.

And that was what actually been performed there,
as we find a report of it here: https://www.threatcrowd.org/ip.php?ip=81.169.145.144

80 and 443 return a Not Found or Bad Request -m

So there is still some work to do at this server to protect against abuse there.

polonus (volunteer website security analyst and website error-hunter)