See: https://www.virustotal.com/nl/url/353c8000855f8b425c8e4bbd4094e0e5237e9faf04fdff92ffa9093477901c97/analysis/1436266254/ Missed: http://quttera.com/detailed_report/bedrockcapital.com & https://sitecheck.sucuri.net/results/bedrockcapital.com#sitecheck-details Malware IP history: https://www.virustotal.com/nl/ip-address/204.11.246.1/information/ Bad host experience: https://www.projecthoneypot.org/ip_204.11.246.1 Re: https://www.threatcrowd.org/ip.php?ip=204.11.246.1 Insecure hosting: http://sameid.net/ip/204.11.246.1/ Malware detected: http://www.scumware.org/report/204.11.246.1 Website down: https://urlquery.net/report.php?id=1436266505526 Badzone: clusteralt0.msomt.modwest.com → http://www.dnsinspect.com/msomt.modwest.com/1436266988 Nameserver excessive version info proliferation detected. 69.51.77.40: “Served by POWERDNS 3.1 $Id: packethandler.cc 2579 2012-04-26 11:28:04Z peter $” Sitevet report gives Spam Activity on AS. MIT Dover Spooler. Port 91 - UDP infested with virus trojan (in the past?). Generic detections?
polonus