probably compiler cannot see it, classes need to be reconstructed
Quote ;D = note by me Polonus
URL resolves to a invalid IP address! Server redirect warning status: Content cannot be read! -> http://dnslookup.fr/blizt.juragan.net
Host did not accept hostmasterATanyonecloud.com as SMTP recipient.
Delivery over IPv4 to hostmasterATanyonecloud.com could not be done.
Failed to deliver email for SOA RNAME of anyonecloud dot com (hostmaster.anyonecloud dot com) using hostmasterATanyonecloud.com.
BLIZT.JURAGAN dot NET is running on the ip address blizt.juragan dot net that belongs to the network .
This network is part of the autonomus system from the company .
Total of domains on blizt.juragan dot net: 0 I get an error 11004 [11004] Valid name, no data record (check DNS setup)
See also: https://www.mywot.com/en/scorecard/203.79.29.11?utm_source=addon&utm_content=popup-donuts (two red alerts on WOT web rep)
No alerts here: http://urlquery.net/report.php?id=9320440
Things do not add up - therefore IP should be blocked?
A very recent one, from 8 minutes ago:
Research IP 210.86.239.72 months ago 8 min ago Cyber-TA Top 1000
5 months ago 8 min ago ADVANCED
ci239-10 dot netnam dot vn → 01/25-21:11:42.869584 [] [1:22466:7] E2[rb] NETBIOS SMB-DS IPC$ unicode share access [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 210.86.239.72:1294 → 192.168.1.43:445
01/25-21:12:07.821714 [] [1:2001683:3] E3[rb] BLEEDING-EDGE Malware Windows executable sent from remote host [] [Priority: 0] {TCP} 210.86.239.72:9616 → 192.168.1.43:1029
01/25-21:12:07.821714 [] [1:5001684:99] E3[rb] BotHunter Malware Windows executable (PE) sent from remote host [] [Priority: 0] {TCP} 210.86.239.72:9616 → 192.168.1.43:1029
→ http://urlquery.net/report.php?id=9325964 - I get a disconnected → http://www.telephoneactivity.com/861/141/4626.html
→ http://cgi.mtc.sri.com/popups/binaries/01-31-2014/000ed84d4f7a670eda64a1ee9f0b73d6.html
Bot or Trojan IPs # of Connections First Identified Last Seen Threat Danger Level
93.174.95.19 6 3 years ago 63 min ago Russian Business Network 2
5 days ago 65 min ago AlienVault 4
5 weeks ago 68 min ago AlienvaultScanSpam 2
6 weeks ago 11 hours ago DShield Block List 3
6 weeks ago 11 hours ago COMMUNITY 3
6 weeks ago 11 hours ago ADVANCED 3
Results of this Blacklistchecker are just ridiculous: https://www.gamasec.com/gsf/BlackList.aspx
The domain name DOES NOT appear to be banned. Currently Safe
No active threats were reported recently by users anywhere on this domain.
A severity 3 “ET RBN Known Russian Business Network IP group 434” IDS alert for IP qualifies for flagging i.m.h.o… ;D
This Japanese attack IP was signalled on iPillion: “Exploit attempt”
ThreatSTOP had it
Bot or Trojan IPs # of Connections First Identified Last Seen Threat Danger Level
203.189.96.196 4 5 weeks ago 4 days ago DenyHosts 1
Another one, found at log matapala: 80.82.64.90 udp 56702 53 00:25:26
See report: http://www.abuseipdb.com/report-history/80.82.64.90
See ThreatSTOP attached
IDS alert for RBN IP group 355 → The requested URL was not found on this server.