code: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=NDUuOTUuMTQ3LjE1~enc
risk score ten out of ten red: https://toolbar.netcraft.com/site_report?url=45.95.147.15
See all vulnerabilities to be exploited at this apache proxy server: https://www.shodan.io/host/45.95.147.15
Laubching live malware: https://urlhaus.abuse.ch/url/222700/
20 detect: https://www.virustotal.com/gui/file/5cff88b56e0f4bc3059ec0b852751fa6b148e5a94d2ab28d7602d459233dc8ab/detection
linux malware: Domain matching 45.95.147.15 were found in our database.
Malicious URLs on 45.95.147.15
-/bins/yakuza.x86
Blacklist
Google Google Diagnostic Page
My WOT WOT Score Card
hpHosts hpHosts listing
MalwareDomainList MDL listing
Whois and network details
Additional IP(s):
Reverse:
45.95.147.15 45.95.147.15 listed here: https://warui.intaa.net/files/warui_hosts/warui_malware_ipv4.txt
brute force attacker honeypot detected.
polonus