# # dyndns_ponmocup # # ipv4 hash:ip ipset # # [DynDNS.org] # (http://security-research.dyndns.org/pub/malware-feeds/) # Ponmocup. The malware powering the botnet has been around # since 2006 and it’s known under various names, including # Ponmocup, Vundo, Virtumonde, Milicenso and Swisyn. It has # been used for ad fraud, data theft and downloading # additional threats to infected systems. Ponmocup is one of # the largest currently active and, with nine consecutive # years, also one of the longest running, but it is rarely # noticed as the operators take care to keep it operating # under the radar. # # Maintainer : DynDNS.org # Maintainer URL : http://security-research.dyndns.org/pub/malware-feeds/ # List source URL : http://security-research.dyndns.org/pub/malware-feeds/ponmocup-infected-domains-shadowserver.csv # Source File Date: Thu May 2 19:30:34 UTC 2024 # # Category : malware # Version : 2055 # # This File Date : Thu May 2 19:44:26 UTC 2024 # Update Frequency: 1 day # Aggregation : none # Entries : 37 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=dyndns_ponmocup # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 3.19.116.195 3.94.41.167 3.130.204.160 3.130.253.23 31.11.36.8 34.205.242.146 52.86.6.113 54.153.111.129 64.70.19.52 66.96.149.32 69.30.245.146 69.61.26.162 72.167.78.221 74.208.236.248 78.47.71.170 79.124.76.10 82.118.24.217 85.13.140.101 94.130.190.96 94.152.142.140 122.201.84.241 144.76.45.43 162.255.166.188 172.67.165.25 173.209.47.104 173.254.30.178 192.99.161.26 199.67.250.59 200.170.151.200 203.174.34.49 206.188.193.120 213.186.33.18 213.186.33.19 217.76.132.246 217.160.0.152 217.160.0.225 217.160.0.240