# # dyndns_ponmocup # # ipv4 hash:ip ipset # # [DynDNS.org] # (http://security-research.dyndns.org/pub/malware-feeds/) # Ponmocup. The malware powering the botnet has been around # since 2006 and it’s known under various names, including # Ponmocup, Vundo, Virtumonde, Milicenso and Swisyn. It has # been used for ad fraud, data theft and downloading # additional threats to infected systems. Ponmocup is one of # the largest currently active and, with nine consecutive # years, also one of the longest running, but it is rarely # noticed as the operators take care to keep it operating # under the radar. # # Maintainer : DynDNS.org # Maintainer URL : http://security-research.dyndns.org/pub/malware-feeds/ # List source URL : http://security-research.dyndns.org/pub/malware-feeds/ponmocup-infected-domains-shadowserver.csv # Source File Date: Mon Aug 23 07:28:04 UTC 2021 # # Category : malware # Version : 1115 # # This File Date : Mon Aug 23 07:40:04 UTC 2021 # Update Frequency: 1 day # Aggregation : none # Entries : 51 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=dyndns_ponmocup # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 46.30.215.23 46.30.215.160 54.153.111.129 62.26.9.51 62.149.140.104 63.247.141.235 64.70.19.52 66.96.149.32 67.20.112.11 69.12.64.226 69.61.26.162 69.90.25.210 72.172.132.43 74.208.236.193 74.208.236.248 77.55.157.78 77.92.75.4 77.105.36.251 79.124.76.10 80.94.98.99 82.118.24.217 85.13.140.101 87.98.239.19 89.221.250.12 94.152.142.131 95.142.65.77 107.155.71.6 136.243.80.165 144.76.45.43 156.54.179.186 157.7.144.5 159.69.61.92 162.241.224.245 162.255.166.188 173.209.47.104 173.254.30.178 176.31.222.193 192.99.161.26 199.67.250.59 200.170.151.200 203.174.34.49 206.188.193.120 208.113.213.71 213.186.33.18 213.186.33.19 217.76.132.246 217.160.0.152 217.160.0.174 217.160.0.225 217.160.0.237 217.160.0.240