# # dyndns_ponmocup # # ipv4 hash:ip ipset # # [DynDNS.org] # (http://security-research.dyndns.org/pub/malware-feeds/) # Ponmocup. The malware powering the botnet has been around # since 2006 and it’s known under various names, including # Ponmocup, Vundo, Virtumonde, Milicenso and Swisyn. It has # been used for ad fraud, data theft and downloading # additional threats to infected systems. Ponmocup is one of # the largest currently active and, with nine consecutive # years, also one of the longest running, but it is rarely # noticed as the operators take care to keep it operating # under the radar. # # Maintainer : DynDNS.org # Maintainer URL : http://security-research.dyndns.org/pub/malware-feeds/ # List source URL : http://security-research.dyndns.org/pub/malware-feeds/ponmocup-infected-domains-shadowserver.csv # Source File Date: Thu Mar 16 19:29:30 UTC 2023 # # Category : malware # Version : 1646 # # This File Date : Thu Mar 16 19:44:33 UTC 2023 # Update Frequency: 1 day # Aggregation : none # Entries : 45 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=dyndns_ponmocup # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 3.18.7.81 3.19.116.195 31.11.36.8 34.205.242.146 52.86.6.113 54.153.111.129 54.209.32.212 63.247.141.235 64.70.19.52 66.96.149.32 69.61.26.162 72.167.78.221 72.172.132.43 74.208.236.193 74.208.236.248 77.92.75.4 77.105.36.251 77.111.240.50 79.124.76.10 82.118.24.217 85.13.140.101 89.40.32.128 89.221.250.12 94.130.190.96 94.152.142.140 95.142.65.77 122.201.84.241 136.243.80.165 144.76.45.43 157.7.144.5 162.255.166.188 173.209.47.104 173.254.30.178 192.99.161.26 199.67.250.59 200.170.151.200 203.174.34.49 206.188.193.120 208.113.213.71 213.186.33.18 213.186.33.19 217.76.132.246 217.160.0.152 217.160.0.225 217.160.0.240