# # dyndns_ponmocup # # ipv4 hash:ip ipset # # [DynDNS.org] # (http://security-research.dyndns.org/pub/malware-feeds/) # Ponmocup. The malware powering the botnet has been around # since 2006 and it’s known under various names, including # Ponmocup, Vundo, Virtumonde, Milicenso and Swisyn. It has # been used for ad fraud, data theft and downloading # additional threats to infected systems. Ponmocup is one of # the largest currently active and, with nine consecutive # years, also one of the longest running, but it is rarely # noticed as the operators take care to keep it operating # under the radar. # # Maintainer : DynDNS.org # Maintainer URL : http://security-research.dyndns.org/pub/malware-feeds/ # List source URL : http://security-research.dyndns.org/pub/malware-feeds/ponmocup-infected-domains-shadowserver.csv # Source File Date: Wed Mar 27 19:28:26 UTC 2024 # # Category : malware # Version : 2019 # # This File Date : Wed Mar 27 19:52:32 UTC 2024 # Update Frequency: 1 day # Aggregation : none # Entries : 42 unique IPs # # Full list analysis, including geolocation map, history, # retention policy, overlaps with other lists, etc. # available at: # # http://iplists.firehol.org/?ipset=dyndns_ponmocup # # Generated by FireHOL's update-ipsets.sh # Processed with FireHOL's iprange # 3.18.7.81 3.130.204.160 3.130.253.23 31.11.36.8 34.205.242.146 54.153.111.129 54.161.222.85 54.209.32.212 64.70.19.52 66.96.149.32 69.30.245.146 69.61.26.162 72.167.78.221 72.172.132.43 74.208.236.193 74.208.236.248 77.111.240.50 78.47.71.170 79.124.76.10 82.118.24.217 85.13.140.101 94.130.190.96 94.152.142.140 103.85.24.230 104.21.11.31 122.201.84.241 144.76.45.43 157.7.144.5 162.255.166.188 173.209.47.104 173.254.30.178 192.99.161.26 199.67.250.59 200.170.151.200 203.174.34.49 206.188.193.120 213.186.33.18 213.186.33.19 217.76.132.246 217.160.0.152 217.160.0.225 217.160.0.240