URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: 147.124.213.50
Firstseen:2025-03-07 15:49:02 UTC
Total malware sites :25
Online malware sites :0 (0%)
Offline Malware sites :25 (100%)

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-03-07 15:49:04 147.124.213.50cripple-throws.joinprimarily.comNot listedAS396073 MAJESTIC-HOSTING-01- USyes

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2025-03-11 07:46:33http://147.124.213.50/crypt/MUK.ps1Offline abuse_ch
2025-03-10 18:39:06http://147.124.213.50/crypt/money.exeOfflineAgentTesla ext abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/eng.exeOfflineFormbook ext abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/cozzy.exeOfflineFormbook ext abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/cozy.ps1Offline abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/snake.exeOfflineSnakeKeylogger ext abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/WASFS.exeOfflineRemcosRAT ext abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/m2.ps1Offline abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/CZXASD55.rarOffline abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/RUNPEE.dllOffline abuse_ch
2025-03-10 18:39:05http://147.124.213.50/crypt/Client.exeOfflineAsyncRAT ext abuse_ch
2025-03-10 18:38:05http://147.124.213.50/crypt/TESTINA.exeOfflineAgentTesla ext opendir abuse_ch
2025-03-10 18:38:05http://147.124.213.50/crypt/hustleee.txtOfflineopendir abuse_ch
2025-03-10 18:38:04http://147.124.213.50/crypt/cozy.exeOfflineopendir RemcosRAT ext abuse_ch
2025-03-10 18:38:04http://147.124.213.50/crypt/testina.ps1Offlineopendir abuse_ch
2025-03-07 15:50:11http://147.124.213.50/crypt/conn.txtOfflineascii base64-loader Encoded opendir abuse_ch
2025-03-07 15:50:06http://147.124.213.50/crypt/emma.ps1Offlineascii opendir powershell ps1 abuse_ch
2025-03-07 15:50:06http://147.124.213.50/crypt/freak.txtOfflineascii base64-loader Encoded opendir abuse_ch
2025-03-07 15:50:05http://147.124.213.50/crypt/VIK.ps1Offlineascii opendir powershell ps1 abuse_ch
2025-03-07 15:50:05http://147.124.213.50/crypt/money.ps1Offlineascii opendir powershell ps1 abuse_ch
2025-03-07 15:50:05http://147.124.213.50/crypt/devil.ps1Offlineascii opendir powershell ps1 abuse_ch
2025-03-07 15:50:04http://147.124.213.50/crypt/ps1.txtOfflineascii opendir powershell ps1 abuse_ch
2025-03-07 15:49:05http://147.124.213.50/crypt/dressman.exeOfflineexe Formbook ext opendir abuse_ch
2025-03-07 15:49:04http://147.124.213.50/crypt/CONVERTER.exeOfflineexe opendir abuse_ch
2025-03-07 15:49:04http://147.124.213.50/crypt/hustle.exeOfflineAgentTesla ext exe opendir abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2025-03-10 18:39:06617ddfc01cc8d8c7fb984a4a9ebc48a13d763f695eb436a32957dc8e40b2541eexe AgentTesla
2025-03-10 18:39:05fdc559014c1084c03f034589731a90594d3496b655b17b96ba6350de18a1aa91exeFormbook
2025-03-10 18:39:053451dbcd157a9b7dcdb0ea7f9a9dabbe58692b8c9469489597f608c0c364e957exeFormbook
2025-03-10 18:39:05c4a0225a6de6d42fcdd0c172bcba94e86019f7c0705bc742a53cd529bd496477txt  
2025-03-10 18:39:05f9fdb051571ebd3003ed9a8605cc48af2e79a3383e48486b69b0becbb3436b57exe SnakeKeylogger
2025-03-10 18:39:057feca68aa30931d5af1378f39e194f9e7076df3073402d6fa31a48b60836ae16exeRemcosRAT
2025-03-10 18:39:0502b5566af6b408975cd5ba45ee26008898edaabb49a524ed7c5edf213fd43cb8txt  
2025-03-10 18:39:05feac2b2805570682ff704da3f1f10d4d9a7b0ac94c7e22033ab9388fdeed1fdarar  
2025-03-10 18:39:056ad31b1e155c8c02f1b9f09bd982fd428d5dffd304cdb9cec917273f3a49d278dll 
2025-03-10 18:39:05de6dd7d2bc11dcbf240fda1ec14cf1e4b1d7a1e2731e660e2b457c163ae0cd02exe AsyncRAT
2025-03-10 18:38:05eab8215a2c484063d2023df0773e6f99a49afb5c126f94cf127c6adf7e0a5fb9exeAgentTesla
2025-03-10 18:38:05436b95d09a9242ec39eb7789a40ebcfbffa0984d65bf671a60a2ad1cd0a21b06txt  
2025-03-10 18:38:04489a4758ea8e46736dc0f67da790eeba6d5244de889dcee5ff49dcd6e9929736exe RemcosRAT
2025-03-10 18:38:04d6b211d5307808c8f0d4531fdb3142cf44d6f996e8e1c059e75744ee18267a1ftxt  
2025-03-07 15:50:11c4b3939216bd159de15a92eec0a7432687332a30fe1ff07a680857a1a821a2adtxt  
2025-03-07 15:50:0675710db488577e2d1ce11541b5a54846b053a15c245903a00a2af833803a7c88txt  
2025-03-07 15:50:053b107659e23b9c28725ee4827d5eb205eece8b9a5c90afbbb742a9832aaefaabtxt  
2025-03-07 15:50:051f8a70df6da41f13f26aebba8c76bfd808795b2a7abcab032442722844d30a6dtxt  
2025-03-07 15:50:05961280d561a7f72ff218f0d2af8d63b4fc39b358f603aa3e2e811d2ca414037ctxt  
2025-03-07 15:50:05afc5919f8b0a1a168926b5efc2b7d20800795049fde04e5e6eb511c50038d13btxt  
2025-03-07 15:50:043e04d66524bd6b944f263f1ed6c8431e593925c7d34fd8139f0a7ae8c1a0ddbctxt  
2025-03-07 15:49:055e300add3c57b7c15d95b10a3d7a9ac65b55f95c8e2cc11a5316fcbc8c027044exeFormbook
2025-03-07 15:49:045d97ea15858f010c7c60f66911e26ceb5d36513b1e4630b53f45a5f2a8ec41b3exe AgentTesla
2025-03-07 15:49:034202ddd7af049132f98a9a28df3b6b1b34567b78e1dce8b5d380c8974d697199exe