URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: 45.137.22.103
Firstseen:2021-07-28 14:48:03 UTC
Total malware sites :8
Online malware sites :0 (0%)
Offline Malware sites :8 (100%)

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2021-07-28 14:48:04 45.137.22.103hosted-by.rootlayer.netNot listedAS51447 ROOTLAYERNET- NLyes

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2021-08-10 07:29:04http://45.137.22.103/local/vbc.exeOfflineAgentTesla ext exe opendir RedLineStealer ext abuse_ch
2021-08-09 05:48:03http://45.137.22.103/gdata/vbc.exeOfflineAgentTesla ext exe opendir abuse_ch
2021-08-04 12:56:03http://45.137.22.103/document/document.wbkOffline info_sec_ca
2021-08-04 06:08:03http://45.137.22.103/mvd/vbc.exeOfflineAgentTesla ext exe opendir abuse_ch
2021-08-03 05:51:04http://45.137.22.103/cctv/vbc.exeOfflineAgentTesla ext exe opendir abuse_ch
2021-08-02 05:48:03http://45.137.22.103/xmls/vbc.exeOfflineAgentTesla ext exe Formbook ext GuLoader ext opendir abuse_ch
2021-07-30 05:44:04http://45.137.22.103/http/vbc.exeOfflineexe Formbook ext opendir abuse_ch
2021-07-28 14:48:04http://45.137.22.103/window/vbc.exeOfflineexe Formbook ext opendir abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2021-08-11 08:40:36da96032bc5f0e72470400b312d3ef844d313d3c5f254ecb80549331594b3ecebexeAgentTesla
2021-08-11 00:00:19af3f604cc73575f96881b058aa35f7437efffcefc6e97891ca4db615101159eaexeRedLineStealer
2021-08-10 07:29:0403d462a965108a9d9a216c4e26fa222c3fbba2e649a0e3e2cba8609070c6caf0exeAgentTesla
2021-08-09 05:48:03027037375ac19d50d02915b35c8af212bcb6494bccfc8c27be5662ade4071d83exeAgentTesla
2021-08-04 12:56:0393e6729e85c8a47383c1dc1077148992d2435408722f9a6468d2581050b84496unknown 
2021-08-04 06:08:0326f453c502b66b8ccb3461411039f3b5bbdbafb8f7ecc6e413b07446c703b956exeAgentTesla
2021-08-03 06:31:19c79d65d7f2bb1d55cb0a5c83809fbe9a743c402912518deaf57ea939475df693exeAgentTesla
2021-08-03 05:51:0481e0a8320706f247fa05c550c354de6ea2e2f43e4630117f33adb61d5f2951f4exeAgentTesla
2021-08-02 07:48:12aa13d83049de7568b8828c9ef04a8aaf12366c0e3ffdf90908b2fa3b53b756b7exe AgentTesla
2021-08-02 07:12:276836eb2e60ef429ec1f20100cb16b1dc65b64938a7e9cc8ea0a706a699620bfaexeGuLoader
2021-08-02 06:25:161e716fc850ee142cf712e56d074ee9b6a3855014612513bb0f447fab5b8c9fc8exeFormbook
2021-08-02 05:48:03b21eb6d14eae70e233132e7fa4e99fb282209f1c6ea8ba4d984e9585ee965e87exeFormbook
2021-07-30 06:53:40edda9af73a29d4e3456a1fd3a67d3a1aabd9692d4f4feba564db139f86201960exeFormbook
2021-07-30 05:44:0421da3823ffb535bf77b19ce43b741011f3783180ab5d74e2aab69ce311ed86fbexeFormbook
2021-07-29 04:05:264717b1585971b702c8e32e5054b5514dc4e6ed5a5f50434d66f43c79d15354c6exeFormbook
2021-07-28 14:48:038c988a622b822f0fc226b928ab317dc7a6130b395f74a3e39c3443b275c93771exeFormbook