URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: a0920080.xsph.ru
Domain registrar: n/a
Domain registration date:2008-07-30 20:00:00 UTC
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2024-03-19 03:51:03 UTC
Total malware sites :8
Online malware sites :0 (0%)
Offline Malware sites :8 (100%)
A record(s) observed :2

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-04-27 11:15:58 141.8.197.42techproxy.from.shNot listedAS35278 SPRINTHOST- RUyes
2024-03-19 03:51:38 141.8.192.103hnoss.from.shNot listedAS35278 SPRINTHOST- RUno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2024-03-20 05:12:09http://a0920080.xsph.ru/TERR/control.exeOffline32 exe QuasarRAT ext zbetcheckin
2024-03-19 08:27:26http://a0920080.xsph.ru/miner.exeOfflineCoinMiner exe abuse_ch
2024-03-19 08:27:05http://a0920080.xsph.ru/KZ1/thost.exeOfflineexe abuse_ch
2024-03-19 08:27:05http://a0920080.xsph.ru/KZ1/asyns.exeOfflineAsyncRAT ext exe abuse_ch
2024-03-19 08:27:05http://a0920080.xsph.ru/HeaderFinder.exeOfflineexe abuse_ch
2024-03-19 04:39:06http://a0920080.xsph.ru/RtkAudBCK.exeOffline32 AsyncRAT ext exe zbetcheckin
2024-03-19 03:55:07http://a0920080.xsph.ru/RtkAudUKZ1.exeOffline32 AsyncRAT ext exe zbetcheckin
2024-03-19 03:51:38http://a0920080.xsph.ru/KZ1/control.exeOffline32 exe QuasarRAT ext zbetcheckin

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2024-04-14 07:08:55b3f918b9fcb1fce6d2f6e51f4281bcd7fb6716b7dc003e28322c1ab462c257f2exe  
2024-04-01 19:37:05babf06b7733ab2e29c11f6f25b23a0ec5b706f096dcf8b3284b141ffbf460428exe  
2024-03-26 17:21:21c03d932ba38710c6130f5feaba9845431127f201bf6a55b0b06467e33d14fcd0exe  
2024-03-26 00:10:47ef368e4190c79c1ad2da858ac321702079f919bd8df45de119b395cbd3194aa9exe  
2024-03-25 14:04:174d0110004f418ba070623a2e972d35023e7dce41d33f48f1bdd7c97ded1c666bexe  
2024-03-20 06:23:405f3c6b1fa456978790c33cf538a25cd07980ba7fadf9ec0b220795f8695866b7exe  
2024-03-20 05:12:093effc3594b1ec71f6b1cdf420ed0dab7fdbb675b1b9c22dbf13d5de56ba137b6exe QuasarRAT
2024-03-20 04:22:48ad598d5de7674567821da09334994189cb981f9f910250a31af532f97b7fd29dexe  
2024-03-20 03:29:570ce0958fe1e100dc660a531cd79e76b687eeb78775feee641d06ef9290d754f5exe  
2024-03-20 02:34:00b5a71a06f4e0c186936f7a2db3a8ddb032e3dedd76b56728befa2774766d1516exe  
2024-03-19 21:30:23e51102480aa0b0d5b335d0eee817dd3e8841149ef888d90add28f41877fd996cexe  
2024-03-19 19:06:46a667201700f33fa906e9da9931d05c06775992707bdafb8e2d3f24d1bc59e690exe  
2024-03-19 17:32:45a17033f87ffa4b2960164d8233267973708cd1e8149011636638a63be6d7380dexe  
2024-03-19 13:55:57e926101ef3e4d6cf95d402af21eaf7d03bbf775b8acc3a98f221002052e8fccbexe  
2024-03-19 11:43:000349c630bab4307a0b32c2becb1c43118e8fd9f418783ed2442bd3c37c23602cexe  
2024-03-19 08:27:2601d46b910e5e5c0bee77e27f190ace46674465c95267d6ba7744d39cf76ed144exeCoinMiner
2024-03-19 08:27:056846565038cf634e9eb81a923f408e5fe4c2170e27ceb40856968a38d59c3db1exe 
2024-03-19 08:27:05c21d1dd6391ae93398507c94f9b075dbe8baceed4903a78b3f6bebfa85cd155eexeAsyncRAT
2024-03-19 08:27:05a5c27b8083b31a15602373eab61c9164437aa14f25a2f9aed522f12c3f0b7c39exe 
2024-03-19 04:39:065a8e8e48add151c8058bad8173424e10e1a336dee8982da211d8f612323219c7exeAsyncRAT
2024-03-19 03:55:07ea7efe5b685adb6324eea4717d5a9ef0c09c0222acc527d3bff2dc752d0cdcf9exeAsyncRAT
2024-03-19 03:51:3850684cb3400e3cd4959c2ccd2dd900a157ef3163179adcf8da15ed5b7b41694bexeQuasarRAT