URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: asload02.top
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Blocked
Cloudflare :Not blocked
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2020-05-08 17:15:09 UTC
Total malware sites :4
Online malware sites :0 (0%)
Offline Malware sites :4 (100%)
A record(s) observed :3

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2020-05-11 11:14:32 8.208.88.221Not listedAS45102 ALIBABA-CN-NET- GBno
2020-05-11 03:23:23 8.208.79.157Not listedAS45102 ALIBABA-CN-NET- GBno
2020-05-08 17:15:18 8.208.9.61Not listedAS45102 ALIBABA-CN-NET- GBno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2020-05-09 06:10:12http://asload02.top/download.php?file=4.exeOfflineexe zbetcheckin
2020-05-09 04:14:18http://asload02.top/downfiles/5.exeOfflineexe zbetcheckin
2020-05-08 19:12:08http://asload02.top/downfiles/8.exeOfflineArkeiStealer ext exe zbetcheckin
2020-05-08 17:15:18http://asload02.top/downfiles/4.exeOfflineexe zbetcheckin

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2020-05-11 07:49:3984ea141416ff61e297f66f0d8cb10995f2a7bf29a90f2891927de49c42fe543cexe  
2020-05-10 18:38:391840e0f288039f46e5ef4bd2c8720ad806e0c1ddf68f4660356087fac04374cfexe  
2020-05-10 18:38:383ff24a153622f2fdf51d2d80b8a45e63769111c1f632590afcc1e1d24058eb63exe  
2020-05-10 16:44:21a87cb195a7d8eb1b1dd8eb88e9e39d60f0295cd7bb80ec818e80a4605da363a8exe  
2020-05-10 15:31:579005481ccd5b9bb5b9a3c55c1ecfb52fad9c3bb4793ec69f4ea4202b5dba8d76exe  
2020-05-10 11:59:00a06337546554e3c2554674e946015722c722095df9ea51b0009c13e7d654cae2exe  
2020-05-10 09:13:40368b8ae190778faf4626fc631cd61cefa97e6d11f53c544cb980357a3f974059exe  
2020-05-10 06:17:40362ba3e69b18ae6911a3ad24b5de906085241f1dae598a0249cecd934f9d6b29exe  
2020-05-10 05:08:4429aca9d36693e9a7a68fa206b9bd791792818c4d71d4b635e3b0a896f5e8f8f7exe  
2020-05-10 05:08:447c7a9d98b272b3c7cb6aa602050dbf1dca7e1a85eaa45f29aaec44ba2100e296exe  
2020-05-09 21:01:04138186892d63fe3b0d5f8c62bd3b11737392e22fd5fd68f32dd5612e78a6407cexeArkeiStealer
2020-05-09 19:22:21eebc034423dbd3fd06d5d2510039ecc98c08e24692d3368b403f436c330cee83exe 
2020-05-09 19:22:2013409a886c8f0bd8a991f67ce2d8864dec2574fc456f3179d0332026606546aaexe 
2020-05-09 17:47:278a92e6115a329e47ab36222d86ea3f58f56b0a58b1010d2da280067346f38b21exe 
2020-05-09 17:47:2492182a18e5de465fa1fa02fbd41c6ffb91826a793cd557a66acfecab1a995146exe  
2020-05-09 14:56:588a690fbb8ef2355a51b1ada75631f565040cecdf24bcb11b23c4dc342ba0e63eexe  
2020-05-09 10:20:433ee12d501e10c9c038477a364f41db1349d7f309950631d202e7b621bcb3347cexe  
2020-05-09 05:50:589936f3a085368c18e5717a4be4a712cea9c8c492b4ce6f07e0249afe6453e52aexe  
2020-05-09 04:14:18f10da3dca6e87216cef5c1ca2e2e985a9f4a5da295bccbd09e9893c40bdb9684exe 
2020-05-09 03:49:31e88bac13fcccbee112f7ce5ed471fb6c71de70ae6af46d3d715e6b1e75fcad6cexe 
2020-05-08 19:12:081feb43725e49f700154098a4db30a9a699e8e1b7433aae2eaac52f62b3329b62exeArkeiStealer
2020-05-08 17:15:17ca9cc4ff6c8597a999bf16b9f64f709b48add9b3ae2a2556cde2a80cdc75fa4eexe