URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: d133.xyz
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2020-11-30 22:55:04 UTC
Total malware sites :1
A record(s) observed :4

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-11-19 15:29:27 75.2.18.233ac1a2ad24832d38a2.awsglobalaccelerator.comNot listedAS16509 AMAZON-02- USyes
2025-07-27 04:20:55 34.92.18.179179.18.92.34.bc.googleusercontent.comNot listedAS396982 GOOGLE-CLOUD-PLATFORM- HKno
2025-04-27 14:50:51 35.215.134.145145.134.215.35.bc.googleusercontent.comNot listedAS15169 GOOGLE- HKno
2020-11-30 22:55:05 193.142.59.160Not listedAS201409 hostshield- NLno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2020-11-30 22:55:05http://d133.xyz/files/5659239641238733663200502...Offlineexe RedLineStealer ext zbetcheckin

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2020-11-30 22:55:0533f6371aa2a9ab319f7292e4e589aff44894f639767cc174e487dc1672ee03d2exeRedLineStealer