URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: diamondsparkle.co.ke
Domain registrar: n/a
Domain registration date:2020-09-05 06:50:22 UTC
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2021-12-16 10:36:09 UTC
Total malware sites :1
A record(s) observed :5

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-07-03 21:37:55 190.92.173.133server2.panaito.comNot listedAS14670 WHG-USE1- USyes
2025-06-08 03:07:17 181.214.31.166tacoma.serverseasy.netNot listedAS14670 WHG-USE1- USno
2022-05-06 08:53:00 181.214.142.172server11.ppcgallery.comNot listedAS14670 WHG-USE1- USno
2022-04-09 03:21:06 154.16.145.233Not listedAS14670 WHG-USE1- USno
2021-12-16 10:36:12 154.16.145.231mysql.ecity.comNot listedAS14670 WHG-USE1- USno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2021-12-16 10:36:12http://diamondsparkle.co.ke/aloe.exeOfflineAsyncRAT ext Cryptolaemus1