URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: gjfjhqvsh.top
Domain registrar:Key-Systems -
Domain registration date:2022-02-25 15:33:41 UTC
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2022-03-09 16:08:04 UTC
Total malware sites :1
A record(s) observed :4

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-06-02 04:12:48 47.76.127.217Not listedAS45102 ALIBABA-CN-NET- HKno
2025-06-02 04:12:48 47.91.170.222Not listedAS45102 ALIBABA-CN-NET- HKno
2025-06-02 04:12:48 8.218.208.240Not listedAS45102 ALIBABA-CN-NET- HKno
2022-03-09 16:08:07 80.249.146.161swark.artNot listedAS49505 SELECTEL- RUno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2022-03-09 16:08:07http://gjfjhqvsh.top/holler/rolle4.exeOfflinecryptbot RedLineStealer ext 0x746f6d6669

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2022-03-16 21:47:1631a5f62bfe2a4655a855d85351e42280f479632502fdba01ccb9be29ba48fd96exe  
2022-03-16 18:32:3594c2a1332707d2c14148bf733affde77788b73adfead50837cf8511e0640c2c6exe  
2022-03-16 16:04:1494bf48d332498abd5d34d56b105b4a0931a07f5a5a7d40d530cdfcd4fceb2a8eexe  
2022-03-16 15:31:44af066b1e6acd8d6fae285574a67a2dbd4c9cfb0b81a83cec98b40bacc3757b90exe  
2022-03-16 11:06:05987d5f19560dcf4f8fd6970cdf9036f583954a4dce4b491ec9ed97d644a676bbexe  
2022-03-16 06:02:18ca506ad2bf0b53473ea8d5b28577bdca72f1844e892580fdf3f01280dbcbb433exe  
2022-03-15 17:55:06636409b4be606209facf48c0672621c8e32f846c36c4914ae43354a6138bc2ccexeCryptBot
2022-03-15 12:17:41814d98775286098fbb08c3d5529a37d35c90828de4bd88099fa011e4febd80f3exeCryptBot
2022-03-15 06:45:30366ce101fd20bf43ad38bd45eddc210349c25672a8921ae56a2dd629dd2540abexeCryptBot
2022-03-14 17:53:252d38b3e2d84638d146a476b7798635569f4f8c0841166a44b628260180d10ecdexe 
2022-03-14 15:47:40b2a15da178f65e13c6b4eef990679c9a1fc0856137119239ee9816ff85fd4c58exe  
2022-03-14 11:38:19c1144e14f61b4b21b4278969ce02abbd8528ba44172fccc190f1cbf28bf84d7cexe 
2022-03-14 07:45:06ad03dae42c1de93bebd2a06c234cf0db09bef19dd471d32c79b84566d9b82f4eexe  
2022-03-13 17:32:129bca60295775e9624a7a8597be973af646ea69afc2b6b0fcf95addd567ef844cexe  
2022-03-13 16:47:173aa5b5117ee7006dfcf013b84a97c3e9e38c5b8de7caf380f8c4e954f5d30807exe  
2022-03-13 14:10:09d6323266f787fa50faac7e32d58753acdd33efba62bf4f676657e03406950480exe  
2022-03-13 13:17:57e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855unknown  
2022-03-13 06:25:2499701566f76a3919bf7d8723d058686465d03f98e1201077cc772ad75a825a03exe  
2022-03-12 18:47:012e36b04a855ca0d4e6d804ed28f3a49a417d1ba13cc4fd1313b668f9a17394d8exe  
2022-03-12 12:49:2304a4018bd6729759c4153c753bc1d071fd1363ba472156f681ef5073d87db596exe  
2022-03-12 07:04:53ff4ff6cca818d2c3ebe3df08739e776034662851e48d053e974f4485f200cefbexe  
2022-03-11 18:24:00dfe33f8bae536f2cf1cf28a6e2193e1d72d681e039f13339ed1419951c69c914exe  
2022-03-11 12:33:07f8462784c938c32e326abdba379d8944c9600f34ad85737efd6e7866d0bedff8exe 
2022-03-11 06:08:160d7a91ef0ad442163814602ab565a73e9952e0b4359bffe9521dc86894b9768eexe  
2022-03-10 17:32:0745435774eef3a9dd1a9dddd07e9ead0bebfcb1841aff797f434e4b429af6b9a8exe RedLineStealer
2022-03-10 12:23:1409fcfc2d0c9bd7583991acd3361720836563084aea7dc3bbdbe3ca6048cfe65fexe RedLineStealer
2022-03-10 10:31:17adc5bc568e0178a9985a1810413e8d57be6409325b4cb0625b211abead9fb593exe  
2022-03-10 07:19:293406308f4cd34329d8953de533263f289209aac619c85dfe8d870472ac88f021exe RedLineStealer
2022-03-09 18:06:272a5731ceb2283b07bcdbe5713dad549d1f903660e1e95007e4b3f5c3d38efbb7exe  
2022-03-09 16:08:07c0f56862ac9cfc26231a5be9b87b8dc19cc54a62436a93a90c283ac7afc9b786exe