URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: gvcaeorx.tk
Domain registrar:Freenom -
Abuse complaint sent?: Yes (2022-11-14 13:40:02 UTC to abuse{at}freenom[dot]com)
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Status unknown
Cloudflare :Not blocked
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2022-11-14 13:36:05 UTC
Total malware sites :21
Online malware sites :0 (0%)
Offline Malware sites :21 (100%)
A record(s) observed :2

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2022-11-14 13:36:10 172.93.123.102mail.itsmatrzen.comNot listedAS393960 HOST4GEEKS-LLC- USno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2022-11-15 13:45:06https://gvcaeorx.tk/tt/kking.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:06https://gvcaeorx.tk/tt/fire.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:06https://gvcaeorx.tk/tt/baba.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:06https://gvcaeorx.tk/tt/sirdee.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:06https://gvcaeorx.tk/tt/kkboy.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:05https://gvcaeorx.tk/tt/jjamie.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:05https://gvcaeorx.tk/tt/hod.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:45:05https://gvcaeorx.tk/tt/west.txtOfflineascii Encoded opendir abuse_ch
2022-11-15 13:44:05https://gvcaeorx.tk/tt/SDGSHHHSD.exeOfflineexe Formbook ext opendir abuse_ch
2022-11-15 13:44:05https://gvcaeorx.tk/tt/GSDGGDFGDGF.exeOfflineexe opendir abuse_ch
2022-11-15 13:43:06https://gvcaeorx.tk/tt/FDGDHDFDJHH.exeOfflineexe Formbook ext opendir abuse_ch
2022-11-15 13:43:06https://gvcaeorx.tk/tt/mrjohnn.txtOfflineAgentTesla ext ascii Encoded opendir abuse_ch
2022-11-15 13:43:05https://gvcaeorx.tk/tt/GSSDGSGDGSD.exeOfflineexe opendir rat RemcosRAT ext abuse_ch
2022-11-15 13:43:05https://gvcaeorx.tk/tt/JOHN.exeOfflineAgentTesla ext exe opendir abuse_ch
2022-11-15 13:43:05https://gvcaeorx.tk/tt/DDDDL.txtOfflineAgentTesla ext ascii Encoded opendir abuse_ch
2022-11-15 06:46:08https://gvcaeorx.tk/tt/hen.exeOffline.net exe msil RemcosRAT ext jstrosch
2022-11-15 06:46:08https://gvcaeorx.tk/tt/fire.exeOffline.net DarkCloud exe msil jstrosch
2022-11-15 06:46:07https://gvcaeorx.tk/tt/GDHJFHDFDFHDFHHF.exeOffline.net AsyncRAT ext exe msil jstrosch
2022-11-15 06:46:07https://gvcaeorx.tk/tt/palmic.exeOffline.net exe msil StormKitty jstrosch
2022-11-15 06:46:07https://gvcaeorx.tk/tt/w.exeOffline.net exe Formbook ext msil jstrosch
2022-11-14 13:36:10https://gvcaeorx.tk/tt/palmicc.txtOfflineexe vxvault

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2022-11-15 13:45:06bb0cb7dc8643baa4fbfca21f8a674075cdd329dd1c966fd0daba095ea2867057txt 
2022-11-15 13:45:06d3416937c321e3419423a2fa65401d3cd6587105542fbd041d548c875d37e456txt  
2022-11-15 13:45:06fd9b5105e1b10527d4a16efeeab84695d3dcbb0d5e6f2b6113d7e4d23e4f0ee4txt  
2022-11-15 13:45:06a77f2e3ac6bdc5e037181cd644f5a4b32355d7b2558fda15597a4fb2010950f5txt 
2022-11-15 13:44:0595e92cd26083c0470922af80c435a955617de77116bcfce667e94e68d2a9eae8exeFormbook
2022-11-15 13:44:058197cee2407339d915bbf5e5197660dce391a2c276bbf19b9de2e3b029c19556exe 
2022-11-15 13:43:064cff7a2fc753abddfa320fc226964bd5057bd544d148fe10b7d4617b683862aeexeFormbook
2022-11-15 13:43:0680235c15a8eb599ae86b03dffcc7b84d5670ee01619a49310ac172e58139d1f9txt 
2022-11-15 13:43:05734e077ffd2beb5e2808ce5bf2d27f03757257d133794acad69bf80bee2e7348exeRemcosRAT
2022-11-15 13:43:05b1865d79b8956cc7dd3940170bd4be0e34e937e0ba1ecf00b877ecf86a3c85b2exeAgentTesla
2022-11-15 13:43:05289d08210a6c05a9dc39bdab4900e04f2f9439f1587a2c26d5de8642034942eftxt  
2022-11-15 06:46:07f7ac248e39e55ccbf0b79fbfd3bbad23f00dd3e595d6f58166a70dfd82adb951exeRemcosRAT
2022-11-15 06:46:078480895542ad5e0279f134410f74832287403b25be149fcb263d74e7be07b4deexeDarkCloud
2022-11-15 06:46:0787aca3d786166839236fffc4e179a6bade8e624a40702b934b852c4847dad382exeAsyncRAT
2022-11-15 06:46:07e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164afexeStormKitty
2022-11-15 06:46:07bd6c22e0bdfe39745c527796646f11ad18e6967b48b92ff79d7c99c1380e7964exeFormbook
2022-11-14 13:36:095cd984999bd8247605963dfaa79f5e20a7c9322bfe6545dac895efaf52a62b65txt