URLhaus Database
Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).
Database Entry
IP addresses
The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.
| Firstseen (UTC) | IP address | Hostname | SBL | ASN | Country | Active? |
|---|---|---|---|---|---|---|
| 2025-09-03 08:32:10 | 172.233.219.49 | viridian01.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-09-03 08:32:10 | 172.233.219.78 | viridian03.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-09-03 08:32:10 | 172.237.146.38 | viridian04.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-09-03 08:32:10 | 172.237.146.8 | viridian05.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-09-03 08:32:10 | 172.233.219.123 | viridian02.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-09-03 08:32:10 | 172.237.146.25 | viridian06.parklogic.com | Not listed | AS63949 AKAMAI-LINODE-AP | US | yes |
| 2025-04-27 15:59:33 | 69.16.230.165 | haproxy05.parklogic.com | Not listed | AS32244 LIQUIDWEB | US | no |
| 2020-01-05 19:11:06 | 198.251.81.122 | node-198-251-81-122.reverse.x4b.me | Not listed | AS53667 PONYNET | US | no |
| 2019-11-22 08:55:09 | 178.17.171.237 | 178-17-171-237.static.as43289.net | Not listed | AS43289 TRABIA | MD | no |
| 2019-10-23 10:58:44 | 209.141.38.195 | nanotier.nl | Not listed | AS53667 PONYNET | US | no |
Malware URLs
The table below shows all malware URLs that are associated with this particular host.
| Dateadded (UTC) | URL | Status | Tags | Reporter |
|---|---|---|---|---|
| 2019-06-20 10:29:03 | https://hcwyo5rfapkytajg.darknet.to/2hq68vxr3f.exe | Offline | #ransomware #loocipher | |
| 2019-06-20 10:28:58 | https://hcwyo5rfapkytajg.darknet.to/3agpke31mk.exe | Offline | #ransomware #loocipher | |
| 2019-06-20 10:28:54 | https://hcwyo5rfapkytajg.darknet.to/Info_BSV_20... | Offline | #ransomware #loocipher |
The table below shows recent payloads delivery by this host.
| Firstseen (UTC) | SHA256 hash | File type | Bazaar | Signature |
|---|---|---|---|---|
| 2019-06-23 22:57:28 | 3e1d8a5faaa35e7f72ecad5f91644efd5bf0d92fdb0341c48a236c843c697196 | exe | ||
| 2019-06-20 10:29:03 | 43cfb0a439705ab2bd7c46b39a7265ff0a14f7bd710b3e1432a9bdc4c1736c49 | exe | ||
| 2019-06-20 10:28:58 | 924cc338d5d03f8914fe54f184596415563c4172679a950245ac94c80c023c7d | exe | ||
| 2019-06-20 10:28:54 | ff24d9575694ae2a1e6a6101a2dbaa95dd1ab31b44a3931f6d6a62bbf5be2cbd | docx |
US
MD