URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: jusqit.com
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Blocked
AdGuard :Blocked
Cloudflare :Blocked
ProtonDNS :Blocked
OpenBLD :Blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2019-08-01 06:46:03 UTC
Total malware sites :22
Online malware sites :0 (0%)
Offline Malware sites :22 (100%)
A record(s) observed :35

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-06-10 19:10:39 34.209.195.255ec2-34-209-195-255.us-west-2.compute.amazonaws.comNot listedAS16509 AMAZON-02- USyes
2025-04-27 08:33:08 52.26.80.133ec2-52-26-80-133.us-west-2.compute.amazonaws.comNot listedAS16509 AMAZON-02- USno
2020-04-09 18:06:10 89.208.199.250250.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-04-09 12:07:09 95.163.214.3939.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-04-02 20:22:55 89.208.222.8484.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-04-01 12:16:46 95.163.180.174174.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-04-01 10:17:47 89.208.231.107107.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-03-27 13:27:12 79.137.175.5959.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-03-27 06:33:42 79.137.175.7575.mcs.mail.ruNot listedAS47764 VK-AS- RUno
2020-01-22 18:25:31 192.99.76.30Not listedAS16276 OVH- CAno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2020-03-04 16:21:05http://jusqit.com/3A/50983301.exeOfflineAgentTesla ext exe jcarndt
2020-03-03 10:28:16http://jusqit.com/02/9870410.exeOfflineexe Loki ext zbetcheckin
2020-03-03 10:23:58http://jusqit.com/02/205617.jpgOfflineexe Loki ext zbetcheckin
2020-03-03 10:17:06http://jusqit.com/02/8911307.exeOfflineAZORult ext exe zbetcheckin
2020-03-03 07:22:05http://jusqit.com/02/50196063.exeOfflineexe Loki ext abuse_ch
2019-08-20 08:36:16http://jusqit.com/SF/070851033.exeOfflineAgentTesla ext exe zbetcheckin
2019-08-20 06:42:22http://jusqit.com/AW/60374555OfflineAgentTesla ext JAMESWT_MHT
2019-08-19 21:03:07http://jusqit.com/AW/r-bOfflineexe RemcosRAT ext zbetcheckin
2019-08-19 11:52:08http://jusqit.com/AW/609077Offlineexe zbetcheckin
2019-08-19 07:38:08http://jusqit.com/AW/josh5OfflineAgentTesla ext dvk01uk
2019-08-15 02:14:07http://jusqit.com/44/PO-74788383892939.exeOfflineexe Loki ext zbetcheckin
2019-08-14 15:35:03http://jusqit.com/33/5089110.exeOfflineexe Formbook ext zbetcheckin
2019-08-14 14:05:05http://jusqit.com/33/1118882.exeOfflineexe Loki ext zbetcheckin
2019-08-14 08:30:04http://jusqit.com/33/33029796.exeOfflineexe Loki ext zbetcheckin
2019-08-14 08:12:09http://jusqit.com/33/8451000065.exeOfflineAgentTesla ext exe zbetcheckin
2019-08-10 18:54:05http://jusqit.com/22/06161.exeOfflineexe zbetcheckin
2019-08-09 14:20:04http://jusqit.com/22/5094777.exeOfflineexe zbetcheckin
2019-08-09 12:30:04http://jusqit.com/22/4901877.exeOfflineexe abuse_ch
2019-08-08 01:40:07http://jusqit.com/11/Scan_65784978Offlineexe Formbook ext zbetcheckin
2019-08-05 10:57:08http://jusqit.com/00/7659011Offlineexe Loki ext zbetcheckin
2019-08-01 06:51:11http://jusqit.com/7-7/0001378Offlineexe Loki ext abuse_ch
2019-08-01 06:46:14http://jusqit.com/7-7/555503779Offlineexe abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2020-03-03 10:28:16dd0c0f0c7e86508649f737c9707995301ada9a0059bb3b40f0a952d886ff32f0exe Loki
2020-03-03 10:23:587841400bcdd01987a6c5a7bf1e84a650d78ec90417a4f651784e6e45f81d9303exe Loki
2020-03-03 10:17:06c74bc9a1e5504b0d356e3ac4c21445c23c9ae35be8f621039d611366314a1558exe AZORult
2020-03-03 07:22:059a701b81f02e9b75a236eb4aad04920664410b73b290ec2cc96146d9d4eea9a6exe Loki
2019-08-20 08:36:16c6c33f32f3ee21e4881fe857d3ffc27619aaeff9f4ef068884011233144682a7exe AgentTesla
2019-08-20 06:42:2052c92b264c4a2b92af4d4c1f9f3bcbf5e508520b7e75a48e12255ec02b2ff61cexe AgentTesla
2019-08-19 21:03:072727742d465537665c95a6954bebf944236700592859534f2d5119af90a1d835exe RemcosRAT
2019-08-19 11:52:08f4ff0539fa92254db356a7513313b8cf67b78e2666dbd2d7fc2f2a7bf5b61f51exe  
2019-08-19 07:38:083520f1e456c780090cae620a299c16553ebca763772ee1207c2e2e697d455f4fexe AgentTesla
2019-08-15 02:14:07b4e2d252af5254350ea62069b7d2f593a3e53233cac13b15edb5e183e5a2df70exe Loki
2019-08-14 15:35:03dcf7492e81811ade045329a9d2da8324384ff11e1355ed4241210e12061e3ac2exeFormBook
2019-08-14 14:05:05b9d736120cf8552b8bd3b702839375f1fcbcb375fcd58491016bb19656b78adfexe Loki
2019-08-14 08:30:04e2df8406626bed520f3d28ad1bead8752976fab54037f4d65b154db64ff1f74dexe Loki
2019-08-14 08:12:09f90a303434b8f13c596d55ba05a15561209cf3ccfa4b0685ead004b7b8857e3eexe AgentTesla
2019-08-10 18:54:05fc61cae77103c883e1f65d46a32eee3fce68fbbfae36e691b7feafb354d59ba4exe  
2019-08-09 14:20:030bf6ef66bbbd33d32b6c81218dc077a6a5abf6eb146541cfbb00205c95ee7c49exe  
2019-08-09 12:30:042402cb163e4a4f97ebbe430bba56be718c3d0e137dd95ea3c0fecfc6884f13fdexe  
2019-08-08 01:40:06ed82fdd270f6e7f5342634ccf349fd74fd93f7865111b07e3f2c68303fbaa591exe FormBook
2019-08-05 10:57:086ebc9d06d364233b8a7f22ae9ced14b8885565157093722ff561283c936e860cexe Loki
2019-08-01 06:51:115881d61306b16f0497354235b2c726e8c46c5fc649c4940a75ac1ec8bbf69c88exe Loki
2019-08-01 06:46:146c64d894e4801ae31b170425f17cdd65669dac3e78812b55f447526fb4f05a17exe