URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: prodesignerslabo.com
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2019-02-26 16:00:29 UTC
Total malware sites :1
A record(s) observed :11

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-10-03 04:34:36 172.233.219.123viridian02.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-10-03 04:34:36 172.233.219.49viridian01.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-10-03 04:34:36 172.233.219.78viridian03.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-10-03 04:34:36 172.237.146.25viridian06.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-10-03 04:34:36 172.237.146.38viridian04.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-10-03 04:34:36 172.237.146.8viridian05.parklogic.comNot listedAS63949 AKAMAI-LINODE-AP- USno
2025-09-02 00:19:52 75.2.33.216ae330f0661aaf4da6.awsglobalaccelerator.comNot listedAS16509 AMAZON-02- USno
2025-05-15 17:20:52 157.7.44.237users271.vip.heteml.jpNot listedAS7506 MAINT-JPNIC- JPno
2019-09-24 19:18:44 157.7.44.220users018.vip.heteml.jpNot listedAS7506 MAINT-JPNIC- JPno
2019-02-26 16:00:32 157.7.188.209users216.phy.heteml.jpNot listedAS7506 MAINT-JPNIC- JPno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2019-02-26 16:00:32http://prodesignerslabo.com/js/lightbox/css/msg...Offlineexe Ransomware Troldesh ext abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2019-02-26 16:00:3273c904d658efa66370dfe8ec83a39c3038343b03e5509fa3280c85bd76790b32exe Ransomware.Troldesh