URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: readinglistforjuly9.xyz
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2021-08-09 14:24:08 UTC
Total malware sites :1
A record(s) observed :3

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-05-02 00:59:29 188.40.141.211static.211.141.40.188.clients.your-server.deNot listedAS24940 HETZNER-AS- DEno
2021-08-09 15:15:13 5.44.45.140bavg.netNot listedAS49505 SELECTEL- RUno
2021-08-09 14:24:10 141.136.0.194Not listedAS43513 NANO-AS- LVno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2021-08-09 14:24:10http://readinglistforjuly9.xyz/raccon.exeOffline32 exe RaccoonStealer ext zbetcheckin

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2021-08-09 14:24:09ba82f00041a9a6532de2ef36c3b39e0dde065b97b9c36f24baf9dcc57a7f9180exeRaccoonStealer