URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: step-ksa.org
Domain registrar:Shock Hosting -
Domain registration date:2026-01-08 04:37:18 UTC
Abuse complaint sent to registrar: Yes (2026-01-15 08:16:02 UTC to abuse{at}shockhosting[dot]com)
Domain registry:Public Interest Registry -
Abuse complaint sent to registry: Yes (2026-01-15 08:16:02 UTC to abuse{at}pir[dot]org)
Abuse complaint sent?: Yes (2026-01-15 08:13:01 UTC to ops{at}pir[dot]org)
Spamhaus DBL :Botnet C&C domain
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Blocked
ProtonDNS :Not blocked
OpenBLD :Blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2026-01-15 08:12:05 UTC
Total malware sites :1
A record(s) observed :1

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2026-01-15 08:12:11 216.120.200.174co-s1.serverpanel.comNot listedAS395092 SHOCK-1- USyes

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2026-01-15 08:12:11https://step-ksa.org/ENCRYPTED.ps1Offlineascii Formbook ext powershell ps1 abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2026-01-15 08:12:104f6f49d76b427ecd1df55d94a028a143e1f3795c938c0612ec546775395fb130ps1Formbook