URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: vms.h4ck0ps.cc
Domain registrar:Cloudflare -
Domain registration date:2022-09-12 06:45:42 UTC
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Status unknown
Cloudflare :Blocked
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2023-08-20 11:32:06 UTC
Total malware sites :18
Online malware sites :0 (0%)
Offline Malware sites :18 (100%)
A record(s) observed :3

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2023-10-12 19:03:39 104.21.73.124Not listedAS13335 CLOUDFLARENETn/ano
2023-10-12 19:03:39 172.67.190.7Not listedAS13335 CLOUDFLARENETn/ano
2023-08-20 11:32:07 103.145.13.69Not listedAS60528 MYWEBLTD- NLno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2023-08-20 11:34:05http://vms.h4ck0ps.cc:8181/pwnw3.exeOfflineascii exe opendir abuse_ch
2023-08-20 11:34:05http://vms.h4ck0ps.cc:8181/backdoor_for_pdf.exeOfflineascii exe Metasploit opendir abuse_ch
2023-08-20 11:34:04http://vms.h4ck0ps.cc:8181/meta.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:34:04http://vms.h4ck0ps.cc:8181/fatmsf.exe.exeOfflineascii exe opendir ShikataGaNai abuse_ch
2023-08-20 11:34:04http://vms.h4ck0ps.cc:8181/evadef.exeOfflineascii exe meterpreter opendir abuse_ch
2023-08-20 11:33:06http://vms.h4ck0ps.cc:8181/pwnwin1.batOfflineascii bat opendir abuse_ch
2023-08-20 11:33:05http://vms.h4ck0ps.cc:8181/pwn1.batOfflineascii bat opendir abuse_ch
2023-08-20 11:33:05http://vms.h4ck0ps.cc:8181/metapsh.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:05http://vms.h4ck0ps.cc:8181/metab64.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:05http://vms.h4ck0ps.cc:8181/METx64.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:05http://vms.h4ck0ps.cc:8181/raw_pshnet_revhttps.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/powershell_met.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/pshmet-base.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/merlinload.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/pshttps.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/metx64-8118-rc4.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:33:04http://vms.h4ck0ps.cc:8181/metx64-https-1443.ps1Offlineascii opendir powershell ps1 abuse_ch
2023-08-20 11:32:07http://vms.h4ck0ps.cc:8181/final_pshnet_revhttp...Offlineascii meterpreter opendir powershell ps abuse_ch