URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: webkita.co.id
Domain registrar: n/a
Domain registration date:2021-07-20 07:09:07 UTC
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Not blocked
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Not blocked
OpenBLD :Not blocked
DNS4EU :Blocked
Control D HaGeZi :Not blocked
Firstseen:2022-07-05 12:09:08 UTC
Total malware sites :2
Online malware sites :0 (0%)
Offline Malware sites :2 (100%)
A record(s) observed :6

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2025-04-27 09:49:20 76.76.21.21SBL688052AS16509 AMAZON-02- USyes
2023-06-16 12:16:07 153.92.13.227Not listedAS47583 AS-HOSTINGER- IDno
2023-03-16 14:42:02 153.92.13.126srv171.niagahoster.comNot listedAS47583 AS-HOSTINGER- IDno
2023-03-13 01:29:15 2.57.90.16Not listedAS47583 AS-HOSTINGER- GBno
2022-07-21 20:12:42 103.30.144.66expired.jcamp.netNot listedAS46050 JOGJACAMP-AS-ID- IDno
2022-07-05 12:09:18 103.153.3.19idn12.dewabiz.comNot listedAS140389 IDNIC-DBIZ-AS-ID- IDno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2022-07-05 14:06:07http://webkita.co.id/1/data64_4.exeOffline32 exe Formbook ext RedLineStealer ext zbetcheckin
2022-07-05 12:09:18http://webkita.co.id/10/data64_6.exeOfflineexe abuse_ch

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2022-07-10 09:33:45f54a8831bb18bebc4d0da8f21487b8dcefafa30e327cf531e6f534d44cea3e6cexe  
2022-07-08 17:04:02d05d432ffab108b9744b68235abf9032e9cc438bb8bd00553528a43a2aacc884exe RedLineStealer
2022-07-08 15:15:15be0dc883bf742b13dbc619f2089ddf8d58a9c76963a4be58bf7388a8c791d25bexe  
2022-07-08 13:40:3862c4400c4693fe1b3a65885b056535f73596c23aef1f1ab59d5326f6e82e77d4exe  
2022-07-08 12:07:37dc13f7326d81ea20c6b656eafee7ba4344d980367f6e87d7436c5c135e85954eexe  
2022-07-08 11:39:27264b411e3e9b078fa139f0826563a8c06ddc55c9e9ca44d8247a12322fd7844dexe  
2022-07-08 04:57:38cdda5df3efdd63c17e63d224afa3843dfff8f206de95e241dabad547d5c23b65exe  
2022-07-08 01:06:34e4d1f13bea69ce454b20a3f1e81896c6e4f8895e81fa27b274c282e1fd31d03dexe  
2022-07-07 23:46:32e2022516425f2bb130029911a987fd600063d514fd007b9c34bcb678fcab53dbexe  
2022-07-07 22:29:04f72acfd5698f20d5de4a82831c7787e7d094e44dfdb0844487b303edbffe6f46exe  
2022-07-07 22:07:00d2b929696b2f81764d37a54f0ca438919fbe89bf827680fd3bf505baa468d82dexe  
2022-07-07 17:56:07f62cb57490bdf1901bbff1679464b10666cbf261f83f619724bc8b88c208560dexe  
2022-07-07 06:24:58985c21cacb5de7b0cec48f829d94ae79d3657fdaa92b79c11d48f17be8ca54d9exe  
2022-07-07 04:37:4012082c8d55bbb94c54a8e5ab9231ecd8cb42a498234692d1450d436990d57cfdexe  
2022-07-07 00:40:14cf3a65e072d2cfd9ee8325180afa49f9bb2d7849a6f6266349e9b79d48032dfbexe Formbook
2022-07-05 14:06:07fafa893b8c65bb1851b77a7c7f829aa347a3a14aa9225abe6e1c23fe4728464bexeRedLineStealer
2022-07-05 12:09:182b3a6fb5a821e5c0f4ac627b4c0fa56ee9743aa2ff3485db0a03a1d302005936exe