URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: yyc口コミ.com
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Blocked
ProtonDNS :Status unknown
OpenBLD :Blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2018-04-07 08:35:59 UTC
Total malware sites :14
Online malware sites :0 (0%)
Offline Malware sites :14 (100%)
A record(s) observed :3

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2018-09-05 03:01:15 72.52.4.119a72-52-4-119.deploy.static.akamaitechnologies.comNot listedAS213120 PROLEXIC-IP-PROTECT- USno
2018-08-16 06:03:37 112.78.117.97Not listedAS9371 MAINT-JPNIC- JPno
2018-04-07 08:36:25 112.78.117.186Not listedAS9371 MAINT-JPNIC- JPno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2018-07-10 10:09:24http://xn--yyc-jk4buiz50r.com/43Vf2cj/Offlineemotet ext exe heodo ext Anonymous
2018-07-02 16:26:19http://xn--yyc-jk4buiz50r.com/Pago-atrasado/Offlinedoc emotet ext epoch1 heodo ext Cryptolaemus1
2018-06-30 06:28:22http://xn--yyc-jk4buiz50r.com/Facturas-vencidasOfflineemotet ext heodo ext p5yb34m
2018-06-28 22:44:05http://xn--yyc-jk4buiz50r.com/Facturas-vencidas/Offlinedoc emotet ext epoch1 heodo ext Cryptolaemus1
2018-06-26 10:45:10http://xn--yyc-jk4buiz50r.com/Wiv71RQ/Offlineemotet ext exe heodo ext Anonymous
2018-06-22 07:27:33http://xn--yyc-jk4buiz50r.com/Zahlung/Rechnungs...Offlineheodo ext p5yb34m
2018-06-20 05:48:28http://xn--yyc-jk4buiz50r.com/Client/InvoiceOfflineAgentTesla ext doc emotet ext heodo ext DecayPotato
2018-06-19 11:32:10http://xn--yyc-jk4buiz50r.com/Client/Invoice/OfflineAgentTesla ext doc emotet ext heodo ext Anonymous
2018-06-15 18:44:12http://xn--yyc-jk4buiz50r.com/ups.com/WebTracki...Offlineheodo ext JayTHL
2018-06-14 17:16:11http://xn--yyc-jk4buiz50r.com/IRS-TRANSCRIPTS-0...Offlinedoc emotet ext epoch1 heodo ext Cryptolaemus1
2018-06-08 11:11:04http://xn--yyc-jk4buiz50r.com/STATUS/Please-pul...Offlinedoc emotet ext epoch1 heodo ext Cryptolaemus1
2018-06-04 11:50:19http://xn--yyc-jk4buiz50r.com/ups.com/WebTracki...Offlinedoc emotet ext heodo ext c_APT_ure
2018-05-30 20:14:12http://xn--yyc-jk4buiz50r.com/ups.com/WebTracki...Offlinedoc emotet ext heodo ext Cryptolaemus1
2018-04-07 08:36:25http://xn--yyc-jk4buiz50r.com/ACH-FORM/KX-72871...Offlinedoc emotet ext heodo ext cocaman

The table below shows recent payloads delivery by this host.

Firstseen (UTC)SHA256 hashFile typeBazaarSignature
2018-07-11 14:47:3452b9d19f85b3dd673aca5d7a6bf03afd95620485ea43ea012f0254d385da0629exe Heodo
2018-07-02 23:55:3898be60ec830e2f1974e8d7ddd3626e88ad60476a36d3344662a08f1c9fb83182doc Heodo
2018-06-15 20:06:28f5e86722c4805df0eba25b8d85607fe0ea03422c9e60b5a4f6285b0027f03582doc Heodo
2018-06-15 14:57:2810b4c1ae0adc1a115d3912e20347e928100ed65741b74d9430004405644c8864doc Heodo
2018-06-09 13:31:52a8ede5b4e9ad5f52a3c28142fa26a4c2caa2d9bd9e73aead41942d31986e4abedocHeodo