URLhaus Database

Every malware URL on URLhaus is associated with a host. A host can be either an domain name or an IP address (in case the malware URL is hosted on an IP address and doesn't use a domain name).

Database Entry


Host: ybvcgfcsad.ug
Spamhaus DBL :Not blocked
SURBL :Not blocked
Quad9 :Status unknown
AdGuard :Not blocked
Cloudflare :Not blocked
ProtonDNS :Status unknown
OpenBLD :Not blocked
DNS4EU :Not blocked
Control D HaGeZi :Not blocked
Firstseen:2020-05-09 11:16:07 UTC
Total malware sites :2
Online malware sites :0 (0%)
Offline Malware sites :2 (100%)
A record(s) observed :5

IP addresses


The table below shows all IP address observed for this particular host (in case the host is a domain name, all A records will be listed - including all historical ones). Please note that the output is limited to 10 entires.

Firstseen (UTC)IP addressHostnameSBLASNCountryActive?
2020-05-15 13:56:21 80.249.146.59ruled02a.ping.sxNot listedAS49505 SELECTEL- RUno
2020-05-13 16:35:22 84.38.182.209dczd47tr882jqfqq.comNot listedAS49505 SELECTEL- RUno
2020-05-11 04:17:16 5.101.50.223processo7.adwordcenter.co.ukNot listedAS49505 SELECTEL- RUno
2020-05-11 01:34:38 195.66.114.237free.dsNot listedAS204997 FIRSTBYTE-AS- RUno
2020-05-09 11:16:09 80.249.147.231vp17.curtarecife.comNot listedAS49505 SELECTEL- RUno

Malware URLs


The table below shows all malware URLs that are associated with this particular host.

Dateadded (UTC)URLStatusTagsReporter
2020-05-09 14:04:09http://ybvcgfcsad.ug/zxcvb.exeOfflineArkeiStealer ext exe NetWire ext RaccoonStealer ext zbetcheckin
2020-05-09 11:16:09http://ybvcgfcsad.ug/zxcv.EXEOfflineAZORult ext exe GuLoader ext RaccoonStealer ext zbetcheckin