#botnet search results

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

⚠️ Nuevo #botnet en acción: AISURU está usando millones de dispositivos IoT como armas DDoS 💥 Tu cámara o router podrían estar atacando sin que lo sepas. 🔒 Cambia contraseñas, actualiza firmware. 💼 En @MMarcoSeguridad y @Ciberseguridad24h protegemos. 🌐 mmarcoseguridad.com


"Since October 8, 2025, GreyNoise has tracked a coordinated botnet operation involving over 100,000 unique IP addresses from more than 100 countries targeting Remote Desktop Protocol (RDP) services in the United States". #Cybersecurity #BotNet #RDP greynoise.io/blog/botnet-la…


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

💥 RondoDox botnet is firing an 'exploit shotgun' at Microsoft Edge vulnerabilities. Is your endpoint security ready? #Botnet #EdgeSecurity ⤵️


#DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS ift.tt/JG9jbn8

omvapt's tweet image. #DDoS #Botnet Aisuru Blankets #US #ISPs in Record DDoS 
ift.tt/JG9jbn8

Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet exe.io/xrxcd

Leopoldo1048398's tweet image. Nuevo botnet peligroso, RondoDox, ataca a nivel mundial a una velocidad incontrolable. ¡Descubre los detalles! #ciberseguridad #botnet
exe.io/xrxcd

🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية” شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد. #RondoDox #Botnet #Malware #CyberThreat

Mshoraty's tweet image. 🔹 بوت نت RondoDox يستخدم أسلوب “طلقات الاستغلال العشوائية”
شبكة RondoDox Botnet تعتمد على استراتيجية هجومية جديدة تُعرف بـ “Exploit Shotgun” لاستهداف أكبر عدد من الأنظمة في وقت واحد.
#RondoDox #Botnet #Malware #CyberThreat

RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

movingWordsIT's tweet image. RondoDox insegna che la tecnologia è sia affascinante che inquietante, mentre OpenAI e Microsoft affrontano le loro sfide. #OpenAI #botnet daily.movingwords.it

#ThreatProtection Uptick of activity attributed to the #RondoDox #botnet, read more about Symantec's protection: broadcom.com/support/securi… #malware


Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

abuse_ch's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘…

🪲 Security RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs. #Botnet #Vulnerabilities #CyberSecurity #IoT

Strivehawk's tweet image. 🪲 Security
RondoDox botnet targets 56 n-day flaws across 30+ device types, including Pwn2Own-disclosed bugs.
#Botnet #Vulnerabilities #CyberSecurity #IoT

Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted. C2: hxxp://80[.]251.153.96/ md5:…

0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…
0x6rss's tweet image. Joker (IRATA/COPYBARA) #Android banking #botnet is still active. It has been observed that they are making changes to the botnet panel. Additionally, it appears that they are now targeting #Russia, a country they had not previously targeted.

C2: hxxp://80[.]251.153.96/
md5:…

94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet IP resolves to cyberbotne.stresse[.]live Using @ValidinLLC to pivot on base domain, I came across another IP 94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser
raghav127001's tweet image. 94.156.71.]55 seems to be hosting files related to #mirai #botnet provider Limenet 
IP resolves to cyberbotne.stresse[.]live
Using @ValidinLLC  to pivot on base domain, I came across another IP 
94.156.66[.]191 which previously had the website title StressLand :: Best IP Stresser

#mirai #botnet 💣69.165.74.77💣💣47.120.60.228💣 Files: -x86 -arm -mpsl -mips -x86_64 -debug.dbg

RacWatchin8872's tweet image. #mirai #botnet
💣69.165.74.77💣💣47.120.60.228💣
Files:
-x86
-arm
-mpsl
-mips
-x86_64
-debug.dbg

#botnet #iocs! 430 duplicates which means they have been online for a while. and 49 new malware urls! Malware urls/IOC's can be found here: pastebin.com/0QTEJvkX urlhaus.abuse.ch/browse/

banthisguy9349's tweet image. #botnet #iocs!

430 duplicates which means they have been online for a while.
and 49 new malware urls!

Malware urls/IOC's can be found here:
pastebin.com/0QTEJvkX
urlhaus.abuse.ch/browse/

IM android botnet #botnet is active. its based in China hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a APK distribution address: hxxps://besa[.]top/test C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html icon_hash="-1153292831" urlscan:…

0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…
0x6rss's tweet image. IM android botnet #botnet is active.  its based in China
hash: 2e81663fda2f410c23b8642984d2076686129640b42fd3e866ad16e6cfd2c06a
APK distribution address: hxxps://besa[.]top/test
C2: hxxp://c999testdemo[.]pk6gb3[.]top:8092/pages/console/login.html
icon_hash="-1153292831" 
urlscan:…

⚠️New #Android Banking Botnet Affecting many countries.. C2: hxxp://16.163.253[.122:8020 @LukasStefanko @malwrhunterteam

0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam
0x6rss's tweet image. ⚠️New #Android Banking Botnet 
Affecting many countries..
C2: hxxp://16.163.253[.122:8020
@LukasStefanko @malwrhunterteam


🚨#Opendir #botnet🚨 http://176.113.115.7/files/ ⚠️#Redline #Stealer ☣️C2C hosting with several pieces of malware per folder. 🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)
ShanHolo's tweet image. 🚨#Opendir #botnet🚨

http://176.113.115.7/files/ 
⚠️#Redline #Stealer 
☣️C2C hosting with several pieces of malware per folder. 
🔥#Bulletproof Hosting CATTECHNOLOGIES-AS, HK (AS57678)

🚨 Ermac Banking #Botnet v3.0 Leak 🚨 A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide. #Cybercrime #Malware

cyberfeeddigest's tweet image. 🚨 Ermac Banking #Botnet v3.0 Leak 🚨

A site distributing #Hackingtools allegedly shared Ermac Banking Botnet V3.0 — an evolved #Android trojan derived from Cerberus & Hook. It targets 700+ banking, shopping & crypto apps worldwide.

#Cybercrime #Malware

Andromeda #BOTNET (Downloader)

TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)
TEAkolik's tweet image. Andromeda #BOTNET (Downloader)

Found another interesting IP on #limenet http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080
raghav127001's tweet image. Found another interesting IP on #limenet

http://91.92.242[.]121:1337 seems to be a #botnet dashboard showing the count of current infected hosts. Same on port 8080

Ever heard of a #botnet? If not, it’s time to pay attention 👀 These massive networks of hacked devices are behind some of the biggest #cyberattacks ever! Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Resonancesec's tweet image. Ever heard of a #botnet? 
If not, it’s time to pay attention 👀

These massive networks of hacked devices are behind some of the biggest #cyberattacks ever!

Let’s break down what botnets are, the most notorious botnets, the massive attacks they’ve executed, and how to keep your…

Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/ We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

neurasoftdev's tweet image. Looks like this #Mirai threat actor is a BIG fan of our URLhaus platform 😜 

👉 hXXp://45.141.215.196/FuckYou0urlhaus0abuse0ch/

We thought we'd send a little love back to the threat actor... their server’s been taken down, and their #botnet C2 domain is now sinkholed. 😘

Loading...

Something went wrong.


Something went wrong.


United States Trends