Searching 104.21.43.34

You still have 17/20 request limit available for today. Sign up to get higher limits.

Need higher request limit? Sign up for free!

SIGN UP IN SECONDS
No credit card required

Results for 104.21.43.34

malicious
104.21.43.34
IP
N/A
final ransomware malware phishing ransomware scam spy spyware malicious stealer attack
Toronto
Ontario
N/A
43.6532°, -79.3832°
Cloudflare, Inc.
104.16.0.0/13

Malicious Reports for 104.21.43.34

Source Description Last Seen References
oisd.nl Malware detected with this host, including blocks ads, (mobile) app ads, phishing, malvertising, malware, spyware, ransomware, cryptoJacking, scam, etc. 01/16/2025 00:05:47 (UTC) adl-youtube.pro,ex1pans1on.life,kempsmsg.com,ultrapuzzle712.shop,utterrelat.shop
Abuse.ch ThreatFox Deemed malicious due to: Lumma Stealer 01/14/2025 20:17:27 (UTC) utterrelat.shop
Abuse.ch ThreatFox Deemed malicious due to: {action} 01/14/2025 20:19:35 (UTC) utterrelat.shop
Hybrid-Analysis Host has shown activity related to malware. 01/15/2025 04:45:04 (UTC) utterrelat.shop
Phishing Army Involved in phishing activities 01/01/2025 00:08:13 (UTC) bitvavo-security.info,dgwm.ink,ex1pans1on.life,riotgamesonline.com
PhishTank Detected phishing site focused on: {action} 12/31/2024 13:17:25 (UTC) bitvavo-security.info,dgwm.ink
CERT-PL Flagged as a malicious domain by Computer Emergency Response Team for Poland 07/24/2024 00:01:55 (UTC) ex1pans1on.life
Politie.nl Malware detected with this host, including domains and IPs used for phishing attacks and malware distribution. 12/08/2023 02:25:28 (UTC) ex1pans1on.life
OpenPhish Detected phishing site: {action} 09/02/2024 12:00:47 (UTC) tge-me.com

Ready to investigate?

SIGN UP IN SECONDS
No credit card required
footer-frame