Source | Description | Last Seen | References |
---|---|---|---|
PhishTank | Detected phishing site focused on: {action} | 08/28/2024 21:44:00 (UTC) | uswp.wnrkhvp.shop |
Phishing Army | Involved in phishing activities | 12/27/2024 00:07:11 (UTC) | accestg.ru,informed.deliveryqir.top,tragicznepasy.click,twint.cfd,uswp.wnrkhvp.shop |
Politie.nl | Malware detected with this host, including domains and IPs used for phishing attacks and malware distribution. | 12/15/2023 00:20:13 (UTC) | tragicznepasy.click,xcity.dev |
oisd.nl | Malware detected with this host, including blocks ads, (mobile) app ads, phishing, malvertising, malware, spyware, ransomware, cryptoJacking, scam, etc. | 07/27/2024 00:06:40 (UTC) | ailocate-blastl2.com,tragicznepasy.click,xcity.dev |
PhishStats | Phishing URL | 12/26/2024 11:18:54 (UTC) | informed.deliveryqir.top,twint.cfd |
CERT-PL | Flagged as a malicious domain by Computer Emergency Response Team for Poland | 07/24/2024 00:02:39 (UTC) | tragicznepasy.click |
OpenPhish | Detected phishing site: {action} | 04/13/2024 12:01:09 (UTC) | accestg.ru |
Hybrid-Analysis | Host has shown activity related to malware. | 12/27/2024 15:00:57 (UTC) | blindfind.de |
Copyright © 2024 SecureFeed. All rights reserved.
Terms of Service | Privacy Policy