Collective term for software that performs unwanted activity on user's computer like malware, potential unwanted applications (PUA), spying/tracking software, etc.
Cyber Threat Intelligence API
PREBYTES sponsors this website and offers threat intel automation, commercial data feeds, and API access. Please visit Cyber Threat Intelligence Feed for more information.
Latest threats
URL | IP | GEO | Threat | |
---|---|---|---|---|
2024-12-10 15:36:47 | http://169T199T161T156T156T154T165T152T199T213T144T154T212T161T100 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:36:41 | http://152T207T153T161T149T173T169T154T206T204T196T156T215T168T154T103T149T210T164 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:36:41 | http://163T203T168T148T161T174T166T169T199T214T213T156T200T169T167T162T166T220T101 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:35:57 | https://159T212T168T152T162T154T154T169T203T217T199T101T220T149T169T172T161T209T170 ... | 103T153T104T97T98T106T106T99T147T153T147T101T150T106T106 | GB | Heuristi |
2024-12-10 15:35:50 | http://155T211T164T165T149T172T152T167T203T196T213T155T202T153T168T173T151T215T160 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:34:52 | https://170T148T168T101T145T171T101T152T209T208T145T127T205T155T157T155T121 ... | 105T154T98T100T100T112T101T104T153T145T148T107T157 | US | JS:Troja |
2024-12-10 15:34:08 | http://163T223T155T165T149T158T165T153T209T209T205T156T222T102T101T107T101T145T154 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:33:09 | http://155T211T149T172T145T161T166T161T203T214T214T160T200T98T152T168T159T146 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:32:38 | http://169T207T164T167T159T166T170T99T197T210T207T102 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
2024-12-10 15:32:37 | http://171T202T149T166T153T154T162T150T213T203T144T154T212T161T100 ... | 110T154T98T102T98T103T111T105T144T150T149 | LT | Trojan.G |
Featured resources
Below you will find shortcuts to the resources of the website with a brief description.
With time website will be improved by adding new fascinating functionality. If you would like to share your opinion or suggestion please contact us.
NOTE: Using of any automatic, semi-automatic and manual bots, crawlers, mirroring tools is strictly prohibited. Access to certain resources is limited by credit which can be obtained by typing in 'captcha'. If you would like to process data automatically, please contact first.
Add URL
If you want to improve the resources of this site then the best way to do it is add the URL address, which can be dangerous. URL address will be scanned by crawlers which can find threat.
Read more
Stats
Here you can find statistics on the work of crawlers. The statistics include the number of threats detected, the size of files that are harmful, geographic distribution of threats, etc.
Read more
Reports
In this section you will find the detailed reports on the distribution of threats. Reports are divided into two groups: TLD and GEO.
Read more
Search
Search is sometimes the fastest way to reach the appropriate information. Possible queries by following data: MD5, IP address, hostname or the beginnings of a URL.
Read more