Malware URL

Here you can see the latest list of malicious URLs (malware URL) detected by cloud engine.
Anti-Virus Cloud Engine is fully automated real-time security solution helps you to detect suspicious and malware websites instantly — it's like an everytime up-do-date blacklist.

URLRiskDiscovered
  • On this page you can see limited latest 50 - 100 detected URLs.
  • All URL listed in database is dangerous, don't enter them into your browser unless you are a security professional.
  • If you have any questions please contact us.

Do you want to use in your product?

Anti-Virus Cloud Engine is delivered as a fully-hosted web API using a JSON, XML or simple text responses. The API that allows client applications check the reputation and risk of each file or site against an extensive in-the-cloud database before permitting user access.

If you would like to become a NictaTech customer, please contact us
jowotoge[.]309251.comWarning3 hours ago
fd.v2d[.]wnf.shop/tmp/fWarning3 hours ago
11[.]36.93.182:52701/bin.shWarning3 hours ago
data-sync.rolfgrassing[.]r.work/verify-token-7a1f/runtime.v..Warning3 hours ago
110.36.[.].182:52701/iWarning3 hours ago
rolf-admin.rolfgrassinger.wor[.]verify-token-7a1f/runtime...Warning3 hours ago
status-check.rolfgrassin[.]work/verify-token-7a1f/runtim..Warning3 hours ago
edge-v6.rolfgrassinge[.]ork/verify-token-7a1f/runtime.val..Warning3 hours ago
42.227.[.].143:51925/iWarning3 hours ago
user-po[.]l.rolfgrassinger.work/verify-token-7a1f/runtime..Warning3 hours ago
123.9.11[.].83:60217/bin.shWarning3 hours ago
123.11[.]160:47479/bin.shWarning3 hours ago
110.186.23[.]52:42515/bin.shWarning3 hours ago
auth-sys.sarahkapsreit.work/[.]ify-token-7a1f/runtime.val..Warning3 hours ago
s-master.sarahkapsreit[.]work/verify-token-7a1f/runtime.val..Warning3 hours ago
180.252.1[.].169:44282/bin.shWarning3 hours ago
182.117.175[.]5:34217/iWarning3 hours ago
cloud-kaps.sarahkapsre[.]work/verify-token-7a1f/runtime.v..Warning3 hours ago
login-web.sarahka[.]sreit.work/verify-token-7a1f/runtime.va..Warning3 hours ago
120.28.[.]17.230:42638/bin.shWarning3 hours ago
internal-r.sarahkapsreit.w[.]verify-token-7a1f/runtime.v..Warning3 hours ago
110.186.[.]30.252:42515/iWarning3 hours ago
12[.]1.7.160:47479/iWarning3 hours ago
123.9.111.[.]:60217/iWarning3 hours ago
site-view3.sa[.]apsreit.work/verify-token-7a1f/runtime.v..Warning3 hours ago
temp-f8.herbertrut[.]rk/verify-token-7a1f/runtime.valida..Warning3 hours ago
180[.]52.131.169:44282/iWarning3 hours ago
110.36.25.33[.]160/bin.shWarning3 hours ago
core-logic.herbertrutt.work/v[.]rify-token-7a1f/runtime.val..Warning3 hours ago
61.52[.]73.217:58449/iWarning3 hours ago
122.1[.]43.62:2705/iWarning3 hours ago
163.142.[.]109:41074/iWarning3 hours ago
jo[.]imbotyt.siteWarning3 hours ago
r-relay.herbertrutt.work[.]erify-token-7a1f/runtime.valida..Warning3 hours ago
120.28.217[.]230:42638/iWarning3 hours ago
herb-store.herbertrutt.[.]ork/verify-token-7a1f/runtime.val..Warning3 hours ago
11[.].63.118.144:41618/bin.shWarning3 hours ago
180.110.80[.]83:39377/bin.shWarning3 hours ago
exec-unit.herbertrutt.wo[.]k/verify-token-7a1f/runtime.vali..Warning3 hours ago
map-entry.h[.]rtrutt.work/verify-token-7a1f/runtime.vali..Warning3 hours ago
acce[.]8.bnaumann87.work/verify-token-7a1f/runtime.valid..Warning3 hours ago
bal-f7.bnaumann87.work/ver[.]token-7a1f/runtime.validato..Warning3 hours ago
110.36.2[.].33:52160/iWarning3 hours ago
203.177.2[.]7.148:34012/bin.shWarning3 hours ago
115.63.118[.]144:41618/iWarning3 hours ago
upd-naum.bnaumann87.work/veri[.]token-7a1f/runtime.valida..Warning3 hours ago
remote-v1.bnaumann87.work[.]verify-token-7a1f/runtime.valid..Warning3 hours ago
lab-sys5.bnau[.]n87.work/verify-token-7a1f/runtime.valida..Warning3 hours ago
110.3[.]5.167:60639/iWarning3 hours ago
dns-naum.[.]umann87.work/verify-token-7a1f/runtime.valida..Warning3 hours ago

 Download complete malware URL list (171,533 detected last day)


You can use our feeds for ultimate flexible building of any lists (white, black, malware, phishing, false positives, etc) and instant integration into any your security software or hardware system.