Loading...
CARD INFO

Dominio: nipponindiaim.com
Registrar: GoDaddy.com, LLC
Motori AV recap
- Malevolo: 0
- Sospetto: 0
- Non rilevato: 28
- Innocuo: 66
Analisi Antivirus:
- Acronis: [harmless] clean
- 0xSI_f33d: [undetected] unrated
- Abusix: [harmless] clean
- ADMINUSLabs: [harmless] clean
- Axur: [undetected] unrated
- Criminal IP: [harmless] clean
- AILabs (MONITORAPP): [harmless] clean
- AlienVault: [harmless] clean
- alphaMountain.ai: [harmless] clean
- AlphaSOC: [undetected] unrated
- Antiy-AVL: [harmless] clean
- ArcSight Threat Intelligence: [undetected] unrated
- AutoShun: [undetected] unrated
- benkow.cc: [harmless] clean
- Bfore.Ai PreCrime: [undetected] unrated
- BitDefender: [harmless] clean
- Bkav: [undetected] unrated
- Blueliv: [harmless] clean
- Certego: [harmless] clean
- Chong Lua Dao: [harmless] clean
- CINS Army: [harmless] clean
- Cluster25: [undetected] unrated
- CRDF: [harmless] clean
- CSIS Security Group: [undetected] unrated
- Snort IP sample list: [harmless] clean
- CMC Threat Intelligence: [harmless] clean
- Cyan: [undetected] unrated
- Cyble: [harmless] clean
- CyRadar: [harmless] clean
- DNS8: [harmless] clean
- Dr.Web: [harmless] clean
- Ermes: [undetected] unrated
- ESET: [harmless] clean
- ESTsecurity: [harmless] clean
- EmergingThreats: [harmless] clean
- Emsisoft: [harmless] clean
- Forcepoint ThreatSeeker: [harmless] clean
- Fortinet: [harmless] clean
- G-Data: [harmless] clean
- GCP Abuse Intelligence: [undetected] unrated
- Google Safebrowsing: [harmless] clean
- GreenSnow: [harmless] clean
- Gridinsoft: [undetected] unrated
- Heimdal Security: [harmless] clean
- Hunt.io Intelligence: [undetected] unrated
- IPsum: [harmless] clean
- Juniper Networks: [harmless] clean
- Kaspersky: [harmless] clean
- Lionic: [harmless] clean
- Lumu: [undetected] unrated
- MalwarePatrol: [harmless] clean
- MalwareURL: [undetected] unrated
- Malwared: [harmless] clean
- Mimecast: [undetected] unrated
- Netcraft: [undetected] unrated
- OpenPhish: [harmless] clean
- Phishing Database: [harmless] clean
- PhishFort: [undetected] unrated
- PhishLabs: [undetected] unrated
- Phishtank: [harmless] clean
- PREBYTES: [harmless] clean
- PrecisionSec: [undetected] unrated
- Quick Heal: [harmless] clean
- Quttera: [harmless] clean
- SafeToOpen: [undetected] unrated
- Sansec eComscan: [undetected] unrated
- Scantitan: [harmless] clean
- SCUMWARE.org: [harmless] clean
- Seclookup: [harmless] clean
- SecureBrain: [undetected] unrated
- SOCRadar: [harmless] clean
- Sophos: [harmless] clean
- Spam404: [harmless] clean
- StopForumSpam: [harmless] clean
- Sucuri SiteCheck: [harmless] clean
- ThreatHive: [harmless] clean
- Threatsourcing: [harmless] clean
- Trustwave: [harmless] clean
- Underworld: [undetected] unrated
- URLhaus: [harmless] clean
- URLQuery: [harmless] clean
- Viettel Threat Intelligence: [harmless] clean
- VIPRE: [undetected] unrated
- VX Vault: [harmless] clean
- ViriBack: [harmless] clean
- Webroot: [harmless] clean
- Yandex Safebrowsing: [harmless] clean
- ZeroCERT: [harmless] clean
- desenmascara.me: [harmless] clean
- malwares.com URL checker: [harmless] clean
- securolytics: [harmless] clean
- Xcitium Verdict Cloud: [harmless] clean
- zvelo: [undetected] unrated
- ZeroFox: [undetected] unrated
Motori che NON classificano il dominio come harmless:
- 0xSI_f33d: undetected (unrated)
- Axur: undetected (unrated)
- AlphaSOC: undetected (unrated)
- ArcSight Threat Intelligence: undetected (unrated)
- AutoShun: undetected (unrated)
- Bfore.Ai PreCrime: undetected (unrated)
- Bkav: undetected (unrated)
- Cluster25: undetected (unrated)
- CSIS Security Group: undetected (unrated)
- Cyan: undetected (unrated)
- Ermes: undetected (unrated)
- GCP Abuse Intelligence: undetected (unrated)
- Gridinsoft: undetected (unrated)
- Hunt.io Intelligence: undetected (unrated)
- Lumu: undetected (unrated)
- MalwareURL: undetected (unrated)
- Mimecast: undetected (unrated)
- Netcraft: undetected (unrated)
- PhishFort: undetected (unrated)
- PhishLabs: undetected (unrated)
- PrecisionSec: undetected (unrated)
- SafeToOpen: undetected (unrated)
- Sansec eComscan: undetected (unrated)
- SecureBrain: undetected (unrated)
- Underworld: undetected (unrated)
- VIPRE: undetected (unrated)
- zvelo: undetected (unrated)
- ZeroFox: undetected (unrated)
Analisi DNS
- Tipo: NS, Valore: ariadne.ns.cloudflare.com
- Tipo: CAA, Valore: ssl.com
- Tipo: NS, Valore: mitch.ns.cloudflare.com
- Tipo: A, Valore: 115.113.23.36
- Tipo: CAA, Valore: letsencrypt.org
- Tipo: CAA, Valore: pki.goog;
- Tipo: CAA, Valore: pki.goog;
- Tipo: SOA, Valore: ariadne.ns.cloudflare.com
- Tipo: CAA, Valore: comodoca.com
- Tipo: CAA, Valore: digicert.com;
- Tipo: CAA, Valore: comodoca.com
- Tipo: MX, Valore: nipponindiaim-com.mail.protection.outlook.com
- Tipo: CAA, Valore: digicert.com;
- Tipo: CAA, Valore: letsencrypt.org
- Tipo: TXT, Valore: v=spf1 include:spf.protection.outlook.com -all
- Tipo: CAA, Valore: ssl.com
Certificato HTTPS
- Emesso da: Entrust Certification Authority - L1K
- Intestato a: *.nipponindiaim.com
- Valido dal: 2020-11-07 14:24:02
- Valido fino al: 2021-11-26 14:24:01
- Algoritmo firma: RSA
- Versione: V3
- Serial number: 1448f38aa0f250c7a998bd141d338de9
LEAKS NOTI e MALWARE Raw data by HudsonRock
Summary
🧠 Dispositivi infetti: 3217
🌐 Utenti compromessi: 3215
🧑‍💼 Utenti aziendali compromessi: 2
🔑 Password aziendali esposte: 2
🔑 Password users esposte: 4915
🧬 Stealer family e conteggio
Lumma: 2279
RedLine: 1578
Generic Stealer: 488
Raccoon: 670
StealC: 458
Vidar: 163
UNKNOWN: 34
CRYPTBOT: 20
Mystic: 2
Taurus: 2
Ficker: 2
🏢 Utenze aziendali compromesse (link/conteggio)
https://sts.nipponindiaim.com: 2
🔐 Utenze users compromesse
    https://mf.nipponindiaim.com/investeasy: 3411
    https://mf.nipponindiaim.com/investeasy/: 554
    https://invest.nipponindiaim.com: 405
    https://mf.nipponindiaim.com: 379
    https://partners.nipponindiaim.com/landing/pages/default.aspx: 121
    https://••••••••••.nipponindiaim.com/••••••/••••••••••••/••••••••••••: 89
    https://••••••••••.nipponindiaim.com/••••••/••••••••••/••••••••••: 62
    https://••••••••••.nipponindiaim.com: 34
    https://••.nipponindiaim.com/: 23
    https://••••••••••.nipponindiaim.com/••••••/••••••••••/••••••••••: 15
    https://••.nipponindiaim.com/•••••••: 15
    https://••••••••••.nipponindiaim.com/•••••••••/••••••••••/••••••••••: 13
    https://••••••••••.nipponindiaim.com/••••••/•••••••/••••••••: 12
    https://••••••••••.nipponindiaim.com/••••••/•••••••/•••••••••••••••: 9
    https://••••••••••.nipponindiaim.com/••••••/•••••••••••/••••••••••••••: 9
    https://••••••••••••••.nipponindiaim.com: 8
    https://••••••••••.nipponindiaim.com/••••••/•••••••••/••••••••••••••••: 7
    https://••••••••••.nipponindiaim.com/••••••/••••••••••••••••••••••••••••/••••••: 6
    https://••••••••••.nipponindiaim.com/••••••/•••••••••••/•••••••••••••: 6
    https://••••••••.nipponindiaim.com: 5
    https://••••••••••••••.nipponindiaim.com/•••••••••/••••••••••••••••••••••: 5
    https://••••••••••.nipponindiaim.com/: 4
    https://••••••••••.nipponindiaim.com/••••••/••••••••••••••/•••••••••••••: 4
    https://••••••••••.nipponindiaim.com/••••••/•••••••/••••••••: 3
    https://••••••••.nipponindiaim.com/•••••••••••/•••••/•••••••.••••: 3
    https://••••••••••••••.nipponindiaim.com/: 2
    https://••••••••.nipponindiaim.com/••••••••••••••/•••/•••••: 2
    https://••••.nipponindiaim.com: 2
    https://••••••••••.nipponindiaim.com/••••••/•••••••••••/••••••••••••••: 2
    https://••••••••••.nipponindiaim.com/••••••/•••••••••••/••••••••••••••: 2
    https://••••••••••.nipponindiaim.com/•••••••••/••••••••••/••••••••••: 1
    https://••••••••.nipponindiaim.com/•••/•••••/•••.••••: 1
    https://••••••••••.nipponindiaim.com/••••••/•••/•••••••••••••••••••••••: 1
    https://••••••••••.nipponindiaim.com/••••••/•••••••••••/••••••••••••••: 1
    https://••••••••••.nipponindiaim.com/•••••••••/•••••••••••••••/••••••••••••••••••: 1
    https://••••••••••.nipponindiaim.com/••••••••••/•••••••/•••••: 1
🛡️ Antivirus rilevati
Windows Defender: 1
Not Found: 3

Questo script colleziona ogni rivendicazione criminale esattamente come esposta dalle fonti (modello "As Is"), in un database SQL per creare un feed permanente, che può anche essere seguito con tecnologia RSS.
Il motore è basato sul progetto ransomFeed, fork in GitHub.