Currently this domain has been known to host various forms of malware. The hosted servers are located in Carrollton, Texas within the United States which resides on the WEBSITEWELCOME.COM network.
Registrar:
Launchpad.com Inc.
Server location:
Texas, United States (US)
ASN:
AS20013 CYRUSONE - CyrusOne LLC,US
Scanner detections:
Malware distribution (76% detected)
Scan engine
Details
Detections
Kaspersky
not-a-virus:RiskTool.Win64.BitCoinMiner, Trojan.Win64.BitMin, Trojan.Win64.BitMiner, Backdoor.Win32.Androm, UDS:DangerousObject.Multi.Generic, Trojan.Win32.BitMin, not-a-virus:RiskTool.Win64.Agent
70.59%
G Data
Trojan.Generic.11649192, Trojan.Generic.12018459, Win64.Trojan.Agent.2SWF9I, Gen:Variant.Mikey.21583, Win64.Riskware.BitCoinMiner
58.82%
McAfee
RDN/Generic PUP.x!cmq, Artemis!37E2490D6C93, Artemis!7BA630FEC0B0, Trojan.Artemis!AA5AED0894F2, Artemis!9315B6504384, RDN/Generic PUP.x!c2i
52.94%
AVG
BitCoinMiner.D, Skodna.BitCoinMiner, Win32/Cryptor, Generic36, JS/Heur
52.94%
MicroWorld eScan
Trojan.Generic.11649192, Trojan.Generic.12018459, Gen:Variant.Mikey.21583, Rootkit.15355, Application.Hacktool.KQ, Trojan.Generic.15115885
47.06%
K7 AntiVirus
Trojan , Unwanted-Program
47.06%
Bitdefender
Trojan.Generic.11649192, Trojan.Generic.12018459, Gen:Variant.Mikey.21583, Rootkit.15355, Application.Hacktool.KQ, Trojan.Generic.15115885
47.06%
avast!
Win64:Rootkit-gen [Rtk], Win64:Malware-gen, Win32:Trojan-gen
41.18%
Baidu Antivirus
Hacktool.Win64.BitCoinMiner, Trojan.Win64.CoinMiner, Adware.Win32.iBryte, Trojan.Script.Downloader
41.18%
ESET NOD32
Win64/BitCoinMiner (variant), Win64/BitCoinMiner.AN potentially unsafe (variant), Win32/Kryptik.DSUX (variant), Win32/Kryptik.DTRH (variant), Win64/BitCoinMiner.U potentially unsafe (variant)
41.18%
IKARUS anti.virus
not-a-virus:RiskTool.BitCoinMiner, Trojan.Win64.CoinMiner, Trojan.Win64.Nssm, Trojan.Win32.BitMin
41.18%
nProtect
Trojan.Generic.11649192, Trojan.Generic.12018459, Trojan.Generic.15115885, Trojan/W32.Agent.186880.Z
35.29%
Agnitum Outpost
Riskware.BitCoinMiner, Trojan.CoinMiner, Trojan.Agent
35.29%
Trend Micro House Call
TROJ_GEN.R047C0OHO14, TROJ_GEN.R047H05K114, TROJ_GEN.R047C0EJ514, TSPY_AGENT_CD1002E4.RDXN
35.29%
Panda Antivirus
Trj/Chgt.D, Generic Suspicious
35.29%
The domain callfor.info has been seen to resolve to the following IP address.
File downloads found at URLs served by callfor.info.
Title:
“$250-$1000 a Day trading Binary Options on Autopilot”
Description:
“$250 - $1000 a day trading binary options on autopilot.”
Related Domains