www.dealdownloadz.com
Domains By Proxy, LLC (Proxy Registrant)
Domain Information
The domain www.dealdownloadz.com is registered by proxy through GODADDY.COM, LLC and was originally registered in August of 2013. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in Singapore, Singapore within Singapore which resides on the CloudFlare, Inc. network. The domain uses the CloudFlare CDN, a distributed domain name server service which utilizes a number of reverse proxy IP Addresses (see below).
Registrant:
Domains By Proxy, LLC
Registrar:
GODADDY.COM, LLC
Server location:
Singapore, Singapore (SG)
Create date:
Friday, August 23, 2013
Expires date:
Tuesday, August 23, 2016
Updated date:
Monday, August 24, 2015
ASN:
AS13335 CLOUDFLARENET - CloudFlare, Inc.,US
Scanner detections:
Detections (100% detected)
Scan engine
Details
Detections
IKARUS anti.virus
Win32.SuspectCrc
100.00%
Malwarebytes
PUP.Optional.Downloadster
100.00%
ESET NOD32
Win32/Toolbar.MyWebSearch (variant), Win32/Toolbar.MyWebSearch.S potentially unwanted (variant)
100.00%
McAfee
Artemis!09A931BD7916, Artemis!C75A7BBDF1AC
100.00%
Trend Micro House Call
TROJ_GEN.F47V0915, TROJ_GEN.F47V0928
100.00%
Reason Heuristics
PUP.Installer.Savvy.N, PUP.Installer.Savvy.J, PUP.Adlogica.Savvy.Bundler (M)
100.00%
Comodo Security
UnclassifiedMalware
60.00%
VIPRE Antivirus
MyWebSearch Toolbar (not malicious)
60.00%
Fortinet FortiGate
Riskware/Fam.NB
60.00%
herdProtect (fuzzy)
a variant of dd2c32e9064ec84deef202aa7565f86c2b9abb1c, a variant of 8d38b43f73bf539ab794111862e9f96c0809e591
40.00%
Bkav FE
W32.Clod81b.Trojan
40.00%
avast!
Win32:Malware-gen
20.00%
The domain www.dealdownloadz.com has been seen to resolve to the following 4 IP addresses.
File downloads found at URLs served by www.dealdownloadz.com.