Golden Cash Botnet-Leasing Network Uncovered

Golden Cash Botnet-Leasing Network Uncovered

Researchers at security firm Finjan said on Wednesday that they have uncovered an underground botnet-leasing network where cyber criminals can pay $5 to $100 to install malware on 1,000 PCs for things like stealing data and sending spam.

The Golden Cash network, dubbed “Your money-making machine” on its home page, sells access to botnets comprised of thousands of compromised PCs to cyber criminals for custom malware spreading jobs, according to issue 2 of the Cybercrime Intelligence Report for 2009.

Here’s how it works: a cyber criminal creates a botnet by hiding malicious code in a legitimate Web site that is used to turn Web surfing PCs into zombies. The code, typically an iFrame, points the PCs to a separate Web site where they are then infected with a Trojan backdoor that reports back to the Golden Cash command and control server.

In order to increase the number of botnets, the Golden Cash server installs an FTP (file transfer protocol) grabber on new zombies to steal credentials used by the computers to run Web sites, giving the server control over additional legitimate Web sites. Approximately 100,000 domains, including corporate domains from around the world, were identified among the stolen FTP credentials under Golden Cash’s control, according to the report.

“This advanced trading platform marks a new milestone in the cybercrime evolution,” Finjan said in a statement.

More technical analysis is available on Finjan’s Malicious Code Research Center blog, including the fact that the command and control server is hosted in Texas, the registrant country is China and the “proxy” Web site that tunnels traffic to the command and control server is hosted in Krasnodar, Russia.

Source: Cnet

Beware of the Golden Cash Botnet – FrugalTech


Advertisement

FBI Warns of ‘Money Mule’ Scams

FBI Warns of ‘Money Mule’ Scams

Robert McMillan, IDG News Service

The job looks pretty good at first blush: “Become our partner and earn $2,000 or more!”

All you have to do is send a résumé with some personal information to a company in Russia. They, in turn, ask you to set up a checking account that soon starts filling with cash. You take the money to Western Union and wire it to your new employer, keeping 5 percent and 10 percent for yourself. Easy money, right?

Except that it’s illegal money laundering, called “money muleing” by the security industry. The incoming checks are fakes, or else the cash is stolen from hacked online bank accounts.

The U.S. Federal Bureau of Investigation (FBI) warned Wednesday that its Internet Crime Complaint Center (IC3) has been receiving “numerous complaints” from people who have become unwitting victims to these work-from-home scams.

“Work-at-home schemes attract otherwise innocent individuals, causing them to become part of criminal schemes without realizing they are engaging in illegal behavior,” the FBI said. The IC3 is run jointly by the FBI, the National White Collar Crime Center and the Bureau of Justice Assistance.

In other, similar scams, victims may be asked to reship products that have been purchased with stolen credit cards, or to act as “mystery shoppers,” cashing bogus checks and wiring the funds offshore.

Once they’ve handed over their information to scammers, however, the mules often become victims of identity theft themselves, authorities warn.

With a worsening economic situation, scammers may be looking for new ways to take advantage of the growing ranks of the unemployed. McAfee has been tracking these scams for years, and has long seen the scammers reach victims with spam or with ads on job sites. Recently, however, there’s been an uptick in money muleing pitches, which are sent out via spam or phoney job postings, said Dave Marcus, director of security research and communications with McAfee’s Avert Labs.

“I think a lot of people are unwittingly coming across them though job searches through Google,” he said. “We’ve seen a huge growth in this.”

The prevalence of these fake job ads is up 345 percent over the past three years, according to the most recent data from the U.K.’s Association for Payment Clearing Services, which tracks this activity.

The Web sites recruiting the mules have also become slicker and more believable, Marcus said. “I think they’ve upped their professionalism,” he said. “It’s kind of analogous to the way spammers have upped their game professionally.”

Although the Internet Crime Complaint Center, which acts as a clearinghouse for data on cybercrime, hasn’t spotted a statistical uptick in Internet crime linked to the global recession, it’s seen anecdotal evidence of this happening, said IC3 spokesman Craig Butterworth. “Whenever there is a downturn in the economy, it exposes certain vulnerabilities in our society.”

Source: PC World – Business Center

FBI Warns of 'Money Mule' Scams

FBI Warns of ‘Money Mule’ Scams

Robert McMillan, IDG News Service

The job looks pretty good at first blush: “Become our partner and earn $2,000 or more!”

All you have to do is send a résumé with some personal information to a company in Russia. They, in turn, ask you to set up a checking account that soon starts filling with cash. You take the money to Western Union and wire it to your new employer, keeping 5 percent and 10 percent for yourself. Easy money, right?

Except that it’s illegal money laundering, called “money muleing” by the security industry. The incoming checks are fakes, or else the cash is stolen from hacked online bank accounts.

The U.S. Federal Bureau of Investigation (FBI) warned Wednesday that its Internet Crime Complaint Center (IC3) has been receiving “numerous complaints” from people who have become unwitting victims to these work-from-home scams.

“Work-at-home schemes attract otherwise innocent individuals, causing them to become part of criminal schemes without realizing they are engaging in illegal behavior,” the FBI said. The IC3 is run jointly by the FBI, the National White Collar Crime Center and the Bureau of Justice Assistance.

In other, similar scams, victims may be asked to reship products that have been purchased with stolen credit cards, or to act as “mystery shoppers,” cashing bogus checks and wiring the funds offshore.

Once they’ve handed over their information to scammers, however, the mules often become victims of identity theft themselves, authorities warn.

With a worsening economic situation, scammers may be looking for new ways to take advantage of the growing ranks of the unemployed. McAfee has been tracking these scams for years, and has long seen the scammers reach victims with spam or with ads on job sites. Recently, however, there’s been an uptick in money muleing pitches, which are sent out via spam or phoney job postings, said Dave Marcus, director of security research and communications with McAfee’s Avert Labs.

“I think a lot of people are unwittingly coming across them though job searches through Google,” he said. “We’ve seen a huge growth in this.”

The prevalence of these fake job ads is up 345 percent over the past three years, according to the most recent data from the U.K.’s Association for Payment Clearing Services, which tracks this activity.

The Web sites recruiting the mules have also become slicker and more believable, Marcus said. “I think they’ve upped their professionalism,” he said. “It’s kind of analogous to the way spammers have upped their game professionally.”

Although the Internet Crime Complaint Center, which acts as a clearinghouse for data on cybercrime, hasn’t spotted a statistical uptick in Internet crime linked to the global recession, it’s seen anecdotal evidence of this happening, said IC3 spokesman Craig Butterworth. “Whenever there is a downturn in the economy, it exposes certain vulnerabilities in our society.”

Source: PC World – Business Center

Warehouse Worker: Apple Staffing, Inc.

Defrawi does have a history, a felony fraud conviction for a federal jobs scam in the 1990’s where he took advance fees for non-existant jobs.

Job offers as such are nothing more than a marketing ploy or deceptive marketing practices by non other than Mr. Alex Difrawi aka Alec Difrawi aka Ayman A. Difrawy aka Ayman A. El-Difrawi aka Alex Simon dba Three Stars Media dba 3Starsinc dba Three Stars Inc dba Internet Solutions Corporation and his many aliases. Mr. Difrawi goal is to get you to sign up for continuing education. He should say outright what it is he’s peddling.

An Example of What ScamFraudAlert seek from Mr. Difrawi – Good Business Practices

3Stars Inc Leader in Internet Marketing For Online Education Providers

WFTV.COM – CHANNEL 9 Reporting on Alec Difrawi & Three Stars Inc.

Channel9 Reporting three years ago. Notice the website names have changed

Company Name Apple Staffing, Inc.
Job Category Construction/Facilities; Manufacturing/Operations
Location Dallas, TX • Atlanta, GA
Position Type Full-Time, Employee
Salary Starting at $16 per hour
Experience 0-1 Years Experience
Desired Education Level High School
Date Posted June 19, 2009

Brand new distribution center seeking a dedicated and resourceful individual who understands and can thrive in a fast paced distribution environment. We seek self -motivated and competitive people with a dedicated work ethic in sales and service that are willing to multi-task. This person will begin as a route manager, preparing and driving a truck delivering quality product to our customers safely and in a timely manner. Guardian provides a family type atmosphere where teamwork and employee input count, and focuses on treating both employees and customers with professionalism and respect. Hard work is rewarded. We are looking for motivated people who wish to grow with the company. This particular position will be full time work. All shifts are open.
We can offer you top benefits, including:

* $16.00 an hour
* Excellent 401K plan
* Medical and Dental Insurance
* Vision Discount Program
* Paid vacations and holidays
* Attendance bonus
* Opportunity for advancement

Requirements Route Driver Requirements:

* Excellent Customer Service skills to build strong customer relationships
* Quality driven
* Good Communication skills
* Driven to succeed
* Must have a valid driver’s license and proven safe driving record
* Maintain a safe work environment
* No CDL required.

Script

Plant Worker Apple Staffing, Inc. Toledo, OH
  • Tulsa, OK

Jun 19

save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Atlanta, GA

  • Dallas, TX

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Winston-salem, NC

  • Utica, NY

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Denver, CO

  • Boise, ID

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Kansas City, MO

  • St Louis, MO

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Birmingham, AL

  • Montgomery, AL

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Athens, GA

  • Duluth, GA

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Kansas City, MO

  • St Louis, MO

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Biloxi, MS

  • Jackson, MS

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Charlotte, NC

  • White Plains, NY

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Jacksonville, FL

  • Tampa, FL

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Wichita, KS

  • South Deerfield, MA

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Plano, TX

  • Tyler, TX

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Greensboro, NC

  • Dayton, OH

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Macon, GA

  • Valdosta, GA

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.South Bend, IN

  • Baton Rouge, LA

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Fort Wayne, IN

  • Indianapolis, IN

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Denver, CO

  • Fort Lauderdale, FL

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Boston, MA

  • Lowell, MA

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Trenton, NJ

  • New York, NY

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Detroit, MI

  • Flint, MI

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Cleveland, OH

  • Memphis, TN

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Austin, TX

  • Corpus Christi, TX

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.El Paso, TX

  • Houston, TX

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Grand Rapids, MI

  • Lansing, MI

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Athens, GA

  • Duluth, GA

Jun 19save –  hide company –  email –  similar jobsWarehouse WorkerApple Staffing, Inc.Chicago, IL

  • Joliet, IL

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Lansing, MI

  • Biloxi, MS

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Greenville, NC

  • Richmond, VA

Jun 19save –  hide company –  email –  similar jobsPlant WorkerApple Staffing, Inc.Mesa, AZ

  • Phoenix, AZ

Jun 19save –  hide company –  email –  similar jobs

Warehouse Worker Apple Staffing, Inc. Moreno Valley, CA

  • Orange, CA
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Madison, WI

  • Milwaukee, WI
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Long Beach, CA

  • San Francisco, CA
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Atlanta, GA

  • Savannah, GA
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Atlanta, GA

  • Savannah, GA
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Miami, FL

  • Port St Lucie, FL
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Austin, TX

  • San Antonio, TX
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Ontario, CA

  • Riverside, CA
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Madison, WI

  • Milwaukee, WI
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Mesquite, TX

  • Pasadena, TX
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Killeen, TX

  • Midland, TX
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Long Beach, CA

  • San Francisco, CA
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Moreno Valley, CA

  • Orange, CA
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Miami, FL

  • Port St Lucie, FL
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Kansas City, MO

  • St Louis, MO
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Atlanta, GA

  • Chicago, IL
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Memphis, TN

  • Nashville, TN
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Kenosha, WI

  • Racine, WI
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Kenosha, WI

  • Racine, WI
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Garden Grove, CA

  • Hayward, CA
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Austin, TX

  • San Antonio, TX
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Kansas City, MO

  • St Louis, MO
Jun 17
save –  hide company –  email –  similar jobs
Warehouse worker Apple Staffing, Inc. Miami, FL

  • Port St Lucie, FL
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Mesquite, TX

  • Pasadena, TX
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Long Beach, CA

  • San Francisco, CA
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Memphis, TN

  • Nashville, TN
Jun 17
save –  hide company –  email –  similar jobs
Warehouse Worker Apple Staffing, Inc. Joliet, IL

  • Rockford, IL
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Killeen, TX

  • Midland, TX
Jun 17
save –  hide company –  email –  similar jobs
Forklift Operator Apple Staffing, Inc. Cincinnati, OH

  • Memphis, TN
Jun 17
save –  hide company –  email –  similar jobs
Production Worker Apple Staffing, Inc. Ann Arbor, MI

  • Clinton, MI
Jun 1

Apple Staffing Jobs2Apple Staffing Jobs

WareHouse Worker

Finjan Uncovers Cybercrime Network

Finjan Uncovers Cybercrime Network

19/06/2009

A trading platform for hackers and cybercriminals has been uncovered by an IT security firm.

Finjan uncovered Golden Cash, a means for buyers and sellers of infected computers to meet and buy goods from one another.

The system is so sophisticated that there is even a price list for infected computers, with PCs in some Far Eastern countries trading for as little as $5 per 1,000, while Australian machines cost $100 for the same number.

‘An infected machine (or botnet) is no longer a one-time asset for an individual cybercriminal. It has evolved into a digital asset that the cybercriminal can trade online – over and over again,’ the report stated.

‘Each trade results [in] a different ‘owner’, who can decide to install additional malware on the purchased infected machine and then sell it on to others.’

Golden Cash sees hackers act as sellers to cybercriminals, who then use the infected machines for fraudulent activities.

http://www.bcs.org/server.php?show=conWebDoc.26979

Mystery/Shopper [$850/week]

Thank you for your interest in the Mystery Shopper position.
Our company conducts surveys and evaluates other companies in order to help them achieve their performance goals.
We offer an integrated suite of business solutions that enables corporations to achieve tangible results in the marketplace.

We get hired by other companies and act like customers to find out how they are handling their services in relation to their customers.
Mystery Shopping is the most accurate and reliable tool a business can use to gather information regarding their actual customer service performance at the moment of truth.
This moment of truth is not when the staff is on their best behavior because the boss is around – it is when they interact with customers during their normal daily routines.

This is where you, the Mystery Shopper, come in.
You pose as an ordinary customer and provide feedback of both factual observations (ex…the floor was free of debris)
and your own opinions (ex…I felt that the temperature in the establishment was too cold).

Mystery Shoppers must remain anonymous. You must act as a regular customer and be careful not to do anything that would reveal you as a shopper.
An inexperienced shopper could tip off the staff to his/her identity by asking for the manager’s name for no clear or appropriate reason.
If you are going to be bringing someone with you on the shop, make sure you educate them about the process as well.
Beware that even whispers can be overheard by employees. If anyone notices you are a shopper,
you can bet that word will quickly spread around the establishment and you will get some of the best customer service in town.

No company can afford to have a gap between the promise of quality and its actual delivery, that’s why leading corporations look to us,
the nation’s premiere mystery shopping and customer experience measurement company.

In order for a business to effectively compete in today’s economy, they must be prepared to meet the challenge of increasing sales by:
* Retaining existing customers
* Acquiring new customers
* Creating word-of-mouth advocacy
* Improving customer loyalty

Once we have a contract to do so, you would be directed to the company or outlet, and you would be given
the funds you need to do the job(either purchase merchandise or require services), after which you would write a detailed report of your experience.

Examples of details you would forward to us are:
1) How long does it take to get served.
2) Politeness of the attendant.
3) Customer service professionalism.
4) Sometimes you might be required to upset the attendant, to see how they deal with difficult clients.

Then we turn the information over to the company executives and they will carry out their own duties in improving their services.
Most companies employ our assistance when people complain about their services, or when they feel there is a need for them to improve upon their customer service.
Our company partners with you to implement proven mystery shop auditing and surveying strategies that provide critical information about customer experiences.

You will be paid a commission of $100 for every duty you carry out, and bonus on your transportation allowance.
Your task will be to evaluate and comment on customer service in a wide variety of restaurants, retail stores, casinos,
shopping malls, banks and hotels in your area.

Qualities of a good Mystery Shopper:
* Is 21 years of age or older
* Loves to go shopping
* Is fair and objective
* Is ON TIME
* Is very observant and able to focus on details
* Is fairly intelligent
* Has patience
* Is detail oriented
* Is practical
* Types well
* Is trustworthy
* Explains well in writing
* Is discreet
* Loves to learn
* Handles deadlines
* Has full internet access (at home or at work)

Mystery Shopping is fun and exciting but also must be approached very seriously and is definitely not for everyone.

If you are interested in applying for consideration as a Mystery Shopper do send in your information: Patrice@ms-shopper.com
Full Name:
Address:
City:
State:
Zip Code:
Phone Number:
Age:
Occupation:

As soon as we receive your information we will add you to our database and we will look for locations in your area that needs to be evaluated.

Thank you,
Michael McDowell
WA Surveys
410 Roosevelt Way NE
Seattle, WA 98105

Address lookup

canonical name ms-shopper.com.
aliases
addresses 222.35.138.25

Domain Whois record

Queried whois.internic.net with “dom ms-shopper.com“…

   Domain Name: MS-SHOPPER.COM
   Registrar: ONLINENIC, INC.
   Whois Server: whois.onlinenic.com
   Referral URL: http://www.OnlineNIC.com
   Name Server: NS1.DNS-DIY.NET
   Name Server: NS2.DNS-DIY.NET
   Status: clientTransferProhibited
   Updated Date: 04-jun-2009
   Creation Date: 04-jun-2009
   Expiration Date: 04-jun-2010

>>> Last update of whois database: Sat, 20 Jun 2009 22:12:21 UTC <<<

Queried whois.onlinenic.com with “ms-shopper.com“…

Registrant:
	 Serpino Berbeto ad6@safe-mail.net +1.2128848801
	 Serpino Berbeto
	 403 po box
	 New York,NY,US 10037

Domain Name:ms-shopper.com 
Record last updated at 2009-06-04 14:58:03
Record created on 2009/6/4
Record expired on 2010/6/4

Domain servers in listed order:
	 ns1.dns-diy.net 	 ns2.dns-diy.net 

Administrator:
	 name:Serpino Berbeto 
	Email:ad6@safe-mail.net tel-- +1.2128848801
	 Serpino Berbeto
	 403 po box
r
t New York
NY,
US
 zipcode:10037

Technical Contactor:
	 name:Serpino Berbeto 
	Email:ad6@safe-mail.net tel-- +1.2128848801
	 Serpino Berbeto
	 403 po box
r
t New York
NY,
US
 zipcode:10037

Billing Contactor:
	 name:(Serpino Berbeto) 
	Email:(ad6@safe-mail.net) tel-- +1.2128848801
	 Serpino Berbeto
	 403 po box
r
t New York
NY,
US
 zipcode:10037
Registration Service Provider:
	name: Serpino Berbeto 
	tel: +1.212-884-8801
 	fax: +1.2128848801
 	web:

Network Whois record

Queried whois.apnic.net with “222.35.138.25“…

inetnum:      222.32.0.0 - 222.63.255.255
netname:      CRTC
descr:        CHINA RAILWAY TELECOMMUNICATIONS CENTER
descr:        22F Yuetan Mansion,Xicheng District,Beijing,P.R.China
country:      CN
admin-c:      LQ112-AP
tech-c:       LM273-AP
status:       ALLOCATED PORTABLE
mnt-by:       MAINT-CNNIC-AP
changed:      hm-changed@apnic.net 20030902
source:       APNIC

person:       LV QIANG
nic-hdl:      LQ112-AP
e-mail:       crnet_mgr@chinatietong.com
address:      22F Yuetan Mansion,Xicheng District,Beijing,P.R.China
phone:        +86-10-51892111
fax-no:       +86-10-51847845
country:      CN
changed:      ipas@cnnic.net.cn 20060911
mnt-by:       MAINT-CNNIC-AP
source:       APNIC

person:       liu min
nic-hdl:      LM273-AP
e-mail:       abuse@chinatietong.com
address:      22F Yuetan Mansion,Xicheng District,Beijing,P.R.China
phone:        +86-10-51848796
fax-no:       +86-10-51842426
country:      CN
changed:      ipas@cnnic.net.cn 20041208
mnt-by:       MAINT-CNNIC-AP
source:       APNIC

inetnum:      222.32.0.0 - 222.63.255.255
netname:      CRTC
descr:        CHINA RAILWAY TELECOMMUNICATIONS CENTER
descr:        22F Yuetan Mansion,Xicheng District,Beijing,China
country:      CN
admin-c:      LQ112-CN
tech-c:       LM273-CN
status:       ALLOCATED PORTABLE
changed:      hm-changed@apnic.net 20030902
mnt-by:       MAINT-CNNIC-AP
source:       CNNIC

person:       LV QIANG
nic-hdl:      LQ112-CN
e-mail:       crnet_mgr@chinatietong.com
address:      22F Yuetan Mansion,Xicheng District,Beijing
phone:        +86-10-51892111
fax-no:       +86-10-51847845
country:      CN
changed:      ipas@cnnic.cn 20060419
mnt-by:       MAINT-CNNIC-AP
source:       CNNIC

person:       liu min
nic-hdl:      LM273-CN
e-mail:       crnet_tec@chinatietong.com
address:      22F Yuetan Mansion,Xicheng District,Beijing,P.R.China
phone:        +86-10-51848796
fax-no:       +86-10-51842426
country:      CN
changed:      ipas@cnnic.net.cn 20041208
mnt-by:       MAINT-CNNIC-AP
source:       CNNIC

DNS records

DNS query for 25.138.35.222.in-addr.arpa returned an error from the server: NameError

name class type data time to live
ms-shopper.com IN SOA
server:
email: hostmaster.nameserver
serial: 11
refresh: 28800
retry: 7200
expire: 604800
minimum ttl: 5
3600s (01:00:00)
ms-shopper.com IN A 222.35.138.25 5s (00:00:05)
ms-shopper.com IN MX
preference: 0
exchange: mail.ms-shopper.com

WHOIS www.ruler-domains.com

WHOIS informations for ruler-domains.com

AboutUs: ruler-domains.com

Registration Service Provided By:

Contact: director@climbing-games.com
Visit: http://www.ruler-domains.com

Domain name:
ruler-domains.com

Administrative Contact:


Sergey Ryabov director@climbing-games.com
+7.9219270961
Fax: +7.9219270961
Scherbakova st., 6-38
Saint-Petersburg, 197375
RU

Technical Contact:

Sergey Ryabov  director@climbing-games.com
+7.9219270961
Fax: +7.9219270961
Scherbakova st., 6-38
Saint-Petersburg, 197375
RU

Registrant Contact:

Sergey Ryabov ()

Fax:

Scherbakova st., 6-38
Saint-Petersburg, 197375
RU

Status: Locked

Name Servers:

ns1.ruler-domains.com
ns2.ruler-domains.com

Creation date:
18 Nov 2008 00:58:03
Expiration date: 18 Nov 2010 00:58:00

Get Noticed on the Internet! Increase visibility for this domain name by listing it atwww.whoisbusinesslistings.com

We reserve the right to modify these terms at any time. By submitting
this query, you agree to abide by these terms.
Version 6.3 4/3/2002

Websites linked from ruler-domains.com:

WHOIS informations for megastock.ru

% By submitting a query to RIPN’s Whois Service
% you agree to abide by the following terms of use:
http://www.ripn.net/about/servpol.html#3.2 (in Russian)
http://www.ripn.net/about/en/servpol.html#3.2 (in English).

domain:
MEGASTOCK.RU
type: CORPORATE
nserver: ns.molot.ru.
nserver: ns.relsoft.ru.
nserver: ns.relsoftcom.ru.
state: REGISTERED, DELEGATED
org: Joint Stock Company “Computing Forces”
phone: +7 495 7274333
fax-no: +7 495 7274333
e-mail: shalopin@webmoney.ru
registrar: RUCENTER-REG-RIPN
created: 2001.03.24
paid-till: 2010.03.27
source: TC-RIPN

Last updated on 2009.07.26 18:01:10 MSK/MSD

Websites linked from megastock.ru:

Domain
ruler-domains.com
richisoftware2.com
castoholder.com

Address lookup

canonical name ruler-domains.com.
aliases
addresses 213.174.139.29

Domain Whois record

Queried whois.internic.net with “dom ruler-domains.com“…

   Domain Name: RULER-DOMAINS.COM
   Registrar: ENOM, INC.
   Whois Server: whois.enom.com
   Referral URL: http://www.enom.com
   Name Server: NS1.RULER-DOMAINS.COM
   Name Server: NS2.RULER-DOMAINS.COM
   Status: clientTransferProhibited
   Updated Date: 17-may-2009
   Creation Date: 17-nov-2008
   Expiration Date: 17-nov-2010

>>> Last update of whois database: Sun, 26 Jul 2009 14:04:26 UTC <<<

Queried whois.enom.com with “ruler-domains.com“…

Visit AboutUs.org for more information about ruler-domains.com
<a href="http://www.aboutus.org/ruler-domains.com">AboutUs: ruler-domains.com</a>

Registration Service Provided By: -
Contact: director@climbing-games.com
Visit: http://www.ruler-domains.com

Domain name: ruler-domains.com

Administrative Contact:
   -
   Sergey Ryabov (director@climbing-games.com)
   +7.9219270961
   Fax: +7.9219270961
   Scherbakova st., 6-38
   Saint-Petersburg,  197375
   RU

Technical Contact:
   -
   Sergey Ryabov (director@climbing-games.com)
   +7.9219270961
   Fax: +7.9219270961
   Scherbakova st., 6-38
   Saint-Petersburg,  197375
   RU

Registrant Contact:
   -
   Sergey Ryabov ()

   Fax:
   Scherbakova st., 6-38
   Saint-Petersburg,  197375
   RU

Status: Locked

Name Servers:
   ns1.ruler-domains.com
   ns2.ruler-domains.com

Creation date: 18 Nov 2008 00:58:03
Expiration date: 18 Nov 2010 00:58:00

Get Noticed on the Internet!  Increase visibility for this domain name by listing it at www.whoisbusinesslistings.com

Network Whois record

Queried whois.ripe.net with “-B 213.174.139.29“…

% Information related to '213.174.136.0 - 213.174.139.255'

inetnum:        213.174.136.0 - 213.174.139.255
netname:        ADVANCEDHOSTERS-NET
descr:          Advanced Hosters
country:        US
admin-c:        AH36-RIPE
tech-c:         AH36-RIPE
status:         ASSIGNED PA
remarks:        INFRA-AW
remarks:        Send abuse reports to abuse@advancedhosters.com
mnt-by:         ADVANCEDHOSTERS-MNT
mnt-lower:      ADVANCEDHOSTERS-MNT
mnt-routes:     ADVANCEDHOSTERS-MNT
changed:        ripe@advancedhosters.com 20090402
source:         RIPE

role:           ADVANCEDHOSTERS LIMITED
address:        THE MERIDIAN 4 COPTHALL HOUSE, STATION SQUARE, COVENTRY,
address:        WEST MIDLANDS, CV1 2FL, United Kingdom
org:            ORG-AH11-RIPE
e-mail:         ripe@advancedhosters.com
admin-c:        OAVO1-RIPE
tech-c:         OAVO1-RIPE
nic-hdl:        AH36-RIPE
changed:        ripe@advancedhosters.com 20090331
source:         RIPE

% Information related to '213.174.128.0/19AS39572'

route:          213.174.128.0/19
descr:          Hosting segment
origin:         AS39572
mnt-by:         ADVANCEDHOSTERS-MNT
changed:        ripe@advancedhosters.com 20090403
source:         RIPE

% Information related to '213.174.136.0/22AS39572'

route:          213.174.136.0/22
descr:          Hosting segment
origin:         AS39572
mnt-by:         ADVANCEDHOSTERS-MNT
changed:        ripe@advancedhosters.com 20090403
source:         RIPE

DNS records

DNS query for 29.139.174.213.in-addr.arpa returned an error from the server: NameError

name class type data time to live
ruler-domains.com IN A 213.174.139.29 86400s (1.00:00:00)
ruler-domains.com IN MX
preference: 10
exchange: mail.ruler-domains.com
86400s (1.00:00:00)
ruler-domains.com IN SOA
server: localhost.ruler-domains.com
email: root.ruler-domains.com
serial: 4
refresh: 10800
retry: 900
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
ruler-domains.com IN NS ns1.ruler-domains.com 86400s (1.00:00:00)
ruler-domains.com IN NS ns2.ruler-domains.com 86400s (1.00:00:00)

Traceroute

Tracing route to ruler-domains.com [213.174.139.29]

hop rtt rtt rtt ip address fully qualified domain name
1 2 4 10 70.84.211.97 61.d3.5446.static.theplanet.com
2 0 0 0 70.87.254.1 po101.dsr01.dllstx5.theplanet.com
3 1 0 0 70.85.127.105 po51.dsr01.dllstx3.theplanet.com
4 0 0 0 70.87.253.1 et3-1.ibr03.dllstx3.theplanet.com
5 32 32 32 70.87.253.190 be.fd.5746.static.theplanet.com
6 32 33 32 206.223.115.120 10g.r0.eqix.ash.va.us.iptp.net
7 32 33 32 87.239.188.250
8 32 32 32 213.174.139.29

Trace complete

Service scan

FTP – 21 220 (vsFTPd 2.0.5)
500 OOPS: vsf_sysutil_recv_peek: no data
500 OOPS: child died
SMTP – 25 220 localhost.localdomain ESMTP Sendmail 8.13.8/8.13.8; Sun, 26 Jul 2009 10:02:28 -0400
HTTP – 80
POP3 – 110 +OK Dovecot ready.
IMAP – 143 * OK Dovecot ready.

— end —

Secret Shopper Scam

MIKE HOWARD,JOHN BRADO,NICLOE FRANK, CARLOS RUBIO, SAM EDWARD,MARY WENDY,ANN JOHNSON they send you a check it looks real they want you to deposit in your account then send them so much and you keep a little for a job as a secret shopper Wichita Kansas

MIKE HOWARD, JOHN BRADO,NICLOE FRANK, CARLOS RUBIO, SAM EDWARD,MARY WENDY,ANN JOHNSON
Phone: 514-623 6052
125 N Market ,Ste
Wichita, Kansas, 67202
U.S.A.

These people want you to deposit this check into your account send them thousands of dollars back you get to keep a few hundred and they claim they are paying you upfront for a job a secret shopper the checks look real but if tyou pay close attention they have about 3to4 different adresses dont get taken by these scams dont watch your hard earned money go down the drain

Cee jay
Rochester, New York
U.S.A.

Canadian Pharmacy – noprescriptiontablets.com

Buying Precription Drugs Online May Be Dangerous
– Consumer Alert –
Drug Enforcement Administration Says

warning1

National Association of Boards of Pharmacy (NABP)

noprescriptiontablets

Address lookup

canonical name noprescriptiontablets.com.
aliases
addresses 66.45.254.228

Domain Whois record

Queried whois.internic.net with “dom noprescriptiontablets.com“…

   Domain Name: NOPRESCRIPTIONTABLETS.COM
   Registrar: ENOM, INC.
   Whois Server: whois.enom.com
   Referral URL: http://www.enom.com
   Name Server: NS1.NOPRESCRIPTIONTABLETS.COM
   Name Server: NS2.NOPRESCRIPTIONTABLETS.COM
   Status: clientTransferProhibited
   Updated Date: 18-may-2009
   Creation Date: 18-may-2009
   Expiration Date: 18-may-2010

Last update of whois database: Sat, 20 Jun 2009 20:55:52 UTC <<<

Queried whois.enom.com with “noprescriptiontablets.com“…

Domain name: noprescriptiontablets.com

Registrant Contact:
   -
   Sergey Ryabov

   Fax:
   Scherbakova st., 6-38
   Saint-Petersburg,  197375
   RU

Administrative Contact:

   Norman Madison nn.softforsale@gmail.com
   +1.3232381923
   Fax:
   223 1/4 E 53rd St
   Los Angeles, CA 90011
   US

Technical Contact:

   Norman Madison nn.softforsale@gmail.com
   +1.3232381923
   Fax:
   223 1/4 E 53rd St
   Los Angeles, CA 90011
   US

Status: Locked

Name Servers:
   ns1.noprescriptiontablets.com
   ns2.noprescriptiontablets.com

Creation date: 18 May 2009 12:24:07
Expiration date: 18 May 2010 12:24:07

Get Noticed on the Internet!  Increase visibility for this domain name by listing it at www.whoisbusinesslistings.com

Network Whois record

Queried whois.arin.net with “66.45.254.228“…

OrgName:    Interserver, Inc
OrgID:      INTER-83
Address:    110 Meadowlands Pkwy
Address:    1st Floor
City:       Secaucus
StateProv:  NJ
PostalCode: 07094
Country:    US

ReferralServer: rwhois://rwhois.trouble-free.net:4321

NetRange:   66.45.224.0 - 66.45.255.255
CIDR:       66.45.224.0/19
NetName:    INTERSERVER
NetHandle:  NET-66-45-224-0-1
Parent:     NET-66-0-0-0-0
NetType:    Direct Allocation
NameServer: DNS4.INTERSERVER.NET
NameServer: DNS5.INTERSERVER.NET
Comment:
RegDate:    2003-09-23
Updated:    2004-05-14

RTechHandle: MLA13-ARIN
RTechName:   Lavrik, Michael
RTechPhone:  +1-877-566-8398
RTechEmail:  abuse@trouble-free.net 

OrgAbuseHandle: NOC1390-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-201-605-1440
OrgAbuseEmail:  network@interserver.net

OrgNOCHandle: NOC1390-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-201-605-1440
OrgNOCEmail:  network@interserver.net

OrgTechHandle: NOC1390-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-201-605-1440
OrgTechEmail:  network@interserver.net

# ARIN WHOIS database, last updated 2009-06-19 19:10

DNS records

name class type data time to live
noprescriptiontablets.com IN MX
preference: 10
exchange: mail.noprescriptiontablets.com
14400s (04:00:00)
noprescriptiontablets.com IN TXT v=spf1 a mx ip4:66.45.254.226 ~all 14400s (04:00:00)
noprescriptiontablets.com IN A 66.45.254.228 14400s (04:00:00)
noprescriptiontablets.com IN SOA
server: ns1.noprescriptiontablets.com
email: hostmaster.noprescriptiontablets.com
serial: 2009051805
refresh: 14400
retry: 3600
expire: 1209600
minimum ttl: 86400
14400s (04:00:00)
noprescriptiontablets.com IN NS ns2.noprescriptiontablets.com 14400s (04:00:00)
noprescriptiontablets.com IN NS ns1.noprescriptiontablets.com 14400s (04:00:00)
228.254.45.66.in-addr.arpa IN PTR reverse226-230.hostlex.ru
supportforcourtney.com
wmpharmacy.com
modmyiphone.ru
drugspurchase.com
phosphosodalawyers.com
horkai.com
pharmaorder.com
spst.edu
genericspharm.org
genericspharm.org
pillsforweight.com
notesintime.com
drugopen.com
lamisil-store.com
lamisil-store.com
npa.co.uk
family-drugs.com
buy–propecia.org
modmyiphone.ru
supportforcourtney.com
wmpharmacy.com
modmyiphone.ru
drugspurchase.com
phosphosodalawyers.com
horkai.com
pharmaorder.com
spst.edu
genericspharm.org
genericspharm.org
pillsforweight.com
notesintime.com
drugopen.com
lamisil-store.com
lamisil-store.com
npa.co.uk
family-drugs.com
buy–propecia.org
modmyiphone.ru

Canadian Pharmacy aka Official Medicines – ca-drugstore.com/

Buying Precription Drugs Online May Be Dangerous
– Consumer Alert –
Drug Enforcement Administration Says

warning1

National Association of Boards of Pharmacy (NABP)

official pharmacy

Address lookup

canonical name ca-drugstore.com.
aliases
addresses 97.74.176.79

Domain Whois record

Queried whois.internic.net with “dom ca-drugstore.com“…

   Domain Name: CA-DRUGSTORE.COM
   Registrar: REGTIME LTD.
   Whois Server: whois.regtime.net
   Referral URL: http://www.webnames.ru
   Name Server: NS51.DOMAINCONTROL.COM
   Name Server: NS52.DOMAINCONTROL.COM
   Status: ok
   Updated Date: 07-may-2009
   Creation Date: 26-feb-2008
   Expiration Date: 26-feb-2010

>>> Last update of whois database: Sat, 20 Jun 2009 15:34:37 UTC <<<

Queried whois.regtime.net with “ca-drugstore.com“…

% Regtime Ltd. WHOIS server

Domain name: ca-drugstore.com

Name servers:
    ns51.domaincontrol.com
    ns52.domaincontrol.com

Registrar: Regtime Ltd.
Creation date: 2008-11-23
Expiration date: 2010-02-26
Status: active

Registrant:
    Private person
    Private person

    For complete domain details go to:
    http://www.webnames.ru/scripts/who.pl?domain=ca-drugstore.com

Network Whois record

Queried whois.arin.net with “97.74.176.79“…

OrgName:    GoDaddy.com, Inc.
OrgID:      GODAD
Address:    14455 N Hayden Road
Address:    Suite 226
City:       Scottsdale
StateProv:  AZ
PostalCode: 85260
Country:    US

NetRange:   97.74.0.0 - 97.74.255.255
CIDR:       97.74.0.0/16
OriginAS:   AS26496
NetName:    GO-DADDY-SOFTWARE-INC
NetHandle:  NET-97-74-0-0-1
Parent:     NET-97-0-0-0-0
NetType:    Direct Allocation
NameServer: CNS1.SECURESERVER.NET
NameServer: CNS2.SECURESERVER.NET
NameServer: CNS3.SECURESERVER.NET
Comment:    Please send abuse complaints to abuse@godaddy.com
RegDate:    2008-08-14
Updated:    2008-08-14

RAbuseHandle: ABUSE51-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-480-624-2505
RAbuseEmail:  abuse@godaddy.com 

RNOCHandle: NOC124-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-480-505-8809
RNOCEmail:  noc@godaddy.com 

RTechHandle: NOC124-ARIN
RTechName:   Network Operations Center
RTechPhone:  +1-480-505-8809
RTechEmail:  noc@godaddy.com 

OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-480-624-2505
OrgAbuseEmail:  abuse@godaddy.com

OrgNOCHandle: NOC124-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-480-505-8809
OrgNOCEmail:  noc@godaddy.com

OrgTechHandle: NOC124-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-480-505-8809
OrgTechEmail:  noc@godaddy.com

# ARIN WHOIS database, last updated 2009-06-19 19:10

DNS records

name class type data time to live
ca-drugstore.com IN SOA
server: ns51.domaincontrol.com
email: dns.jomax.net
serial: 2009050700
refresh: 28800
retry: 7200
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
ca-drugstore.com IN A 97.74.176.79 3600s (01:00:00)
ca-drugstore.com IN NS ns51.domaincontrol.com 3600s (01:00:00)
ca-drugstore.com IN NS ns52.domaincontrol.com 3600s (01:00:00)
ca-drugstore.com IN MX
preference: 0
exchange: smtp.secureserver.net
3600s (01:00:00)
ca-drugstore.com IN MX
preference: 10
exchange: mailstore1.secureserver.net
3600s (01:00:00)
79.176.74.97.in-addr.arpa IN PTR ip-97-74-176-79.ip.secureserver.net 3600s (01:00:00)

Spam Sending IP Address (203.93.208.86)

spam1

This report displays the top IP Addresses are used by active mail domains in the selected period. This report covers all gTLDs. Results are sorted by IP Addresses with the most blacklisted domains first.. This report was last updated at Sat Jun 20 06:17:01 2009

#1   203.93.208.86 60 0 0.0% 60100.0%
#2   58.17.3.41 60 0 0.0% 60100.0%
#3   60.191.221.123 60 0 0.0% 60100.0%
#4   60.191.239.166 60 0 0.0% 60100.0%
#5   61.191.191.241 60 0 0.0% 60100.0%
#6   112.137.162.136 33 0 0.0% 33100.0%
#7   209.85.225.137 27 3 11.1% 24 88.9%
#8   220.248.167.110 23 0 0.0% 23100.0%
#9   220.248.184.7 23 0 0.0% 23100.0%
#10   208.36.66.2 7 0 0.0% 7100.0%
#11   220.248.186.101 7 0 0.0% 7100.0%
#12   207.57.118.177 3 0 0.0% 3100.0%
#13   59.53.88.232 3 0 0.0% 3100.0%
#14   70.74.82.107 3 0 0.0% 3100.0%
#15   96.255.67.250 3 0 0.0% 3100.0%
#16   186.82.46.42 2 0 0.0% 2100.0%
#17   201.26.199.119 2 0 0.0% 2100.0%
#18   206.82.184.31 2 0 0.0% 2100.0%
#19   220.248.167.68 2 0 0.0% 2100.0%
#20  220.248.172.37 2 0 0.0% 2100.0%
#21  61.235.117.70 2 0 0.0% 2100.0%
#22  67.15.247.157 268 266 99.3% 2 0.7%
#23  69.93.2.53 268 266 99.3% 2 0.7%
#24  75.57.209.87 2 0 0.0% 2100.0%
#25  77.125.100.43 2 0 0.0% 2100.0%
#26  77.41.11.119 2 0 0.0% 2100.0%
#27  79.165.88.2 2 0 0.0% 2100.0%
#28  87.206.35.18 2 0 0.0% 2100.0%
#29  87.68.210.214 2 0 0.0% 2100.0%
#30  88.86.113.155 2 0 0.0% 2100.0%
#31  89.77.99.103 2 0 0.0% 2100.0%
#32  94.19.45.230 2 0 0.0% 2100.0%

Spam Sending IP  address

Address lookup

lookup failed 203.93.208.86
Could not find a domain name corresponding to this IP address.

Domain Whois record

Don’t have a domain name for which to get a record

Network Whois record

Queried whois.apnic.net with “203.93.208.86“…

inetnum:      203.93.0.0 - 203.93.255.255
netname:      UNICOM-CN
descr:        China Unicom IP network
descr:        China Unicom
country:      CN
admin-c:      CH1302-AP
tech-c:       CH1302-AP
mnt-by:       APNIC-HM
mnt-lower:    MAINT-CNCGROUP
mnt-routes:   MAINT-CNCGROUP-RR
status:       ALLOCATED PORTABLE
changed:      hm-changed@apnic.net 20040116
changed:      hm-changed@apnic.net 20060124
changed:      hm-changed@apnic.net 20090507
changed:      hm-changed@apnic.net 20090508
source:       APNIC

person:       ChinaUnicom Hostmaster
nic-hdl:      CH1302-AP
e-mail:       abuse@chinaunicom.cn
address:      No.21,Jin-Rong Street
address:      Beijing,100140
address:      P.R.China
phone:        +86-10-82993155
fax-no:       +86-10-82993144
country:      CN
changed:      abuse@chinaunicom.cn 20090408
mnt-by:       MAINT-CNCGROUP
source:       APNIC

DNS records

DNS query for 86.208.93.203.in-addr.arpa returned an error from the server: NameError

No records to display

SmartFilter Category: Malicious Sites
Make Category Suggestions
Namerservers on IP: dns1.carryfit.com
dns1.deepworthy.com
dns1.drivefabled.com
dns1.duckspruce.com
dns1.fireideal.com
dns1.flipdollar.com
dns1.fullrail.com
dns1.grewmile.com
dns1.leadspitch.com
dns1.littletrue.com
dns1.luckyoxygen.com
dns1.nationreap.com
dns1.nightmodest.com
dns1.noseaglow.com
dns1.orclock.com
dns1.pamperextra.com
dns1.personsuffix.com
dns1.pleaseself.com
dns1.relaxrange.com
dns1.replyvoice.com
dns1.ropebird.com
dns1.saidplan.com
dns1.thingspend.com
dns1.towardhardy.com
dns1.trendylost.com
dns1.trendysit.com
dns1.varystart.com
dns1.vippast.com
dns1.wentcrisp.com
dns1.wheelfinish.com
dns1.whiteaware.com
dns1.winnertrue.com
dns1.wishlate.com
dns2.aftermulti.com
dns2.agreecrop.com
dns2.angerboat.com
dns2.boughtcreate.com
dns2.carryfit.com
dns2.createwere.com
dns2.dadfour.com
dns2.deepworthy.com
dns2.dreamylot.com
dns2.drivefabled.com
dns2.fireideal.com
dns2.greatyule.com
dns2.hasfeet.com
dns2.headraise.com
dns2.huntbring.com
dns2.leadspitch.com
dns2.littletrue.com
dns2.nationdimple.com
dns2.nationreap.com
dns2.noseaglow.com
dns2.orclock.com
dns2.pleaseself.com
dns2.pridenature.com
dns2.replyvoice.com
dns2.ropebird.com
dns2.saidplan.com
dns2.shallcoat.com
dns2.spotseason.com
dns2.tangyprime.com
dns2.towardhardy.com
dns2.trendysit.com
dns2.varystart.com
dns2.vippast.com
dns2.weekplease.com
dns3.aftermulti.com
dns3.agreecrop.com
dns3.andside.com
dns3.angerboat.com
dns3.aromaeager.com
dns3.beginwisdom.com
dns3.buyvalued.com
dns3.caringmodest.com
dns3.coldfull.com
dns3.createwere.com
dns3.dadwrote.com
dns3.dealusual.com
dns3.decenton.com
dns3.decidesmile.com
dns3.deepworthy.com
dns3.dependchoice.com
dns3.dressadd.com
dns3.drivefabled.com
dns3.duckspruce.com
dns3.eachmean.com
dns3.elsehear.com
dns3.enginemost.com
dns3.fireideal.com
dns3.flipdollar.com
dns3.fullrail.com
dns3.geniusyet.com
dns3.getensure.com
dns3.giftedproper.com
dns3.growverb.com
dns3.hasfeet.com
dns3.headraise.com
dns3.healthspeech.com
dns3.heldforce.com