# Copyright (c) 2014-2020 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://twitter.com/david_jursa/status/1181925512798773249
# Reference: https://app.any.run/tasks/14d9b5a2-d8d3-41f4-9557-f21aec01fa32/

bobresources.club
kzpqui.xyz
tyasmi.xyz
wuqjzc.xyz

# Reference: https://twitter.com/EKFiddle/status/1172560479786389509

jsxeaq.xyz
jeitacave.org
kyujep.xyz
linksprut.xyz

# Reference: https://twitter.com/tkanalyst/status/1184825216033099777

bcardp.xyz
kxzebd.xyz
pfucmj.xyz
richmond-news.xyz

# Reference: https://twitter.com/david_jursa/status/1188023097380741120

kywrmfmp.xyz

# Reference: https://twitter.com/tkanalyst/status/1188778602306818048

clubwaka.xyz
tehwsmgnbsry.xyz
xdzxxf.xyz

# Reference: https://twitter.com/tkanalyst/status/1193873177765535750

8weoaapw0hfvy6nz.pro

# Reference: https://otx.alienvault.io/pulse/5d76621dedbdaf0f1265778e
# Reference: https://pastebin.com/c8YEXjqW
# Reference: https://www.virustotal.com/gui/ip-address/99.181.14.217/relations

jeitacave.org
zopso.org
nw.brownsine.com
pak.goifzy.com
nxfiqz.dynu.net

# Reference: https://www.proofpoint.com/us/blog/threat-insight/purple-fox-ek-adds-exploits-cve-2020-0674-and-cve-2019-1458-its-arsenal
# Reference: https://otx.alienvault.com/pulse/5f04b169061c731357704dd4

casestudybuddy.club

# Reference: https://twitter.com/FaLconIntel/status/1278870699663224832
# Reference: https://app.any.run/tasks/1a5fa931-5bbd-4ea0-8af6-a2686dba7c1d/

hartley-botanic.xyz

# Reference: https://twitter.com/nao_sec/status/1286884185055981568
# Reference: https://app.any.run/tasks/0b68b869-04fe-428f-bdbb-9b87a441c967/

fixdevice.site
shibuya109.xyz
vkfaces.site
