# Copyright (c) 2014-2022 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://twitter.com/abuse_ch/status/1141702499889553409

47.96.84.138:80
47.96.84.138:14578
47.96.84.138:17450
159.138.42.77:65535

# Reference: https://twitter.com/James_inthe_box/status/1153385401278771201

5.253.86.183:80

# Reference: https://github.com/advanced-threat-research/IOCs/blob/master/2017/2017-06-16-mcafee-discovers-pinkslipbot-exploiting-infected-machines-as-control-servers-releases-free-tool-to-detect-disable-trojan/mcafee-discovers-pinkslipbot-exploiting-infected-machines-as-control-servers-releases-free-tool-to-detect-disable-trojan.csv

/gwsup

# Reference: https://blog.avast.com/fakecrack-campaign
# Reference: https://otx.alienvault.com/pulse/62a084ef849cd814d827fb91

104.155.207.188:8183

# Reference: https://twitter.com/James_inthe_box/status/1575214817559793664

34.80.59.191:8183
