Domain- und Website-Informationen:
zeus3.de
Domänenname - zeus3.de
Seitentitel - Ingenieurbüro Bethge
Gehen Sie zur Webseite - Ingenieurbüro Bethge
GEO-Standort der Website
Standort Land - Germany
Anbieter - IONOS SE
Site Logo
IP Adresse:
Domain-Name-Server:
ns1094.ui-dns.org ns1094.ui-dns.biz ns1094.ui-dns.de ns1094.ui-dns.com
Alle Aufzeichnungen:
☆ zeus3.de. 3597 IN A 217.160.0.163
☆ zeus3.de. 3597 IN MX 10 mx01.ionos.de.
☆ zeus3.de. 3597 IN MX 10 mx00.ionos.de.
☆ zeus3.de. 21597 IN NS ns1094.ui-dns.biz.
☆ zeus3.de. 21597 IN NS ns1094.ui-dns.org.
☆ zeus3.de. 21597 IN NS ns1094.ui-dns.com.
☆ zeus3.de. 21597 IN NS ns1094.ui-dns.de.
☆ zeus3.de. 3597 IN TXT "v=spf1 include:_spf-eu.ionos.com ~all"
☆ zeus3.de. 21597 IN SOA ns1094.ui-dns.de. hostmaster.schlund.de. 2017022403 28800 7200 604800 300
%
% Terms and Conditions of Use
%
% The above data may only be used within the scope of technical or
% administrative necessities of Internet operation or to remedy legal
% problems.
% The use for other purposes, in particular for advertising, is not permitted.
%
% The DENIC whois service on port 43 doesn't disclose any information concerning
% the domain holder, general request and abuse contact.
% This information can be obtained through use of our web-based whois service
% available at the DENIC website:
% http://www.denic.de/en/domains/whois-service/web-whois.html
%
%
Domain: zeus3.de
Nserver: ns1094.ui-dns.biz
Nserver: ns1094.ui-dns.com
Nserver: ns1094.ui-dns.de
Nserver: ns1094.ui-dns.org
Status: connect
Changed: 2018-09-09T05:59:06+02:00
Brief facts about zeus3:
GameOver ZeuS, also known as peer-to-peer ZeuS, ZeuS3, and GoZeus, is a Trojan horse developed by Russian cybercriminal Evgeniy Bogachev. Created in 2011 as a successor to Jabber Zeus, another project of Bogachev's, the malware is notorious for its usage in bank fraud resulting in damages of approximately $100 million and being the main vehicle through which the CryptoLocker ransomware attack was conducted, resulting in millions of dollars of losses. At the peak of its activity in 2012 and 2013, between 500,000 and 1 million computers were infected with GameOver ZeuS. The original GameOver ZeuS was propagated through spam emails containing links to websites that would download the malware onto the victim's computer. The infected computer was then integrated into a botnet, considered to be one of the most sophisticated and secure botnets in the world at the time.
Timeline of computer viruses and worms - This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Avalanche , used botnets and email spam.
Berserk Bear , advanced persistent threat known to employ cybercriminals.
REvil , employed ransomware.
Conficker , an extremely prolific botnet at its peak.
Sality , another peer-to-peer botnet.
© DMS 2011-