-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathblocklists-tag.txt
107 lines (92 loc) · 4.12 KB
/
blocklists-tag.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
## hosts-blocklists
## domains-ips-hashes
## blocklists-tag
## https://blog.google/threat-analysis-group/
## https://github.com/google/threat-team
# https://blog.google/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/
# https://github.com/google/threat-team/tree/main/2024/2024-02-14-tool-of-first-resort-israel-hamas-war-cyber
bitly.org.il
businessservicesinc.net
cyberflood.io
daemon-mailer.co
fbmro.com
gamerocker.net
glorynewstoday.com
ifstate.page.link
isra-help.org
jennifercanti.com
kathleenhumphreystore.com
latest-tools.store
mailer-daemon.co
mailerdaemon.online
morecoreservises.com
myprofileface.page.link
ncgrassfed.com
pasmoiapp.com
ppmataro.com
redalerts.me
redalertt.github.io
shebacenter.online
shebacenter.org
solofansapp.page.link
stromectolonline.com
45.140.146.107
85.114.102.58
107.172.79.5
168.235.108.172
194.195.86.249
198.252.108.237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# https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/
# https://github.com/google/threat-team/tree/main/2024/2024-01-18-google-tag-coldriver-russian-phishing-malware
45.133.216.15
0f6b9d2ada67cebc8c0f03786c442c61c05cef5b92641ec4c1bdd8f5baeb2ee1
37c52481711631a5c73a6341bd8bea302ad57f02199db7624b580058547fb5a9
84523ddad722e205e2d52eedfb682026928b63f919a7bf1ce6f1ad4180d0f507
A949ec428116489f5e77cefc67fea475017e0f50d2289e17c3eb053072adcf24
Ac270310b5410e7430fe7e36a079525cd8724b002b38e13a6ee6e09b326f4847
C97acea1a6ef59d58a498f1e1f0e0648d6979c4325de3ee726038df1fc2e831d
# https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/
applicationdevsoc.com
ntcpk.org
obsorth.opwtjnpoc.ml
# https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/
fex.net
webhook.site
216.66.35.145
072afea7cae714b44c24c16308da0ef0e5aab36b7a601b310d12f8b925f359e7
77cf5efde721c1ff598eeae5cb3d81015d45a74d9ed885ba48330f37673bc799
91dec1160f3185cec4cb70fee0037ce3a62497e830330e9ddc2898f45682f63a