DESCRIPTION LAST UPDATED: 2023-12-06
DEFAULT SEVERITY LEVEL: CRITICAL
This report contains events (connections) to HTTP Sinkholes. Sinkholing is a technique whereby a resource used by malicious actors to control malware is taken over and redirected to a benign listener that can (to a varying degree) understand connections coming from infected devices.
This report identifies the IP addresses from all the devices that joined a sinkhole server that did not arrive through an HTTP referrer.
Since a sinkhole server is only accessed through previously malicious domain names, only infected systems or security researchers should be seen in this list. However, the sinkholes may also pick up web crawlers requesting malicious domains.
This report can come in 2 versions, one for IPv4 only connections, the other for IPv6 only connections.
You can learn more on the report in our Sinkhole HTTP Events Report tutorial.
You can learn more on our reports in general in our Overview of Free Public Benefit Shadowserver Reports presentation, which also explains example Use Cases.
Severity levels are described here.
File names: event4_sinkhole_http and event6_sinkhole_http.
As of 30th March 2021, the following infections are being observed across all the sinkholes (this includes non-HTTP sinkholes) and shared out:
android_spams |
android.bakdoor.prizmes |
android.bankbot |
android.banker.anubis |
android.bankspy |
android.darksilent |
android.digitime.fota |
android.fakeav |
android.fakebank |
android.fakedoc |
android.fakemart |
android.fobus |
android.fungram |
android.gopl |
android.hqwar |
android.hummer |
android.iop |
android.milipnot |
android.nitmo |
android.opfake |
android.premiumtext |
android.provar |
android.rootnik |
android.rotexy |
android.skyfin |
android.smsbot |
android.smssilence |
android.smsspy |
android.smsspy.be24 |
android.sssaaa |
android.teleplus |
android.uupay |
android.voxv |
andromeda |
andromeda-b66 |
avalanche-andromeda |
avalanche-bolek |
avalanche-citadel |
avalanche-corebot |
avalanche-dofoil |
avalanche-generic |
avalanche-gozi2 |
avalanche-goznym |
avalanche-kins |
avalanche-marcher |
avalanche-matsnu |
avalanche-nymaim |
avalanche-pandabanker |
avalanche-ranbyus |
avalanche-rovnix |
avalanche-smartapp |
avalanche-teslacrypt |
avalanche-tinba |
avalanche-trusteer |
avalanche-unknown |
avalanche-urlzone |
avalanche-vawtrak |
avalanche-xswkit |
b54-base |
b54-code |
b54-config |
b54-old |
b68-zeroaccess-1-32bit |
b68-zeroaccess-1-64bit |
b68-zeroaccess-2-32bit |
b68-zeroaccess-2-64bit |
banatrix |
bankpatch |
bebloh |
bedep |
beebone |
betabot |
bitcoinminer |
blackbeard |
blakamba |
boaxxe |
bolek |
buhtrap |
calypso |
caphaw |
carberp |
chinad |
citadel |
cobaltstrike |
coinminer |
comment |
conficker |
corebot |
cryptowall |
cve-2009-4324 |
cycbot |
diaminer |
dipverdle |
dircrypt |
disorderstatus |
dltminer |
dmsniff |
dofoil |
domreg |
dorkbot |
dorkbot-ssl |
downadup |
dresscode |
dybalom |
emissary-panda |
emotet |
emotet-c2 |
enfal-apt |
esfury |
expiro |
exploitkit.fallout |
extenbro |
fake_cs_updater |
familyphotos-apt |
flubot |
fobber |
foxbantrix |
foxbantrix-unknown |
generic |
generic.malware |
geodo |
ghost-push |
goldmax |
gootkit |
gozi |
gozi2 |
goznym |
gspy |
gtfobot |
hancitor |
harnig |
ibanking |
icedid |
iframe exploit |
infected |
infy-apt |
iotreaper |
ircbot-b58 |
isfb |
jadtre |
jdk-update-apt |
js.worm.bondat |
junk-domains |
kasidet |
kbot |
kelihos |
kelihos.e |
keylogger |
keylogger-ftp |
keylogger-vbklip |
kidminer |
kingminer |
kins |
koobface |
kovter |
kronos |
kwampirs |
lethic |
linux.backdoor.setag |
linux.ngioweb |
litemanager |
loader |
lurkbanker |
machbot |
machete-apt |
magecart |
maliciouswebsites |
malwaretom |
marcher |
matrix |
matsnu |
menupass |
mewsspy |
minr |
mirai |
mix2 |
mkero |
monero |
mozi |
muddywater |
murofet |
mysafeproxymonitor |
nametrick |
necurs |
netsupport |
nettraveler |
neurevt |
nitol |
nivdort |
nymaim |
osiris |
osx.fakeflash |
pandabanker |
phishing |
phorpiex |
pitou |
plasma-tomas |
poseidon |
powerstats |
proxyback |
pushdo |
pws.pony |
pykspa |
qadars |
qakbot |
qqblack |
qrypter.rat |
qsnatch |
ramdo |
ramnit |
ranbyus |
ransomware |
ransomware.shade |
renocide |
rovnix |
sality |
sality_old |
sality2 |
shadowpad |
shifu |
shiz |
silon |
sinowal |
sisron |
skunkx |
smartapp |
sodinokibi |
sphinx |
spyeye |
ssl |
ssl-az7 |
ssl-unknown-bot-test |
ssl-vmzeus |
stantinko |
sunburst |
sykipot-apt |
teslacrypt |
threatneedle |
tick |
tinba |
tinba-dga |
tonto-team |
torpig |
trickbot |
trickbot-c2 |
trickbot-c2u |
trickbot-fallback-c2 |
trickbot-iot-c2 |
trojan.click3 |
trojan.includer |
trojan.win32.razy.gen |
trusteer |
tsifiri |
unityminer |
unknown |
unknown-apt |
unknown-bot-test |
urlzone |
valak |
vawtrak |
vbklip |
verst |
victorygate.a |
victorygate.b |
victorygate.c |
vinself |
virut |
vmzeus |
vpnfilter |
wannacrypt |
wauchos |
win.neurevt |
winnti |
worm.phorpiex |
wowlik |
wrokni |
x-agent |
xcodeghost |
xmrminer |
xshellghost |
xswkit |
yash rat |
yoddos |
yzf |
zeus |
zeus_gameover |
zeus_panda |
zloader |