# Copyright (c) 2014-2024 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Aliases: redtail

# Reference: https://x.com/banthisguy9349/status/1837039110889832699
# Reference: https://www.akamai.com/blog/security-research/2024-redtail-cryptominer-pan-os-cve-exploit
# Reference: https://www.virustotal.com/gui/file/de96a56c5508bb69c20f171a141263ebed92823eb3249dccb9db1ff350b37b31/detection

http://154.216.18.19
http://94.156.177.109
185.216.70.138:2137
193.222.96.163:2137
78.153.140.51:2137

# Reference: https://twitter.com/sicehice/status/1782173520006365560
# Reference: https://www.virustotal.com/gui/file/015a5025ba2d3a419165d506f399cef408fb611427debe725a76b44a482c7f24/detection

94.156.79.60:2137
94.156.79.60:43782
identitynetwork.top
proxies.identitynetwork.top
srv.identitynetwork.top

# Reference: https://twitter.com/sicehice/status/1763739244541919656
# Reference: https://www.virustotal.com/gui/file/298edc45b70b1548df2c1293ba3938376778e34cd7b91dbd8ad939c5ef10c111/detection
# Reference: https://www.virustotal.com/gui/file/f61b55a58f227a057c71d5b0d76d6288f8861278d10be8a4bee7d7ddf81b82da/detection

http://185.216.70.138

# Reference: https://x.com/banthisguy9349/status/1837039751548792886
# Reference: https://urlhaus.abuse.ch/browse/tag/redtail (# 2024-09-20)

http://194.59.31.163
http://45.14.226.13
http://93.123.39.157
