-
-
Notifications
You must be signed in to change notification settings - Fork 213
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add weebly subdomains to domain blocklist #443
Add weebly subdomains to domain blocklist #443
Conversation
See my comment mypdns/matrix#638 (comment) |
OK, I stay corrected... they have giving The harness to CloudFlare to control there servers, which means nobody can access they domain, nor send any reports... |
Fixes #638 Relate: mitchellkrogza/phishing#443 ---- Thanks to jetBrains for sponsoring IntelliJ (Ultimate Edition) For non-commercial open source. This helps My Privacy DNS to develop tools and maintain the blacklists. Signed-off-by: Spirillen <[email protected]>
No worries, I was initially on the fence myself. What convinced me to take the time to sample the current activity was the observation that many subdomains that were scanned 10-12 months ago were still active. I also think it is useful to sample the various free hosting services from time to time to see how prolific malicious content is on their platforms and how proactive they are about removing it. |
Could be a nice handy tool, yes. MR's welcome in @mypdns 😏 |
Maybe you'll like to add it the README of tools to make https://github.com/external-sources/domain-hub?tab=readme-ov-file#goals |
Phishing Domain/URL/IP(s):
Impersonated domain
Describe the issue
These are some recently active malicious subdomains that are being hosted at weebly.com. Most are to PDF's that VirusTotal labels as "phishing.gen2/phishingx". There are also lure login pages for AT&T, Office, Dropbox, Ionos, and a few others.
Related external source
Screenshot
Click to expand