# Copyright (c) 2014-2019 Maltrail developers (https://github.com/stamparm/maltrail/)
# See the file 'LICENSE' for copying permission

# Reference: https://twitter.com/bad_packets/status/1118612997620895744
# Reference: https://twitter.com/bad_packets/status/1116054197789544448
# Reference: https://www.virustotal.com/gui/file/16d7ca4e46d7f1ed7600f62164bae51e748efb64f7d49670514b58d4c84bddd6/detection

/timo.vm
/timo1.vm
/timo2.vm
/timo3.vm

# Reference: https://otx.alienvault.com/pulse/5cc3284bddf8a06c649d6336
# Reference: https://blog.trendmicro.com/trendlabs-security-intelligence/aesddos-botnet-malware-exploits-cve-2019-3396-to-perform-remote-code-execution-ddos-attacks-and-cryptocurrency-mining/

23.224.59.34:48080

# Reference: https://www.symantec.com/security-center/writeup/2015-070812-0012-99

61.160.213.49:48080
183.60.149.199:48080
