Mirai C2

Description

This page displays an overview of the mirai C2s related information, and qualified security researchers may also apply for full data access by sending an email to netlab@360.cn

Note:Those C2 servers we tracked but have never received attack commands from are not counted in our datasets.

We also provide a mirai bot scan activity data feed here and a collection of mirai analysis blogs on our blog.

Download Feeds

For full data access, Send an email to netlab@360.cn to apply.


Recent Target

Time C2 Attack Type Target Target Port Duration
2017-10-22 18:53:14 95.***.***.219:3933 tcp_ack_flood 149.56.143.227/32 25565 20
2017-10-22 18:53:08 95.***.***.219:3933 gre_eth_flood 149.56.143.227/32 25565 20
2017-10-22 18:51:02 95.***.***.219:3933 http_flood 184.84.240.68/32 0 80
2017-10-22 18:48:28 95.***.***.219:3933 http_flood 184.84.240.68/32 0 80
2017-10-22 18:42:27 95.***.***.219:3933 udp_plain_flood 83.136.252.35/32 0 300
2017-10-22 18:41:11 95.***.***.219:3933 udp_plain_flood 83.136.252.35/32 0 20
2017-10-22 18:32:15 54.***.***.165:23 tcp_ack_flood 137.74.6.90/32 0 60
2017-10-22 18:32:15 i***.i***.l***.org:23 tcp_ack_flood 137.74.6.90/32 0 60
2017-10-22 18:29:55 5.***.***.126:23 syn_flood 82.75.155.100/32 0 10
2017-10-22 18:29:46 54.***.***.165:23 http_flood 151.80.3.250/32 0 30

Charts and Numbers in Last 3 Month

C2 server

Attack Command

Target