You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While investigating the content on a suspicious image host, i.postimg.cc, I came across this set of similarly structured lure pages which all request the use of a Telegram login. See also: Phishing-Database/phishing#427
Wildcard domain records
reputation-best.ru|phishing
Sub-Domain records
No response
Hosts (RFC:953) specific records, not used by DNS RPZ firewalls
Fix#614
Rel: Phishing-Database/phishing#435
----
Thanks to jetBrains for sponsoring IntelliJ (Ultimate Edition)
For non-commercial open source.
This helps My Privacy DNS to develop tools and maintain the blacklists.
Signed-off-by: Spirillen <[email protected]>
Comments
While investigating the content on a suspicious image host,
i.postimg.cc
, I came across this set of similarly structured lure pages which all request the use of a Telegram login. See also: Phishing-Database/phishing#427Wildcard domain records
Sub-Domain records
No response
Hosts (RFC:953) specific records, not used by DNS RPZ firewalls
No response
SeafeSearch records
No response
Screenshots
Screenshot
Links to external sources
logs from uBlock Origin
N/A
The text was updated successfully, but these errors were encountered: