tag:blogger.com,1999:blog-67713846313751756792024-03-18T15:21:23.684+00:00Daily Botnet StatisticsDetect botnets from malicious mail, and notify the responsible ISP.Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.comBlogger8531125tag:blogger.com,1999:blog-6771384631375175679.post-87392565256942463582024-03-18T15:20:00.002+00:002024-03-18T15:20:27.677+00:00Botnet Statistics [2024-03-17](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-17 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26458<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 24540<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2352</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1416</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1044</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>948</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>575</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>536</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>8</td><td>LINODE-US</td><td align=right>425</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>412</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>387</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7126</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6823</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2426</td></tr>
<tr><td>4</td><td>India</td><td align=right>813</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>691</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>657</td></tr>
<tr><td>7</td><td>Russian Federation</td><td align=right>655</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>642</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>493</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>377</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>3722</td><td align=right>127082</td></tr>
<tr><td>2</td><td align=right>2230</td><td align=right>122925</td></tr>
<tr><td>3</td><td align=right>4422</td><td align=right>64892</td></tr>
<tr><td>4</td><td align=right>322</td><td align=right>61888</td></tr>
<tr><td>5</td><td align=right>4229</td><td align=right>57698</td></tr>
<tr><td>6</td><td align=right>224</td><td align=right>56916</td></tr>
<tr><td>7</td><td align=right>22</td><td align=right>56440</td></tr>
<tr><td>8</td><td align=right>18922</td><td align=right>55735</td></tr>
<tr><td>9</td><td align=right>5422</td><td align=right>55536</td></tr>
<tr><td>10</td><td align=right>52422</td><td align=right>52565</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240318 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="K7gPd66XBgQ" width="400" height="322" src="https://www.youtube.com/embed/K7gPd66XBgQ"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-48587591166084604982024-03-17T14:32:00.002+00:002024-03-17T14:32:57.556+00:00Botnet Statistics [2024-03-16](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-16 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26939<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 24980<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2348</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1448</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1045</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>976</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>589</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>584</td></tr>
<tr><td>7</td><td>TENCENT-CN</td><td align=right>533</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>9</td><td>LINODE-US</td><td align=right>416</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>381</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7131</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6788</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2599</td></tr>
<tr><td>4</td><td>India</td><td align=right>971</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>676</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>668</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>612</td></tr>
<tr><td>8</td><td>Russian Federation</td><td align=right>599</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>486</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>448</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>461</td><td align=right>100003</td></tr>
<tr><td>2</td><td align=right>445</td><td align=right>79929</td></tr>
<tr><td>3</td><td align=right>4422</td><td align=right>61349</td></tr>
<tr><td>4</td><td align=right>3722</td><td align=right>60160</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>59110</td></tr>
<tr><td>6</td><td align=right>451</td><td align=right>56507</td></tr>
<tr><td>7</td><td align=right>2208</td><td align=right>55315</td></tr>
<tr><td>8</td><td align=right>47622</td><td align=right>46725</td></tr>
<tr><td>9</td><td align=right>2267</td><td align=right>43852</td></tr>
<tr><td>10</td><td align=right>2233</td><td align=right>41844</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240317 Botnet Detection Live Streaming 500+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="0cUVxJDATSo" width="400" height="322" src="https://www.youtube.com/embed/0cUVxJDATSo"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-74865593485152004292024-03-16T14:53:00.002+00:002024-03-16T14:53:33.305+00:00Botnet Statistics [2024-03-15](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-15 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27619<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25670<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2364</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1483</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1047</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>959</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>587</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>553</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>8</td><td>LINODE-US</td><td align=right>428</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>393</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>374</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7387</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6894</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2428</td></tr>
<tr><td>4</td><td>India</td><td align=right>1087</td></tr>
<tr><td>5</td><td>Brazil</td><td align=right>712</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>675</td></tr>
<tr><td>7</td><td>Hong Kong</td><td align=right>669</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>637</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>506</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>505</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>384</td><td align=right>97626</td></tr>
<tr><td>2</td><td align=right>6622</td><td align=right>63928</td></tr>
<tr><td>3</td><td align=right>22</td><td align=right>63283</td></tr>
<tr><td>4</td><td align=right>2622</td><td align=right>60216</td></tr>
<tr><td>5</td><td align=right>391</td><td align=right>52512</td></tr>
<tr><td>6</td><td align=right>2235</td><td align=right>49946</td></tr>
<tr><td>7</td><td align=right>3622</td><td align=right>48385</td></tr>
<tr><td>8</td><td align=right>8022</td><td align=right>47350</td></tr>
<tr><td>9</td><td align=right>322</td><td align=right>46645</td></tr>
<tr><td>10</td><td align=right>8322</td><td align=right>44720</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240316 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="qYwEPKLPtAc" width="400" height="322" src="https://www.youtube.com/embed/qYwEPKLPtAc"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-55643445179238186382024-03-15T14:47:00.002+00:002024-03-15T14:47:23.553+00:00Botnet Statistics [2024-03-14](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-14 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 28186<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 26427<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2326</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1420</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1063</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>924</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>610</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>603</td></tr>
<tr><td>7</td><td>TENCENT-CN</td><td align=right>515</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>9</td><td>LINODE-US</td><td align=right>422</td></tr>
<tr><td>10</td><td>CMNET</td><td align=right>399</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7353</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7148</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2612</td></tr>
<tr><td>4</td><td>India</td><td align=right>1093</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>708</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>703</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>677</td></tr>
<tr><td>8</td><td>Russian Federation</td><td align=right>647</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>495</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>482</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>40122</td><td align=right>111237</td></tr>
<tr><td>2</td><td align=right>3722</td><td align=right>81107</td></tr>
<tr><td>3</td><td align=right>8322</td><td align=right>78500</td></tr>
<tr><td>4</td><td align=right>622</td><td align=right>64509</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>64399</td></tr>
<tr><td>6</td><td align=right>7022</td><td align=right>53287</td></tr>
<tr><td>7</td><td align=right>1722</td><td align=right>52989</td></tr>
<tr><td>8</td><td align=right>2275</td><td align=right>49683</td></tr>
<tr><td>9</td><td align=right>2255</td><td align=right>47763</td></tr>
<tr><td>10</td><td align=right>2230</td><td align=right>47673</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240315 Botnet Detection Live Streaming 600+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="fzJyGDgLtoc" width="400" height="322" src="https://www.youtube.com/embed/fzJyGDgLtoc"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-13187096798193530332024-03-14T14:27:00.002+00:002024-03-14T14:27:59.398+00:00Botnet Statistics [2024-03-13](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-13 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 29142<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 27212<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2358</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1479</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1047</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>984</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>606</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>555</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>8</td><td>ASEPL-SG</td><td align=right>417</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>393</td></tr>
<tr><td>10</td><td>CMNET</td><td align=right>379</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7712</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7127</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2466</td></tr>
<tr><td>4</td><td>India</td><td align=right>1114</td></tr>
<tr><td>5</td><td>Brazil</td><td align=right>806</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>785</td></tr>
<tr><td>7</td><td>Hong Kong</td><td align=right>762</td></tr>
<tr><td>8</td><td>Russian Federation</td><td align=right>749</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>501</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>500</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>38322</td><td align=right>100348</td></tr>
<tr><td>2</td><td align=right>2230</td><td align=right>91159</td></tr>
<tr><td>3</td><td align=right>3722</td><td align=right>77229</td></tr>
<tr><td>4</td><td align=right>11022</td><td align=right>58290</td></tr>
<tr><td>5</td><td align=right>622</td><td align=right>57451</td></tr>
<tr><td>6</td><td align=right>7022</td><td align=right>53458</td></tr>
<tr><td>7</td><td align=right>22</td><td align=right>53392</td></tr>
<tr><td>8</td><td align=right>5822</td><td align=right>50856</td></tr>
<tr><td>9</td><td align=right>2263</td><td align=right>42770</td></tr>
<tr><td>10</td><td align=right>2255</td><td align=right>41252</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240314 Botnet Detection Live Streaming 300+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="zgdBfekKDsI" width="400" height="322" src="https://www.youtube.com/embed/zgdBfekKDsI"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-65574176077555952592024-03-13T13:25:00.002+00:002024-03-13T13:25:28.689+00:00Botnet Statistics [2024-03-12](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-12 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 28676<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 26674<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2370</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1512</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1037</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>1022</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>611</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>579</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>496</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>9</td><td>CMNET</td><td align=right>391</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>387</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7645</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6795</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2664</td></tr>
<tr><td>4</td><td>India</td><td align=right>1104</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>775</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>772</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>758</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>684</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>492</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>489</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>35822</td><td align=right>125102</td></tr>
<tr><td>2</td><td align=right>8322</td><td align=right>70076</td></tr>
<tr><td>3</td><td align=right>2286</td><td align=right>60305</td></tr>
<tr><td>4</td><td align=right>7022</td><td align=right>55632</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>53170</td></tr>
<tr><td>6</td><td align=right>2218</td><td align=right>46284</td></tr>
<tr><td>7</td><td align=right>225</td><td align=right>46161</td></tr>
<tr><td>8</td><td align=right>5822</td><td align=right>44530</td></tr>
<tr><td>9</td><td align=right>58022</td><td align=right>43984</td></tr>
<tr><td>10</td><td align=right>2230</td><td align=right>36847</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240313 Botnet Detection Live Streaming 300+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="XMks2w8WVUM" width="400" height="322" src="https://www.youtube.com/embed/XMks2w8WVUM"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-70187429845241346722024-03-12T14:35:00.002+00:002024-03-12T14:35:50.110+00:00Botnet Statistics [2024-03-11](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-11 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 28869<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 27019<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2333</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1499</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1050</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>1010</td></tr>
<tr><td>5</td><td>TENCENT-CN</td><td align=right>579</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>573</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>461</td></tr>
<tr><td>8</td><td>ASEPL-SG</td><td align=right>426</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>416</td></tr>
<tr><td>10</td><td>LINODE-US</td><td align=right>414</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7738</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7109</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2459</td></tr>
<tr><td>4</td><td>India</td><td align=right>1131</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>798</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>762</td></tr>
<tr><td>7</td><td>Russian Federation</td><td align=right>751</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>703</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>521</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>475</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>35522</td><td align=right>93497</td></tr>
<tr><td>2</td><td align=right>2255</td><td align=right>81823</td></tr>
<tr><td>3</td><td align=right>3622</td><td align=right>61963</td></tr>
<tr><td>4</td><td align=right>5422</td><td align=right>57514</td></tr>
<tr><td>5</td><td align=right>7022</td><td align=right>54117</td></tr>
<tr><td>6</td><td align=right>7522</td><td align=right>52954</td></tr>
<tr><td>7</td><td align=right>22</td><td align=right>52150</td></tr>
<tr><td>8</td><td align=right>622</td><td align=right>51713</td></tr>
<tr><td>9</td><td align=right>2286</td><td align=right>49786</td></tr>
<tr><td>10</td><td align=right>2622</td><td align=right>48368</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240312 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="pTRwPjLxL8U" width="400" height="322" src="https://www.youtube.com/embed/pTRwPjLxL8U"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-77245581165998691962024-03-11T15:53:00.002+00:002024-03-11T15:53:09.834+00:00Botnet Statistics [2024-03-10](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-10 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27899<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 26152<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2428</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1446</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1062</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1049</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>615</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>610</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>603</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>9</td><td>UCLOUD-HK</td><td align=right>423</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>421</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7481</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7180</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2727</td></tr>
<tr><td>4</td><td>India</td><td align=right>857</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>822</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>696</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>692</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>686</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>489</td></tr>
<tr><td>10</td><td>Germany</td><td align=right>447</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>21922</td><td align=right>97039</td></tr>
<tr><td>2</td><td align=right>32322</td><td align=right>92557</td></tr>
<tr><td>3</td><td align=right>2286</td><td align=right>60881</td></tr>
<tr><td>4</td><td align=right>5422</td><td align=right>60663</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>50888</td></tr>
<tr><td>6</td><td align=right>7022</td><td align=right>48777</td></tr>
<tr><td>7</td><td align=right>2233</td><td align=right>40386</td></tr>
<tr><td>8</td><td align=right>22800</td><td align=right>35783</td></tr>
<tr><td>9</td><td align=right>2622</td><td align=right>35199</td></tr>
<tr><td>10</td><td align=right>2223</td><td align=right>34605</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240311 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="3rDK-LeXFik" width="400" height="322" src="https://www.youtube.com/embed/3rDK-LeXFik"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-76128944566168850322024-03-10T13:07:00.002+00:002024-03-10T13:07:46.655+00:00Botnet Statistics [2024-03-09](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-09 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 28458<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 26680<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2446</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1557</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1077</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1050</td></tr>
<tr><td>5</td><td>TENCENT-CN</td><td align=right>619</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>601</td></tr>
<tr><td>7</td><td>LINODE-US</td><td align=right>472</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>435</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>430</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7934</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7213</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2561</td></tr>
<tr><td>4</td><td>India</td><td align=right>925</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>820</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>709</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>696</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>683</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>503</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>461</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>2223</td><td align=right>57524</td></tr>
<tr><td>2</td><td align=right>2233</td><td align=right>57073</td></tr>
<tr><td>3</td><td align=right>22</td><td align=right>50768</td></tr>
<tr><td>4</td><td align=right>229</td><td align=right>47489</td></tr>
<tr><td>5</td><td align=right>3622</td><td align=right>44114</td></tr>
<tr><td>6</td><td align=right>7022</td><td align=right>36721</td></tr>
<tr><td>7</td><td align=right>7222</td><td align=right>36079</td></tr>
<tr><td>8</td><td align=right>2622</td><td align=right>33993</td></tr>
<tr><td>9</td><td align=right>6622</td><td align=right>32058</td></tr>
<tr><td>10</td><td align=right>7522</td><td align=right>28319</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240310 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="21hQ-VugTmk" width="400" height="322" src="https://www.youtube.com/embed/21hQ-VugTmk"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-38603903848453178322024-03-09T14:31:00.002+00:002024-03-09T14:31:47.406+00:00Botnet Statistics [2024-03-08](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-08 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 30258<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 28375<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2451</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1527</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1075</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1054</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>619</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>616</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>567</td></tr>
<tr><td>8</td><td>KORNET-KR</td><td align=right>487</td></tr>
<tr><td>9</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>451</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>8260</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6961</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2770</td></tr>
<tr><td>4</td><td>India</td><td align=right>1158</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>907</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>832</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>810</td></tr>
<tr><td>8</td><td>Russian Federation</td><td align=right>779</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>519</td></tr>
<tr><td>10</td><td>Germany</td><td align=right>516</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>8122</td><td align=right>101722</td></tr>
<tr><td>2</td><td align=right>24</td><td align=right>101090</td></tr>
<tr><td>3</td><td align=right>30</td><td align=right>100682</td></tr>
<tr><td>4</td><td align=right>22</td><td align=right>53565</td></tr>
<tr><td>5</td><td align=right>2223</td><td align=right>51406</td></tr>
<tr><td>6</td><td align=right>7022</td><td align=right>39284</td></tr>
<tr><td>7</td><td align=right>5822</td><td align=right>38152</td></tr>
<tr><td>8</td><td align=right>55522</td><td align=right>37775</td></tr>
<tr><td>9</td><td align=right>2622</td><td align=right>37032</td></tr>
<tr><td>10</td><td align=right>322</td><td align=right>35055</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240309 Botnet Detection Live Streaming 300+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="RvTN-RFDQxE" width="400" height="322" src="https://www.youtube.com/embed/RvTN-RFDQxE"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-28731210167274477312024-03-08T13:12:00.002+00:002024-03-08T13:12:39.480+00:00Botnet Statistics [2024-03-07](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-07 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 31608<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 29651<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2473</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1547</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1068</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>1012</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>546</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>519</td></tr>
<tr><td>7</td><td>CMNET</td><td align=right>499</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>461</td></tr>
<tr><td>10</td><td>ASEPL-SG</td><td align=right>456</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>8347</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7121</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2639</td></tr>
<tr><td>4</td><td>India</td><td align=right>1302</td></tr>
<tr><td>5</td><td>Russian Federation</td><td align=right>904</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>899</td></tr>
<tr><td>7</td><td>Hong Kong</td><td align=right>885</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>805</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>543</td></tr>
<tr><td>10</td><td>Indonesia</td><td align=right>529</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>8122</td><td align=right>239424</td></tr>
<tr><td>2</td><td align=right>322</td><td align=right>68409</td></tr>
<tr><td>3</td><td align=right>7522</td><td align=right>54998</td></tr>
<tr><td>4</td><td align=right>2223</td><td align=right>47852</td></tr>
<tr><td>5</td><td align=right>5822</td><td align=right>45337</td></tr>
<tr><td>6</td><td align=right>22</td><td align=right>42070</td></tr>
<tr><td>7</td><td align=right>2255</td><td align=right>37571</td></tr>
<tr><td>8</td><td align=right>13</td><td align=right>27232</td></tr>
<tr><td>9</td><td align=right>57022</td><td align=right>25678</td></tr>
<tr><td>10</td><td align=right>445</td><td align=right>25473</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240308 Botnet Detection Live Streaming 400+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="PuiG719nFAk" width="400" height="322" src="https://www.youtube.com/embed/PuiG719nFAk"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-87539123975363558222024-03-07T13:10:00.002+00:002024-03-07T13:10:06.246+00:00Botnet Statistics [2024-03-06](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-06 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27535<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25777<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2377</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1398</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1046</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>815</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>616</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>593</td></tr>
<tr><td>7</td><td>TENCENT-CN</td><td align=right>495</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>427</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>372</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7045</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6616</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2694</td></tr>
<tr><td>4</td><td>India</td><td align=right>1042</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>751</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>749</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>749</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>687</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>458</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>448</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>8122</td><td align=right>258713</td></tr>
<tr><td>2</td><td align=right>2622</td><td align=right>45533</td></tr>
<tr><td>3</td><td align=right>622</td><td align=right>34299</td></tr>
<tr><td>4</td><td align=right>322</td><td align=right>31849</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>29659</td></tr>
<tr><td>6</td><td align=right>2233</td><td align=right>27698</td></tr>
<tr><td>7</td><td align=right>2251</td><td align=right>27548</td></tr>
<tr><td>8</td><td align=right>2223</td><td align=right>24867</td></tr>
<tr><td>9</td><td align=right>2242</td><td align=right>23530</td></tr>
<tr><td>10</td><td align=right>4422</td><td align=right>23281</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240307 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="F775UdGR1hE" width="400" height="322" src="https://www.youtube.com/embed/F775UdGR1hE"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-79724169305832738082024-03-06T14:03:00.004+00:002024-03-06T14:03:59.551+00:00Botnet Statistics [2024-03-05](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-05 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26454<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 24758<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2395</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1348</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1033</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>1009</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>584</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>561</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>8</td><td>KORNET-KR</td><td align=right>414</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>402</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>361</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>6822</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6540</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2478</td></tr>
<tr><td>4</td><td>India</td><td align=right>921</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>741</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>705</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>704</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>692</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>459</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>451</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>522</td><td align=right>62182</td></tr>
<tr><td>2</td><td align=right>22</td><td align=right>47603</td></tr>
<tr><td>3</td><td align=right>7</td><td align=right>46976</td></tr>
<tr><td>4</td><td align=right>2233</td><td align=right>44106</td></tr>
<tr><td>5</td><td align=right>7522</td><td align=right>36985</td></tr>
<tr><td>6</td><td align=right>8122</td><td align=right>34269</td></tr>
<tr><td>7</td><td align=right>2222</td><td align=right>34088</td></tr>
<tr><td>8</td><td align=right>8622</td><td align=right>28409</td></tr>
<tr><td>9</td><td align=right>2255</td><td align=right>25873</td></tr>
<tr><td>10</td><td align=right>2274</td><td align=right>25685</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240306 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="jvUKobEekWE" width="400" height="322" src="https://www.youtube.com/embed/jvUKobEekWE"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-87934840917286416572024-03-05T13:50:00.002+00:002024-03-05T13:50:22.500+00:00Botnet Statistics [2024-03-04](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-04 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27000<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25358<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2407</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1438</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1060</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>662</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>644</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>564</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>8</td><td>KORNET-KR</td><td align=right>436</td></tr>
<tr><td>9</td><td>UCLOUD-HK</td><td align=right>411</td></tr>
<tr><td>10</td><td>AL-3</td><td align=right>381</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>United States</td><td align=right>6860</td></tr>
<tr><td>2</td><td>China</td><td align=right>6373</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2742</td></tr>
<tr><td>4</td><td>India</td><td align=right>976</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>784</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>745</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>706</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>662</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>488</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>470</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>2224</td><td align=right>82399</td></tr>
<tr><td>2</td><td align=right>622</td><td align=right>46658</td></tr>
<tr><td>3</td><td align=right>3722</td><td align=right>44529</td></tr>
<tr><td>4</td><td align=right>322</td><td align=right>42544</td></tr>
<tr><td>5</td><td align=right>522</td><td align=right>40830</td></tr>
<tr><td>6</td><td align=right>2222</td><td align=right>37548</td></tr>
<tr><td>7</td><td align=right>22</td><td align=right>34655</td></tr>
<tr><td>8</td><td align=right>2219</td><td align=right>30249</td></tr>
<tr><td>9</td><td align=right>8022</td><td align=right>26917</td></tr>
<tr><td>10</td><td align=right>845</td><td align=right>25779</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240305 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="rS9HDr1U04s" width="400" height="322" src="https://www.youtube.com/embed/rS9HDr1U04s"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-28257007774900336362024-03-04T15:43:00.002+00:002024-03-04T15:43:10.769+00:00Botnet Statistics [2024-03-03](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-03 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26568<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 24890<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2425</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1428</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1093</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1049</td></tr>
<tr><td>5</td><td>TENCENT-CN</td><td align=right>609</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>603</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>8</td><td>UCLOUD-HK</td><td align=right>434</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>406</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>390</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7192</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6872</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2507</td></tr>
<tr><td>4</td><td>Hong Kong</td><td align=right>798</td></tr>
<tr><td>5</td><td>India</td><td align=right>758</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>640</td></tr>
<tr><td>7</td><td>Russian Federation</td><td align=right>628</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>595</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>444</td></tr>
<tr><td>10</td><td>Netherlands</td><td align=right>440</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>2224</td><td align=right>116570</td></tr>
<tr><td>2</td><td align=right>22</td><td align=right>49758</td></tr>
<tr><td>3</td><td align=right>52222</td><td align=right>48402</td></tr>
<tr><td>4</td><td align=right>2222</td><td align=right>41407</td></tr>
<tr><td>5</td><td align=right>8022</td><td align=right>37283</td></tr>
<tr><td>6</td><td align=right>2255</td><td align=right>36061</td></tr>
<tr><td>7</td><td align=right>322</td><td align=right>33603</td></tr>
<tr><td>8</td><td align=right>2233</td><td align=right>31599</td></tr>
<tr><td>9</td><td align=right>6000</td><td align=right>29285</td></tr>
<tr><td>10</td><td align=right>1722</td><td align=right>28961</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240304 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="U-p05J-SAY0" width="400" height="322" src="https://www.youtube.com/embed/U-p05J-SAY0"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-73359241382190772692024-03-03T14:57:00.002+00:002024-03-03T14:57:22.328+00:00Botnet Statistics [2024-03-02](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-02 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27563<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25798<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2430</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1448</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1066</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1050</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>634</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>604</td></tr>
<tr><td>7</td><td>TENCENT-CN</td><td align=right>596</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>9</td><td>UCLOUD-HK</td><td align=right>445</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>420</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7062</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7045</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2745</td></tr>
<tr><td>4</td><td>India</td><td align=right>968</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>828</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>703</td></tr>
<tr><td>7</td><td>Russian Federation</td><td align=right>697</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>630</td></tr>
<tr><td>9</td><td>Netherlands</td><td align=right>435</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>425</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>6002</td><td align=right>136844</td></tr>
<tr><td>2</td><td align=right>2224</td><td align=right>121442</td></tr>
<tr><td>3</td><td align=right>5802</td><td align=right>49936</td></tr>
<tr><td>4</td><td align=right>2222</td><td align=right>40772</td></tr>
<tr><td>5</td><td align=right>22</td><td align=right>40318</td></tr>
<tr><td>6</td><td align=right>522</td><td align=right>40111</td></tr>
<tr><td>7</td><td align=right>2219</td><td align=right>39476</td></tr>
<tr><td>8</td><td align=right>2622</td><td align=right>38064</td></tr>
<tr><td>9</td><td align=right>8022</td><td align=right>34981</td></tr>
<tr><td>10</td><td align=right>9378</td><td align=right>34954</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240303 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="R-9B9lSL-6I" width="400" height="322" src="https://www.youtube.com/embed/R-9B9lSL-6I"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-53977799935923075622024-03-02T14:56:00.000+00:002024-03-02T14:56:28.728+00:00Botnet Statistics [2024-03-01](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/03/daily-zombie-lists-for-march-2024.html">Daily Zombie IP Lists for March 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-03-01 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26982<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25200<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2214</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1422</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1051</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>931</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>578</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>534</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>462</td></tr>
<tr><td>8</td><td>UCLOUD-HK</td><td align=right>413</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>411</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>385</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>6916</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6867</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2343</td></tr>
<tr><td>4</td><td>India</td><td align=right>962</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>810</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>772</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>651</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>646</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>468</td></tr>
<tr><td>10</td><td>Netherlands</td><td align=right>449</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>522</td><td align=right>69309</td></tr>
<tr><td>2</td><td align=right>1722</td><td align=right>56069</td></tr>
<tr><td>3</td><td align=right>6002</td><td align=right>53561</td></tr>
<tr><td>4</td><td align=right>2222</td><td align=right>48053</td></tr>
<tr><td>5</td><td align=right>491</td><td align=right>46463</td></tr>
<tr><td>6</td><td align=right>8022</td><td align=right>42383</td></tr>
<tr><td>7</td><td align=right>22</td><td align=right>40243</td></tr>
<tr><td>8</td><td align=right>6000</td><td align=right>37825</td></tr>
<tr><td>9</td><td align=right>7522</td><td align=right>37287</td></tr>
<tr><td>10</td><td align=right>7222</td><td align=right>28866</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240302 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="K9RzVenaLz0" width="400" height="322" src="https://www.youtube.com/embed/K9RzVenaLz0"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-73215887784610314432024-03-02T13:51:00.016+00:002024-03-18T15:07:52.622+00:00Daily Zombie Lists for March 2024 (2024年03月,每日殭屍電腦IP清單)To facilitate security research, I will release the daily zombie IP lists in CSV format here for anyone interested to download. The data columns are defined as follows:<div>為協助資安方面的研究,我將每日釋出CSV格式的殭屍電腦IP清單,供任何有興趣的人下載。資料欄位定義如下:</div><div><br /></div>
<div>Column 1: The date and time in UTC when the last connection attempt (port scans) from the zombie IP (column 2) was detected;</div><div>第1欄:該殭屍電腦最後一次被偵測到企圖連線的日期、時間,時區為UTC;</div>
<div>Column 2: Zombie IP;</div><div>第2欄:該殭屍電腦的IP位址;</div>
<div>Column 3: TCP destination port number scanned by the zombie.</div><div>第3欄:該殭屍電腦所掃描的TCP埠號。</div><div><br /></div>
<div>Join the "<a href="https://t.me/szipl">Suspected Zombie IP List</a>" Telegram channel to get notified when the latest data are ready for download.</div><div>想在第一時間取得資料下載網址?請加入<a href="https://t.me/szipl">Suspected Zombie IP List</a>的Telegram頻道。</div><div><br /></div>
<div>Here are the download links of the daily zombie IP lists for March 2024 (without excluding IP addresses of TOR exits and so-called security researchers' nodes.):</div><div>以下是2024年03月的每日殭屍電腦IP清單的下載網址(未濾除TOR exit與所謂“資安研究者”的主機IP):</div><div><br /></div>
<div>03/01: <a href="https://www.mediafire.com/file/01gcpvra0ui5m6u/240301_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: aa4ed1733469b7df78dd8a5d865a9b56</div>
<div>03/02: <a href="https://www.mediafire.com/file/et5duqm94up8rsy/240302_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: cd159b20f49adc3cc975705e791b5ff2</div>
<div>03/03: <a href="https://www.mediafire.com/file/pb2u8kjlsznd5ub/240303_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 38c75641d7c17fb4893f6ce3e89df15e</div>
<div>03/04: <a href="https://www.mediafire.com/file/adhh9omgprtx0hb/240304_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: f316b9f70ef27af5c533ef2aa0a332fc</div>
<div>03/05: <a href="https://www.mediafire.com/file/py9b4dad4xgz2rg/240305_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 28b70687fe19e5ca92aec9118168dae6</div>
<div>03/06: <a href="https://www.mediafire.com/file/q3f0ihq547kdra7/240306_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 11f13cb081f888e65900681714c23122</div>
<div>03/07: <a href="https://www.mediafire.com/file/nn6hzxx3r4ojqes/240307_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 04b72e002f1da130a7690d8fe014aa03</div>
<div>03/08: <a href="https://www.mediafire.com/file/nifgshqrg7qw1hf/240308_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 221de985afde3090a911f5baa1906753</div>
<div>03/09: <a href="https://www.mediafire.com/file/erx9xs3bd7fy4cv/240309_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: ab45e61ad5aa007751412dee172c7a02</div>
<div>03/10: <a href="https://www.mediafire.com/file/zf7vrrm6ta2x6nm/240310_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 0bd21d537b565d6828969048d9eb5cc7</div>
<div>03/11: <a href="https://www.mediafire.com/file/wiu0arhogu3e2oc/240311_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 4cdbb94c8a4b0f2396dfd9436de174a4</div>
<div>03/12: <a href="https://www.mediafire.com/file/l05yny7psmpg22f/240312_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 483744659feae7f8d64162b14ea3c659</div>
<div>03/13: <a href="https://www.mediafire.com/file/tfjjdgileqb0y1p/240313_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: abbc209d8ea80b51a06fcf9e519cc4d7</div>
<div>03/14: <a href="https://www.mediafire.com/file/j9d8mi0v4f2vx92/240314_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: e9f7dfb8b15e2d3301495435ff286929</div>
<div>03/15: <a href="https://www.mediafire.com/file/hrcglublkdhmqyl/240315_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 1ba7eb39212ae0645b394c92fbabfb7e</div>
<div>03/16: <a href="https://www.mediafire.com/file/f4yrpd9ir4ygnjo/240316_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: a930add6df0bd50b2d897f7b460ecce2</div>
<div>03/17: <a href="https://www.mediafire.com/file/d9lbfonwut181ja/240317_zombie_ip.csv/file">download link 下載網址</a>; MD5sum: 4e5bfd836cef99eecfe86ffe01b4b339</div>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-88455894658223760582024-03-01T15:12:00.002+00:002024-03-01T15:12:16.938+00:00Botnet Statistics [2024-02-29](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-29 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 26955<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 24945<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2647</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1393</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1057</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>860</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>641</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>591</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>8</td><td>TENCENT-CN</td><td align=right>424</td></tr>
<tr><td>9</td><td>LINODE-US</td><td align=right>421</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>394</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>United States</td><td align=right>7084</td></tr>
<tr><td>2</td><td>China</td><td align=right>6344</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2935</td></tr>
<tr><td>4</td><td>India</td><td align=right>1002</td></tr>
<tr><td>5</td><td>Russian Federation</td><td align=right>702</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>663</td></tr>
<tr><td>7</td><td>Hong Kong</td><td align=right>662</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>638</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>505</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>453</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>6001</td><td align=right>154373</td></tr>
<tr><td>2</td><td align=right>2225</td><td align=right>52629</td></tr>
<tr><td>3</td><td align=right>8022</td><td align=right>51152</td></tr>
<tr><td>4</td><td align=right>445</td><td align=right>50685</td></tr>
<tr><td>5</td><td align=right>449</td><td align=right>47674</td></tr>
<tr><td>6</td><td align=right>2622</td><td align=right>46791</td></tr>
<tr><td>7</td><td align=right>1722</td><td align=right>42904</td></tr>
<tr><td>8</td><td align=right>22</td><td align=right>37641</td></tr>
<tr><td>9</td><td align=right>2126</td><td align=right>34511</td></tr>
<tr><td>10</td><td align=right>22001</td><td align=right>32234</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240301 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="lRP8pr6a0cY" width="400" height="322" src="https://www.youtube.com/embed/lRP8pr6a0cY"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-8484171090104394692024-02-29T12:45:00.002+00:002024-02-29T12:45:17.552+00:00Botnet Statistics [2024-02-28](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-28 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 24478<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 22599<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>1608</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1361</td></tr>
<tr><td>3</td><td>GOOGLE-CLOUD</td><td align=right>1044</td></tr>
<tr><td>4</td><td>TencentCloud</td><td align=right>805</td></tr>
<tr><td>5</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>596</td></tr>
<tr><td>6</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>7</td><td>TENCENT-CN</td><td align=right>444</td></tr>
<tr><td>8</td><td>ASEPL-SG</td><td align=right>411</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>358</td></tr>
<tr><td>10</td><td>DIGITALOCEAN-198-199-64-0</td><td align=right>341</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>United States</td><td align=right>6759</td></tr>
<tr><td>2</td><td>China</td><td align=right>6024</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>1838</td></tr>
<tr><td>4</td><td>India</td><td align=right>901</td></tr>
<tr><td>5</td><td>Russian Federation</td><td align=right>630</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>615</td></tr>
<tr><td>7</td><td>Hong Kong</td><td align=right>608</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>584</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>419</td></tr>
<tr><td>10</td><td>Netherlands</td><td align=right>408</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>2225</td><td align=right>111302</td></tr>
<tr><td>2</td><td align=right>2622</td><td align=right>59113</td></tr>
<tr><td>3</td><td align=right>6560</td><td align=right>54669</td></tr>
<tr><td>4</td><td align=right>1722</td><td align=right>39819</td></tr>
<tr><td>5</td><td align=right>8022</td><td align=right>38754</td></tr>
<tr><td>6</td><td align=right>22</td><td align=right>32610</td></tr>
<tr><td>7</td><td align=right>6001</td><td align=right>32535</td></tr>
<tr><td>8</td><td align=right>22001</td><td align=right>32411</td></tr>
<tr><td>9</td><td align=right>5900</td><td align=right>29884</td></tr>
<tr><td>10</td><td align=right>6000</td><td align=right>29647</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240229 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="QnrueLNVFjs" width="400" height="322" src="https://www.youtube.com/embed/QnrueLNVFjs"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-19041464528336630262024-02-28T13:26:00.000+00:002024-02-28T13:26:01.996+00:00Botnet Statistics [2024-02-27](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-27 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 29407<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 27238<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2753</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1462</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1170</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1042</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>698</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>660</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>599</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>465</td></tr>
<tr><td>9</td><td>KORNET-KR</td><td align=right>419</td></tr>
<tr><td>10</td><td>AL-3</td><td align=right>413</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7693</td></tr>
<tr><td>2</td><td>United States</td><td align=right>7072</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>3098</td></tr>
<tr><td>4</td><td>India</td><td align=right>1039</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>802</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>741</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>729</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>672</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>528</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>480</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>6000</td><td align=right>94169</td></tr>
<tr><td>2</td><td align=right>7722</td><td align=right>68495</td></tr>
<tr><td>3</td><td align=right>5900</td><td align=right>47075</td></tr>
<tr><td>4</td><td align=right>22</td><td align=right>38552</td></tr>
<tr><td>5</td><td align=right>2622</td><td align=right>37742</td></tr>
<tr><td>6</td><td align=right>54321</td><td align=right>34553</td></tr>
<tr><td>7</td><td align=right>8022</td><td align=right>31208</td></tr>
<tr><td>8</td><td align=right>2208</td><td align=right>24701</td></tr>
<tr><td>9</td><td align=right>2222</td><td align=right>21106</td></tr>
<tr><td>10</td><td align=right>25298</td><td align=right>20537</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240228 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="9KhbQpZL_bc" width="400" height="322" src="https://www.youtube.com/embed/9KhbQpZL_bc"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-87592984023012607522024-02-27T14:11:00.002+00:002024-02-27T14:11:59.667+00:00Botnet Statistics [2024-02-26](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-26 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 29757<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 27654<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2783</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1506</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1089</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1055</td></tr>
<tr><td>5</td><td>TENCENT-CN</td><td align=right>610</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>520</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>8</td><td>UCLOUD-HK</td><td align=right>444</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>436</td></tr>
<tr><td>10</td><td>CMNET</td><td align=right>420</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7876</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6870</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2880</td></tr>
<tr><td>4</td><td>India</td><td align=right>1020</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>918</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>803</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>794</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>636</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>563</td></tr>
<tr><td>10</td><td>Taiwan</td><td align=right>480</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>6000</td><td align=right>105625</td></tr>
<tr><td>2</td><td align=right>7722</td><td align=right>78025</td></tr>
<tr><td>3</td><td align=right>2208</td><td align=right>54753</td></tr>
<tr><td>4</td><td align=right>12345</td><td align=right>54655</td></tr>
<tr><td>5</td><td align=right>5900</td><td align=right>51047</td></tr>
<tr><td>6</td><td align=right>22</td><td align=right>45636</td></tr>
<tr><td>7</td><td align=right>9290</td><td align=right>41947</td></tr>
<tr><td>8</td><td align=right>8422</td><td align=right>41913</td></tr>
<tr><td>9</td><td align=right>8022</td><td align=right>31283</td></tr>
<tr><td>10</td><td align=right>2205</td><td align=right>25908</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240227 Botnet Detection Live Streaming 200+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="kkh9OdNXojo" width="400" height="322" src="https://www.youtube.com/embed/kkh9OdNXojo"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-79236321805254200462024-02-26T14:33:00.002+00:002024-02-26T14:33:31.700+00:00Botnet Statistics [2024-02-25](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-25 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27253<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25320<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2725</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1450</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1107</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1051</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>723</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>637</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>591</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>9</td><td>UCLOUD-HK</td><td align=right>428</td></tr>
<tr><td>10</td><td>AL-3</td><td align=right>421</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7607</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6724</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>3104</td></tr>
<tr><td>4</td><td>Hong Kong</td><td align=right>818</td></tr>
<tr><td>5</td><td>India</td><td align=right>800</td></tr>
<tr><td>6</td><td>South Korea</td><td align=right>608</td></tr>
<tr><td>7</td><td>Brazil</td><td align=right>607</td></tr>
<tr><td>8</td><td>Russian Federation</td><td align=right>606</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>465</td></tr>
<tr><td>10</td><td>Netherlands</td><td align=right>401</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>8422</td><td align=right>55736</td></tr>
<tr><td>2</td><td align=right>5900</td><td align=right>47178</td></tr>
<tr><td>3</td><td align=right>56789</td><td align=right>42986</td></tr>
<tr><td>4</td><td align=right>9290</td><td align=right>39157</td></tr>
<tr><td>5</td><td align=right>2208</td><td align=right>37297</td></tr>
<tr><td>6</td><td align=right>22</td><td align=right>37096</td></tr>
<tr><td>7</td><td align=right>8022</td><td align=right>35559</td></tr>
<tr><td>8</td><td align=right>2205</td><td align=right>24836</td></tr>
<tr><td>9</td><td align=right>2201</td><td align=right>23510</td></tr>
<tr><td>10</td><td align=right>52218</td><td align=right>21443</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240226 Botnet Detection Live Streaming 300+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="BhCzgjC_OWc" width="400" height="322" src="https://www.youtube.com/embed/BhCzgjC_OWc"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-889151459014922712024-02-25T14:27:00.002+00:002024-02-25T14:27:46.306+00:00Botnet Statistics [2024-02-24](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-24 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 27036<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 25258<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2773</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1396</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1115</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1046</td></tr>
<tr><td>5</td><td>TENCENT-CN</td><td align=right>636</td></tr>
<tr><td>6</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>599</td></tr>
<tr><td>7</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>8</td><td>UCLOUD-HK</td><td align=right>412</td></tr>
<tr><td>9</td><td>ASEPL-SG</td><td align=right>383</td></tr>
<tr><td>10</td><td>KORNET-KR</td><td align=right>354</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7450</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6558</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>2781</td></tr>
<tr><td>4</td><td>India</td><td align=right>957</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>823</td></tr>
<tr><td>6</td><td>Russian Federation</td><td align=right>625</td></tr>
<tr><td>7</td><td>South Korea</td><td align=right>611</td></tr>
<tr><td>8</td><td>Brazil</td><td align=right>606</td></tr>
<tr><td>9</td><td>Japan</td><td align=right>483</td></tr>
<tr><td>10</td><td>Viet Nam</td><td align=right>443</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>5900</td><td align=right>47795</td></tr>
<tr><td>2</td><td align=right>2208</td><td align=right>45367</td></tr>
<tr><td>3</td><td align=right>8022</td><td align=right>43460</td></tr>
<tr><td>4</td><td align=right>6000</td><td align=right>40942</td></tr>
<tr><td>5</td><td align=right>10000</td><td align=right>40831</td></tr>
<tr><td>6</td><td align=right>8000</td><td align=right>39507</td></tr>
<tr><td>7</td><td align=right>8422</td><td align=right>37848</td></tr>
<tr><td>8</td><td align=right>2292</td><td align=right>37688</td></tr>
<tr><td>9</td><td align=right>22</td><td align=right>28983</td></tr>
<tr><td>10</td><td align=right>2201</td><td align=right>24233</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240225 Botnet Detection Live Streaming 100+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="DXTSs2I45wI" width="400" height="322" src="https://www.youtube.com/embed/DXTSs2I45wI"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0tag:blogger.com,1999:blog-6771384631375175679.post-12432572820134800342024-02-24T12:41:00.002+00:002024-02-24T12:41:23.939+00:00Botnet Statistics [2024-02-23](To download the latest zombie ip list, please visit the <a href="https://botnet-tracker.blogspot.com/2024/02/daily-zombie-lists-for-february-2024.html">Daily Zombie IP Lists for February 2024</a>. To get an idea of what IP is scanning the Internet currently, please watch: <a href="https://www.youtube.com/playlist?list=PLNiwfz3RJ69ErQTDceqniGCJG5y4hEEho">Daily Botnet Detection Live Streaming</a>.)<br />
detection period: 2024-02-23 00:00-23:59 UTC<br />
total number of suspected botnet IPs: 28824<br />
number of botnet IPs notified to network operators (best case, if all mail were sent out successfully): 26756<br />
number of spam blocked: 0<br />
recipient count of spam blocked: 0<br />
<br />
The top 10 networks (as found in WHOIS), ordered by the number of suspected botnet IPs are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable"><div class="nobrtable"><br />
</div><table border="1"><tbody>
<tr><th>Rank</th><th>Network</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>ACEVILLEPTELTD-SG</td><td align=right>2765</td></tr>
<tr><td>2</td><td>ALISOFT</td><td align=right>1417</td></tr>
<tr><td>3</td><td>TencentCloud</td><td align=right>1062</td></tr>
<tr><td>4</td><td>GOOGLE-CLOUD</td><td align=right>1051</td></tr>
<tr><td>5</td><td>ASEPL-SG</td><td align=right>746</td></tr>
<tr><td>6</td><td>TENCENT-CN</td><td align=right>620</td></tr>
<tr><td>7</td><td>DIGITALOCEAN-192-241-128-0</td><td align=right>596</td></tr>
<tr><td>8</td><td>PAN-22</td><td align=right>463</td></tr>
<tr><td>9</td><td>AL-3</td><td align=right>428</td></tr>
<tr><td>10</td><td>UCLOUD-HK</td><td align=right>413</td></tr>
</tbody></table><br /></div><br />
<div class="nobrtable">The top 10 countries (as defined by the 2-character country code), ordered by the number of suspected botnet IPs are:</div><div class="nobrtable"><style type="text/css">
.nobrtable br { display: none }
</style><br /><table border="1"><tbody>
<tr><th>Rank</th><th>Country/Region</th><th># of suspected botnet IPs</th></tr>
<tr><td>1</td><td>China</td><td align=right>7443</td></tr>
<tr><td>2</td><td>United States</td><td align=right>6883</td></tr>
<tr><td>3</td><td>Singapore</td><td align=right>3141</td></tr>
<tr><td>4</td><td>India</td><td align=right>1078</td></tr>
<tr><td>5</td><td>Hong Kong</td><td align=right>841</td></tr>
<tr><td>6</td><td>Brazil</td><td align=right>711</td></tr>
<tr><td>7</td><td>Russian Federation</td><td align=right>667</td></tr>
<tr><td>8</td><td>South Korea</td><td align=right>666</td></tr>
<tr><td>9</td><td>Viet Nam</td><td align=right>561</td></tr>
<tr><td>10</td><td>Japan</td><td align=right>486</td></tr>
</tbody></table>
</div>
<br />
The top 10 TCP ports, ordered by the number of connection attempts received are:<style type="text/css">
.nobrtable br { display: none }
</style><br />
<div class="nobrtable">
<br />
<table border="1"><tbody>
<tr><th>Rank</th><th>TCP port number</th><th># of connection attempts received</th></tr>
<tr><td>1</td><td align=right>6000</td><td align=right>53261</td></tr>
<tr><td>2</td><td align=right>5900</td><td align=right>47352</td></tr>
<tr><td>3</td><td align=right>8022</td><td align=right>36794</td></tr>
<tr><td>4</td><td align=right>22</td><td align=right>31409</td></tr>
<tr><td>5</td><td align=right>2205</td><td align=right>28975</td></tr>
<tr><td>6</td><td align=right>2201</td><td align=right>27444</td></tr>
<tr><td>7</td><td align=right>8422</td><td align=right>26320</td></tr>
<tr><td>8</td><td align=right>7</td><td align=right>23900</td></tr>
<tr><td>9</td><td align=right>2204</td><td align=right>21699</td></tr>
<tr><td>10</td><td align=right>2274</td><td align=right>21399</td></tr>
</tbody></table>
</div>
<div><br />
</div>20240224 Botnet Detection Live Streaming 200+ zombies detected)<br />
<iframe class="BLOG_video_class" allowfullscreen="" youtube-src-id="y6wr_ze_xvE" width="400" height="322" src="https://www.youtube.com/embed/y6wr_ze_xvE"></iframe>
<div class="blogger-post-footer">Copyright © 2009-2010 Chih-Cherng Chin</div>Chih-Cherng Chinhttp://www.blogger.com/profile/06399972457729354819noreply@blogger.com0