Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Favicon | Title | Type | Available | Last Visit | Server Info | FQDN | |
|---|---|---|---|---|---|---|---|
|
|
HUNTERS INTERNATIONAL | No | 2026-04-28T07:24:10 |
hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion
|
|||
|
|
HUNTERS INTERNATIONAL | No | 2026-04-28T07:26:43 |
hunters33mmcwww7ek7q5ndahul6nmzmrsumfs6aenicbqon6mxfiqyd.onion
|
|||
|
|
HUNTERS INTERNATIONAL | No | 2026-04-28T07:29:15 |
hunters55atbdusuladzv7vzv6a423bkh6ksl2uftwrxyuarbzlfh7yd.onion
|
|||
|
|
Attention Required! | Cloudflare | No | 2026-05-11T21:15:42 |
huntersinternational.org
|
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Advanced IP Scanner
Advanced Port Scanner
|
|
|
|
|
|
|
RClone
WinSCP
|
| Execution | Persistence | Defense Evasion | Discovery | Command and Control | Impact |
|---|---|---|---|---|---|
| Native API | Boot or Logon Autostart Execution | Obfuscated Files or Information | Process Discovery | Application Layer Protocol | Data Encrypted for Impact |
| Shared Modules | Impair Defenses | System Information Discovery | Application Layer Protocol: Web Protocols | ||
| File and Directory Discovery |