[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@abuse_ch abuse.chabuse.ch posts on X about hosted the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social topic influence hosted
Top posts by engagements in the last XX hours
"Mirai botnet #zerobot spreading through 172.86.123.179 (cloudzy ) Mirai botnet C2 domain: 0bot.qzz .io (Gandi SAS ) Mirai botnet C2 server: 140.233.190.96:69 (Internet Magnate ) Payload URLs: π Mirai malware sample: π€ More #Mirai IOCs are available on ThreatFox: π¦"
X Link 2025-12-04T06:57Z 36.2K followers, 4399 engagements
"Mirai campaign spreading through 213.209.143.85 (Railnet ) messing around with the victim's system iptables π€ Mirai botnet C2 domain: womp.datasurge .vip (NameCheap ) Mirai botnet C2 server: 176.65.148.57:6969 (Pfcloud ) Payload URL: π Mirai malware sample: π€ More #Mirai IOCs are available on ThreatFox: π¦"
X Link 2025-12-05T11:41Z 36.2K followers, 3557 engagements
"Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection Botnet Mirai C2 domains π‘: effeminate.fuckphillipthegerman .ru trap.fuckphillipthegerman .ru tranny.fuckphillipthegerman .ru Botnet Mirai C2 servers all hosted at FORTIS : 138.124.72.251:52896 138.124.69.154:60328 5.144.176.19:60328 Mirai #malware sample π€: Payload delivery host π: Releated IOCs π¦:"
X Link 2025-12-10T04:54Z 36.2K followers, 15.1K engagements
"Unknown malware using WebSockets for botnet command&control spreading through #ClickFix π±ClickFix - πVBS - βMSI Payload delivery host: Malware sample π€: Botnet C2 domains: π‘w2li .xyz π‘w2socks .xyz The same malware is also being spread by #Amadey pay-per-install (PPI): β‘"
X Link 2025-12-15T07:40Z 36.2K followers, 7725 engagements