Threat Feed
http://49.51.43.12/v3/signin/identifier?amp%3Bfollowup=https%3A%2F%2Faccounts.google.com%2F&amp%3Bifkv=AQMjQ7QyROPzn0qaqnYvX4_aw7qH8RajahyDV4UI8mo2Mw7SaNi-z6QQG4MH4pDlzJ2gDPTt_nm2&amp%3Bpassive=1209600&continue=https%3A%2F%2Faccounts.google.com%2F&flowName=GlifWebSignIn&flowEntry=ServiceLogin&ifkv=AT1y2_Xy5k3r272R6OYOa8Kzbbfee1dXwLgqaUZxf1LWBBpfSEHsoGUPYRLYjuhUJ2n6WBUtj0tohA&dsh=S689925003%3A1776361923969616
2026-04-16T18:51:45.510
malicious
URL
Phishing
https://ipfs.io/ipfs/bafkreiavtkue6lwhv7zoaumq7sgt5yxhceaxtlqmdjcpui6oefwlvlymfa?eta=elia@dexia-privatebank.ch
2026-04-16T18:34:09.255
malicious
URL
Phishing
https://ipfs.io/ipfs/bafybeie5hpazwr52ynis54uybaxatvckjgcyrz4ephkrq23egkghbycsnm/#clange@karschcapital.com
2026-04-16T18:32:28.762
malicious
URL
Phishing
https://ipfs.io/ipfs/bafkreicdsa4qk3bzbznkro2dykqnqip2p74zugx7hvwakuqxafn24jpmfy#urs.lustenberger@lgpartner.ch
2026-04-16T18:32:16.020
malicious
URL
Phishing
SJQxao5VxJlPR2c6.exe
2026-04-16T18:24:34.024
malicious
Windows Exe (x86-32)
Spyware
On a daily basis the VMRay Labs Team collects a selected group of publicly available malware samples and runs them in our best-of-breed malware sandbox, VMRay Analyzer.