By searching for results, you agree with our Terms of service
Found 1 result for
+plugin:MysqlOpenPlugin -l9fp:"cf350410ecceb5fd293ef71dbafe3364bafe3364bafe3364bafe3364bafe3364" +asn:"16509" -country:"South Korea" -country:"Germany" +ip:"3.104.0.0/13" +l9fp:"cf350410ecceb5fd2a0cccfc25071a6eaa040a0d63ca5234b1769746dd9ac5d5"

Looking for more results ? Register a free account

Countries

  • India 1

Sources

  • MysqlOpenPlugin 1

Network

  • AMAZON-02 1

IP Ranges

  • 3.104.0.0/13 1

ASN: 16509
1 events in 0 days
Leak size: 7.9 MB
Open ports: 3306
Databases: 40, row count: 139416, size: 7.9 MB
Found table README_TO_RECOVER_GZ.README with 1 records
Found table mysql.columns_priv with 0 recor...
Ransom notes :

1I have backed up all your databases. To recover them you must pay 0.012 Bitcoin to this address: 12Qk6TpBWj3gLhUFavDQyaKSrh1i53cEte. Backup list: shopping-cart. After your payment email me at rdatabase.1829@onionmail.org with your server IP (3.110.129.27) and transaction ID. Emails without transaction ID will be ignored. 12Qk6TpBWj3gLhUFavDQyaKSrh1i53cEte 1I have backed up all your databases. To recover them you must pay 0.012 Bitcoin to this address: 12Qk6TpBWj3gLhUFavDQyaKSrh1i53cEte. Backup list: shopping-cart. After your payment email me at rdatabase.1829@onionmail.org with your server IP (3.110.129.27) and transaction ID. Emails without transaction ID will be ignored. 12Qk6TpBWj3gLhUFavDQyaKSrh1i53cEte