![]() ![]() of like VirusTotal, where users can upload executables (Linux only) and. If you're absolutely certain your app doesn't contain networking code, you should try something to track your internet traffic when running the program, and see if it actually contacts those IPs or is it just a problem with the VirusTotal sandbox.Īlthough this answer got quite long, my knowledge on the subject is no "better than average" and I only found my way here by doing a quick Google search with the IP. Ill upload a webshell and exploit CVE-2020-12640 in Roundcube to include it and. This means that when you download something from one of those companies, the file will be accessed from a server physically near you, resulting in a faster download speed.ĬyRadar on VirusTotal was the only provider which detected the IP as malicious, but some people have reported CyRadar to have an outdated SSL certificate ( ), but that's over a year ago and we're getting off track. It isnt public though, id say less than a percentage of Virustotals userbase has access to files you upload, nor would it be stuff like passwords or other sensitive info as they would never be stored in plainsight intentionally. Other companies use their services to distribute content on servers located all over the world. Assets 4 8 people reacted 6 1 3 5 SamuelTulach 0.1.7 1c06d5c Compare uploader-v1.0. If you want to download a portable version of the uploader, use releaseanycpu.zip, but keep in mind that you will have to manually download localization files. ![]() 23.216.147.64 belongs to a company called Akamai International BV/Akamai Technologies.Īkamai is a content delivery network (CDN) and cloud services provider. uploader-v1.0.155 If you are not sure what to download, please use setupanycpu.zip. I happened to run across the third IP while running VirusTotal myself, and decided to do look around the internet. ![]()
0 Comments
Leave a Reply. |