| # | domain | network | attack type |
|---|
2025-11-06_12-10-10
The attacks attributed to noname057(16) primarily targeted websites in Belgium and Ukraine. Key sectors affected include energy, transportation, and government services. Notable targets include the Belgian energy company Elia, various Ukrainian municipal and governmental sites, and transportation hubs like the Port of Antwerp. The attacks highlight vulnerabilities in critical infrastructure and public services in these countries.AI generated25 targets are under attack, 1 new targets and 24 targets from previous attack
New Targets(1): www.teplo.od.ua
Targets from prev attack(24): www.elia.be, ac.dozvil-kiev.gov.ua, cabinet.teplo.od.ua, hbs-acc.economie.fgov.be, sso.letec.be, www.portofantwerpbruges.com, vostgok.com.ua, www.zeebruggeport.be, irisbox.irisnet.be, www.bti.sumy.ua, www.belgiantrain.be, www.rsz.be, cnap.gov.ua, www.liefkenshoektunnel.be, online.kyivcnap.gov.ua, fru-gkh.com, www.port.brussels, www.dieterengroup.com, www.saee.gov.ua, www.eliagroup.eu, www.letec.be, www.citydev.brussels, www.stib-mivb.be, nuclear.engie-electrabel.be
Dismissed Targets(0):
New Targets(1): www.teplo.od.ua
Targets from prev attack(24): www.elia.be, ac.dozvil-kiev.gov.ua, cabinet.teplo.od.ua, hbs-acc.economie.fgov.be, sso.letec.be, www.portofantwerpbruges.com, vostgok.com.ua, www.zeebruggeport.be, irisbox.irisnet.be, www.bti.sumy.ua, www.belgiantrain.be, www.rsz.be, cnap.gov.ua, www.liefkenshoektunnel.be, online.kyivcnap.gov.ua, fru-gkh.com, www.port.brussels, www.dieterengroup.com, www.saee.gov.ua, www.eliagroup.eu, www.letec.be, www.citydev.brussels, www.stib-mivb.be, nuclear.engie-electrabel.be
Dismissed Targets(0):
2025-11-06_11-05-19
The attacks attributed to noname057 primarily target sites in Belgium and Ukraine. Key sectors affected include transportation, government services, and energy. Notable targets include the ports of Zeebrugge and Antwerp, various government agencies in Ukraine, and major Belgian transportation services like STIB and Belgian Train.AI generated24 targets are under attack, 8 new targets and 16 targets from previous attack
New Targets(8): fru-gkh.com, online.kyivcnap.gov.ua, cnap.gov.ua, vostgok.com.ua, cabinet.teplo.od.ua, www.bti.sumy.ua, www.saee.gov.ua, ac.dozvil-kiev.gov.ua
Targets from prev attack(16): www.zeebruggeport.be, hbs-acc.economie.fgov.be, sso.letec.be, irisbox.irisnet.be, www.liefkenshoektunnel.be, www.rsz.be, www.letec.be, www.belgiantrain.be, www.dieterengroup.com, www.stib-mivb.be, www.citydev.brussels, www.port.brussels, www.portofantwerpbruges.com, www.eliagroup.eu, www.elia.be, nuclear.engie-electrabel.be
Dismissed Targets(0):
New Targets(8): fru-gkh.com, online.kyivcnap.gov.ua, cnap.gov.ua, vostgok.com.ua, cabinet.teplo.od.ua, www.bti.sumy.ua, www.saee.gov.ua, ac.dozvil-kiev.gov.ua
Targets from prev attack(16): www.zeebruggeport.be, hbs-acc.economie.fgov.be, sso.letec.be, irisbox.irisnet.be, www.liefkenshoektunnel.be, www.rsz.be, www.letec.be, www.belgiantrain.be, www.dieterengroup.com, www.stib-mivb.be, www.citydev.brussels, www.port.brussels, www.portofantwerpbruges.com, www.eliagroup.eu, www.elia.be, nuclear.engie-electrabel.be
Dismissed Targets(0):
2025-11-06_07-20-08
The attacks attributed to noname057 primarily targeted websites in Belgium. Notable sectors affected include transportation, energy, and government services, with sites such as the Belgian Train, Elia, and various port authorities being compromised.AI generated16 targets are under attack, 16 new targets and 0 targets from previous attack
New Targets(16): www.liefkenshoektunnel.be, www.portofantwerpbruges.com, www.dieterengroup.com, www.elia.be, www.rsz.be, hbs-acc.economie.fgov.be, www.port.brussels, www.zeebruggeport.be, irisbox.irisnet.be, nuclear.engie-electrabel.be, www.belgiantrain.be, www.eliagroup.eu, sso.letec.be, www.stib-mivb.be, www.citydev.brussels, www.letec.be
Targets from prev attack(0):
Dismissed Targets(18): www.amel.be, www.st.vith.be, www.cpbourg.com, www.flobecq.be, www.eupen.be, www.autokraz.com.ua, www.automatic-systems.com, www.materials.kiev.ua, www.raeren.be, www.ferrexpo.ua, www.villedecomines-warneton.be, buellingen.be, www.proximus.com, www.krruda.dp.ua, www.malmedy.be, temp3000.com, lontzen.be, www.mouscron.be
New Targets(16): www.liefkenshoektunnel.be, www.portofantwerpbruges.com, www.dieterengroup.com, www.elia.be, www.rsz.be, hbs-acc.economie.fgov.be, www.port.brussels, www.zeebruggeport.be, irisbox.irisnet.be, nuclear.engie-electrabel.be, www.belgiantrain.be, www.eliagroup.eu, sso.letec.be, www.stib-mivb.be, www.citydev.brussels, www.letec.be
Targets from prev attack(0):
Dismissed Targets(18): www.amel.be, www.st.vith.be, www.cpbourg.com, www.flobecq.be, www.eupen.be, www.autokraz.com.ua, www.automatic-systems.com, www.materials.kiev.ua, www.raeren.be, www.ferrexpo.ua, www.villedecomines-warneton.be, buellingen.be, www.proximus.com, www.krruda.dp.ua, www.malmedy.be, temp3000.com, lontzen.be, www.mouscron.be
2025-11-06_06-20-09
Noname057(16) has targeted various websites primarily in Belgium and Ukraine. The attacks include sites such as buellingen.be, malmedy.be, and st.vith.be from Belgium, as well as autokraz.com.ua, ferrexpo.ua, and materials.kiev.ua from Ukraine. Other affected sites include those from companies like Proximus and Automatic Systems, indicating a diverse range of sectors under threat.AI generated18 targets are under attack, 0 new targets and 18 targets from previous attack
New Targets(0):
Targets from prev attack(18): buellingen.be, www.autokraz.com.ua, www.automatic-systems.com, www.raeren.be, www.ferrexpo.ua, www.proximus.com, www.cpbourg.com, lontzen.be, www.amel.be, www.eupen.be, www.krruda.dp.ua, temp3000.com, www.materials.kiev.ua, www.mouscron.be, www.flobecq.be, www.st.vith.be, www.malmedy.be, www.villedecomines-warneton.be
Dismissed Targets(3): www2.telenet.be, login.prd.telenet.be, www.scarlet.be
New Targets(0):
Targets from prev attack(18): buellingen.be, www.autokraz.com.ua, www.automatic-systems.com, www.raeren.be, www.ferrexpo.ua, www.proximus.com, www.cpbourg.com, lontzen.be, www.amel.be, www.eupen.be, www.krruda.dp.ua, temp3000.com, www.materials.kiev.ua, www.mouscron.be, www.flobecq.be, www.st.vith.be, www.malmedy.be, www.villedecomines-warneton.be
Dismissed Targets(3): www2.telenet.be, login.prd.telenet.be, www.scarlet.be
2025-11-05_12-05-11
Noname057(16) has targeted various websites primarily in Belgium and Ukraine. The main countries under attack include Belgium, with numerous local sites such as st.vith.be, eupen.be, and mouscron.be, as well as Ukraine, featuring sites like autokraz.com.ua and ferrexpo.ua. Other notable targets include the international company automatic-systems.com and telecommunications providers like telenet.be and proximus.com.AI generated21 targets are under attack, 5 new targets and 16 targets from previous attack
New Targets(5): www.autokraz.com.ua, www.krruda.dp.ua, www.ferrexpo.ua, temp3000.com, www.materials.kiev.ua
Targets from prev attack(16): www.st.vith.be, buellingen.be, www.malmedy.be, www.raeren.be, www.villedecomines-warneton.be, www.amel.be, www.mouscron.be, www.eupen.be, www.flobecq.be, www.scarlet.be, www2.telenet.be, www.automatic-systems.com, login.prd.telenet.be, www.proximus.com, lontzen.be, www.cpbourg.com
Dismissed Targets(0):
New Targets(5): www.autokraz.com.ua, www.krruda.dp.ua, www.ferrexpo.ua, temp3000.com, www.materials.kiev.ua
Targets from prev attack(16): www.st.vith.be, buellingen.be, www.malmedy.be, www.raeren.be, www.villedecomines-warneton.be, www.amel.be, www.mouscron.be, www.eupen.be, www.flobecq.be, www.scarlet.be, www2.telenet.be, www.automatic-systems.com, login.prd.telenet.be, www.proximus.com, lontzen.be, www.cpbourg.com
Dismissed Targets(0):
2025-11-05_08-00-11
The attack by noname057(16) primarily targeted websites in Belgium. Notable victims include various local government sites such as those from Malmedy, St. Vith, and Mouscron, as well as major companies like Proximus and Automatic Systems. The attack reflects a concentrated effort against Belgian entities, affecting both public and private sectors.AI generated16 targets are under attack, 2 new targets and 14 targets from previous attack
New Targets(2): buellingen.be, www.cpbourg.com
Targets from prev attack(14): www.automatic-systems.com, www.scarlet.be, www.villedecomines-warneton.be, www.malmedy.be, www.proximus.com, www.st.vith.be, www.raeren.be, lontzen.be, www.mouscron.be, www.eupen.be, www.flobecq.be, www.amel.be, login.prd.telenet.be, www2.telenet.be
Dismissed Targets(0):
New Targets(2): buellingen.be, www.cpbourg.com
Targets from prev attack(14): www.automatic-systems.com, www.scarlet.be, www.villedecomines-warneton.be, www.malmedy.be, www.proximus.com, www.st.vith.be, www.raeren.be, lontzen.be, www.mouscron.be, www.eupen.be, www.flobecq.be, www.amel.be, login.prd.telenet.be, www2.telenet.be
Dismissed Targets(0):
2025-11-05_07-40-10
Noname057(16) has targeted several websites primarily in Belgium. The attacked sites include local government and service provider platforms, such as www.flobecq.be, lontzen.be, and www.proximus.com. Other notable targets are municipal sites like www.mouscron.be and www.villedecomines-warneton.be, as well as telecommunications services like www.telenet.be and www.scarlet.be. The attacks highlight a focus on Belgian entities across various sectors.AI generated14 targets are under attack, 0 new targets and 14 targets from previous attack
New Targets(0):
Targets from prev attack(14): www.flobecq.be, lontzen.be, www.proximus.com, www.mouscron.be, www.scarlet.be, www.raeren.be, www2.telenet.be, www.villedecomines-warneton.be, login.prd.telenet.be, www.malmedy.be, www.eupen.be, www.amel.be, www.automatic-systems.com, www.st.vith.be
Dismissed Targets(0):
New Targets(0):
Targets from prev attack(14): www.flobecq.be, lontzen.be, www.proximus.com, www.mouscron.be, www.scarlet.be, www.raeren.be, www2.telenet.be, www.villedecomines-warneton.be, login.prd.telenet.be, www.malmedy.be, www.eupen.be, www.amel.be, www.automatic-systems.com, www.st.vith.be
Dismissed Targets(0):
2025-11-05_07-20-11
Noname057(16) has targeted various websites primarily in Belgium. The attacked sites include local government and service provider platforms, such as www.malmedy.be, www.scarlet.be, and www.proximus.com. Other affected areas include Eupen, Lontzen, and Mouscron, indicating a focus on regional entities and telecommunications services.AI generated14 targets are under attack, 14 new targets and 0 targets from previous attack
New Targets(14): www.malmedy.be, login.prd.telenet.be, www.scarlet.be, www.flobecq.be, www.automatic-systems.com, lontzen.be, www2.telenet.be, www.amel.be, www.villedecomines-warneton.be, www.st.vith.be, www.proximus.com, www.raeren.be, www.eupen.be, www.mouscron.be
Targets from prev attack(0):
Dismissed Targets(27): authentication.antwerpen.be, www.waimes.be, loga.gov.ua, www.vmr.gov.ua, www.antwerpen.be, mariupolrada.gov.ua, www.burg-reuland.be, wallex.wallonie.be, adm.dp.gov.ua, www.hainaut.be, www.limburg.be, www.wallonie.be, www.province.namur.be, elections.brussels, smr.gov.ua, www.rada-poltava.gov.ua, www.provincieantwerpen.be, www.brabantwallon.be, rada-poltava.gov.ua, www.sint-genesius-rode.be, www.provincedeliege.be, www.kelmis.be, gouvernement.cfwb.be, www.vlaamsbrabant.be, www.oost-vlaanderen.be, www.province.luxembourg.be, zp.gov.ua
New Targets(14): www.malmedy.be, login.prd.telenet.be, www.scarlet.be, www.flobecq.be, www.automatic-systems.com, lontzen.be, www2.telenet.be, www.amel.be, www.villedecomines-warneton.be, www.st.vith.be, www.proximus.com, www.raeren.be, www.eupen.be, www.mouscron.be
Targets from prev attack(0):
Dismissed Targets(27): authentication.antwerpen.be, www.waimes.be, loga.gov.ua, www.vmr.gov.ua, www.antwerpen.be, mariupolrada.gov.ua, www.burg-reuland.be, wallex.wallonie.be, adm.dp.gov.ua, www.hainaut.be, www.limburg.be, www.wallonie.be, www.province.namur.be, elections.brussels, smr.gov.ua, www.rada-poltava.gov.ua, www.provincieantwerpen.be, www.brabantwallon.be, rada-poltava.gov.ua, www.sint-genesius-rode.be, www.provincedeliege.be, www.kelmis.be, gouvernement.cfwb.be, www.vlaamsbrabant.be, www.oost-vlaanderen.be, www.province.luxembourg.be, zp.gov.ua
2025-11-05_07-05-09
The attacks attributed to noname057 primarily target websites in Ukraine and Belgium. Key Ukrainian sites include government portals such as mariupolrada.gov.ua and rada-poltava.gov.ua. In Belgium, various regional and municipal websites are affected, including those from provinces like Vlaams Brabant, Hainaut, and Namur, as well as the city of Antwerp.AI generated27 targets are under attack, 8 new targets and 19 targets from previous attack
New Targets(8): mariupolrada.gov.ua, loga.gov.ua, adm.dp.gov.ua, rada-poltava.gov.ua, www.rada-poltava.gov.ua, www.vmr.gov.ua, smr.gov.ua, zp.gov.ua
Targets from prev attack(19): www.vlaamsbrabant.be, www.burg-reuland.be, www.waimes.be, www.oost-vlaanderen.be, authentication.antwerpen.be, elections.brussels, www.antwerpen.be, www.provincieantwerpen.be, www.limburg.be, www.wallonie.be, www.provincedeliege.be, www.kelmis.be, wallex.wallonie.be, gouvernement.cfwb.be, www.province.namur.be, www.sint-genesius-rode.be, www.hainaut.be, www.brabantwallon.be, www.province.luxembourg.be
Dismissed Targets(0):
New Targets(8): mariupolrada.gov.ua, loga.gov.ua, adm.dp.gov.ua, rada-poltava.gov.ua, www.rada-poltava.gov.ua, www.vmr.gov.ua, smr.gov.ua, zp.gov.ua
Targets from prev attack(19): www.vlaamsbrabant.be, www.burg-reuland.be, www.waimes.be, www.oost-vlaanderen.be, authentication.antwerpen.be, elections.brussels, www.antwerpen.be, www.provincieantwerpen.be, www.limburg.be, www.wallonie.be, www.provincedeliege.be, www.kelmis.be, wallex.wallonie.be, gouvernement.cfwb.be, www.province.namur.be, www.sint-genesius-rode.be, www.hainaut.be, www.brabantwallon.be, www.province.luxembourg.be
Dismissed Targets(0):
2025-11-04_07-20-11
The attacks by noname057 primarily targeted websites in Belgium, affecting various municipalities and provincial governments. Key regions under attack include Antwerp, Liège, Walloon Brabant, Brussels, and Namur, with numerous local government sites compromised.AI generated19 targets are under attack, 19 new targets and 0 targets from previous attack
New Targets(19): www.burg-reuland.be, www.sint-genesius-rode.be, www.antwerpen.be, www.provincieantwerpen.be, www.provincedeliege.be, www.brabantwallon.be, elections.brussels, authentication.antwerpen.be, www.wallonie.be, www.waimes.be, www.vlaamsbrabant.be, www.kelmis.be, www.oost-vlaanderen.be, www.hainaut.be, www.province.luxembourg.be, wallex.wallonie.be, gouvernement.cfwb.be, www.limburg.be, www.province.namur.be
Targets from prev attack(0):
Dismissed Targets(27): www.beci.be, www.eeri.eu, diplomatie.belgium.be, www.citydev.brussels, www.smart-met.eu, akt-ccilb.be, komtrans.rada.gov.ua, komnbor.rada.gov.ua, www.vivaqua.be, www.brupartners.brussels, www.serv.be, www.cermi.eu, www.ccecrb.fgov.be, www.akt-ccibw.be, kompravpol.rada.gov.ua, komsamovr.rada.gov.ua, www.ciriec.uliege.be, kompek.rada.gov.ua, www.cesewallonie.be, courrier.parlement-wallon.be, kompravlud.rada.gov.ua, www.belfius.be, www.bever-bievene.be, www.federation-wallonie-bruxelles.be, komfinbank.rada.gov.ua, komzakonpr.rada.gov.ua, www.drogenbos.be
New Targets(19): www.burg-reuland.be, www.sint-genesius-rode.be, www.antwerpen.be, www.provincieantwerpen.be, www.provincedeliege.be, www.brabantwallon.be, elections.brussels, authentication.antwerpen.be, www.wallonie.be, www.waimes.be, www.vlaamsbrabant.be, www.kelmis.be, www.oost-vlaanderen.be, www.hainaut.be, www.province.luxembourg.be, wallex.wallonie.be, gouvernement.cfwb.be, www.limburg.be, www.province.namur.be
Targets from prev attack(0):
Dismissed Targets(27): www.beci.be, www.eeri.eu, diplomatie.belgium.be, www.citydev.brussels, www.smart-met.eu, akt-ccilb.be, komtrans.rada.gov.ua, komnbor.rada.gov.ua, www.vivaqua.be, www.brupartners.brussels, www.serv.be, www.cermi.eu, www.ccecrb.fgov.be, www.akt-ccibw.be, kompravpol.rada.gov.ua, komsamovr.rada.gov.ua, www.ciriec.uliege.be, kompek.rada.gov.ua, www.cesewallonie.be, courrier.parlement-wallon.be, kompravlud.rada.gov.ua, www.belfius.be, www.bever-bievene.be, www.federation-wallonie-bruxelles.be, komfinbank.rada.gov.ua, komzakonpr.rada.gov.ua, www.drogenbos.be
2025-11-03_07-10-09
Noname057(16) has primarily targeted websites in Ukraine and Belgium. The attacks include various government and institutional sites, such as those belonging to the Ukrainian parliament and Belgian local authorities. The focus appears to be on disrupting services and gathering intelligence from these regions.AI generated27 targets are under attack, 27 new targets and 0 targets from previous attack
New Targets(27): komsamovr.rada.gov.ua, www.akt-ccibw.be, www.ccecrb.fgov.be, www.smart-met.eu, kompravlud.rada.gov.ua, www.cermi.eu, kompravpol.rada.gov.ua, www.eeri.eu, courrier.parlement-wallon.be, komnbor.rada.gov.ua, www.vivaqua.be, kompek.rada.gov.ua, www.brupartners.brussels, www.belfius.be, www.serv.be, www.cesewallonie.be, www.ciriec.uliege.be, komfinbank.rada.gov.ua, diplomatie.belgium.be, www.citydev.brussels, akt-ccilb.be, www.bever-bievene.be, www.federation-wallonie-bruxelles.be, komzakonpr.rada.gov.ua, komtrans.rada.gov.ua, www.beci.be, www.drogenbos.be
Targets from prev attack(0):
Dismissed Targets(22): www.acquanovaravco.eu, cpanel.vulcanair.com, www.gruppoa2a.it, www.regione.piemonte.it, sso.comune.palermo.it, www.sinfomar.it, www.porto.trieste.it, www.lavoro.gov.it, w3.ars.sicilia.it, www.portsofnapa.com, be.brussels, www.regione.emilia-romagna.it, assistenza.adm.gov.it, support.vulcanair.com, www.amat.pa.it, www.uilpa.it, www.olbiagolfoaranci.it, richiestamodifiche.adm.gov.it, www.italytenders.com, www.portialtotirreno.it, shop.vulcanair.com, www.globaltenders.com
New Targets(27): komsamovr.rada.gov.ua, www.akt-ccibw.be, www.ccecrb.fgov.be, www.smart-met.eu, kompravlud.rada.gov.ua, www.cermi.eu, kompravpol.rada.gov.ua, www.eeri.eu, courrier.parlement-wallon.be, komnbor.rada.gov.ua, www.vivaqua.be, kompek.rada.gov.ua, www.brupartners.brussels, www.belfius.be, www.serv.be, www.cesewallonie.be, www.ciriec.uliege.be, komfinbank.rada.gov.ua, diplomatie.belgium.be, www.citydev.brussels, akt-ccilb.be, www.bever-bievene.be, www.federation-wallonie-bruxelles.be, komzakonpr.rada.gov.ua, komtrans.rada.gov.ua, www.beci.be, www.drogenbos.be
Targets from prev attack(0):
Dismissed Targets(22): www.acquanovaravco.eu, cpanel.vulcanair.com, www.gruppoa2a.it, www.regione.piemonte.it, sso.comune.palermo.it, www.sinfomar.it, www.porto.trieste.it, www.lavoro.gov.it, w3.ars.sicilia.it, www.portsofnapa.com, be.brussels, www.regione.emilia-romagna.it, assistenza.adm.gov.it, support.vulcanair.com, www.amat.pa.it, www.uilpa.it, www.olbiagolfoaranci.it, richiestamodifiche.adm.gov.it, www.italytenders.com, www.portialtotirreno.it, shop.vulcanair.com, www.globaltenders.com
2025-11-02_07-15-10
Noname057(16) has targeted various websites primarily located in Italy. The attacks include government sites, regional portals, and private companies, indicating a focus on both public and private sectors. Key regions under attack include Sicily, Emilia-Romagna, and Friuli Venezia Giulia, with notable targets such as local government services and tender platforms.AI generated22 targets are under attack, 22 new targets and 0 targets from previous attack
New Targets(22): cpanel.vulcanair.com, www.porto.trieste.it, www.portsofnapa.com, assistenza.adm.gov.it, www.lavoro.gov.it, www.acquanovaravco.eu, www.sinfomar.it, www.italytenders.com, www.globaltenders.com, sso.comune.palermo.it, w3.ars.sicilia.it, www.regione.piemonte.it, www.gruppoa2a.it, shop.vulcanair.com, www.portialtotirreno.it, www.regione.emilia-romagna.it, www.olbiagolfoaranci.it, www.uilpa.it, support.vulcanair.com, richiestamodifiche.adm.gov.it, be.brussels, www.amat.pa.it
Targets from prev attack(0):
Dismissed Targets(20): www.coopvoce.it, www.consiglio.vda.it, www.regione.lazio.it, www.tessellis.it, www.aeronautica.difesa.it, connessioneinfibra.it, ntcitalia.it, mail.tiscali.it, assistenza.tiscali.it, www.serviziocontrattipubblici.it, www.comune.parma.it, www.mit.gov.it, www.comune.giugliano.na.it, www.herabit.com, hostingdomini.tiscali.it, casa.tiscali.it, www.municipio.re.it, pro-q.it, www.tiscali.it, www.comune.potenza.it
New Targets(22): cpanel.vulcanair.com, www.porto.trieste.it, www.portsofnapa.com, assistenza.adm.gov.it, www.lavoro.gov.it, www.acquanovaravco.eu, www.sinfomar.it, www.italytenders.com, www.globaltenders.com, sso.comune.palermo.it, w3.ars.sicilia.it, www.regione.piemonte.it, www.gruppoa2a.it, shop.vulcanair.com, www.portialtotirreno.it, www.regione.emilia-romagna.it, www.olbiagolfoaranci.it, www.uilpa.it, support.vulcanair.com, richiestamodifiche.adm.gov.it, be.brussels, www.amat.pa.it
Targets from prev attack(0):
Dismissed Targets(20): www.coopvoce.it, www.consiglio.vda.it, www.regione.lazio.it, www.tessellis.it, www.aeronautica.difesa.it, connessioneinfibra.it, ntcitalia.it, mail.tiscali.it, assistenza.tiscali.it, www.serviziocontrattipubblici.it, www.comune.parma.it, www.mit.gov.it, www.comune.giugliano.na.it, www.herabit.com, hostingdomini.tiscali.it, casa.tiscali.it, www.municipio.re.it, pro-q.it, www.tiscali.it, www.comune.potenza.it
2025-11-01_07-10-09
The attacks attributed to noname057 primarily targeted websites in Italy. Affected sectors include government institutions, local municipalities, telecommunications, and public services. Key countries under attack include Italy, with a focus on regions such as Lazio and municipalities like Parma and Potenza.AI generated20 targets are under attack, 20 new targets and 0 targets from previous attack
New Targets(20): pro-q.it, www.tessellis.it, www.coopvoce.it, www.comune.parma.it, www.mit.gov.it, assistenza.tiscali.it, casa.tiscali.it, connessioneinfibra.it, www.consiglio.vda.it, www.regione.lazio.it, www.tiscali.it, www.comune.potenza.it, mail.tiscali.it, www.comune.giugliano.na.it, www.aeronautica.difesa.it, www.municipio.re.it, hostingdomini.tiscali.it, www.herabit.com, ntcitalia.it, www.serviziocontrattipubblici.it
Targets from prev attack(0):
Dismissed Targets(18): www.mef.gov.it, kniazha.ua, home.l4.ua, siac.difesa.it, www.portsofgenoa.com, www.spid.gov.it, x-city.ua, www.acquacampania.com, stdru.adm.gov.it, www.sad.it, megaprostir.net, l4.ua, www.kd-life.com.ua, telematicoprova.adm.gov.it, www.shtorm.net, www.kvorum.com.ua, telematico.adm.gov.it, www.portidiroma.it
New Targets(20): pro-q.it, www.tessellis.it, www.coopvoce.it, www.comune.parma.it, www.mit.gov.it, assistenza.tiscali.it, casa.tiscali.it, connessioneinfibra.it, www.consiglio.vda.it, www.regione.lazio.it, www.tiscali.it, www.comune.potenza.it, mail.tiscali.it, www.comune.giugliano.na.it, www.aeronautica.difesa.it, www.municipio.re.it, hostingdomini.tiscali.it, www.herabit.com, ntcitalia.it, www.serviziocontrattipubblici.it
Targets from prev attack(0):
Dismissed Targets(18): www.mef.gov.it, kniazha.ua, home.l4.ua, siac.difesa.it, www.portsofgenoa.com, www.spid.gov.it, x-city.ua, www.acquacampania.com, stdru.adm.gov.it, www.sad.it, megaprostir.net, l4.ua, www.kd-life.com.ua, telematicoprova.adm.gov.it, www.shtorm.net, www.kvorum.com.ua, telematico.adm.gov.it, www.portidiroma.it
2025-10-31_20-55-10
Noname057(16) has targeted various websites primarily in Italy and Ukraine. Key attacked sites include the Italian Ministry of Economy and Finance, the Italian Defense Ministry, and several Ukrainian government and infrastructure websites. The attacks indicate a focus on both governmental and essential service sectors in these countries.AI generated18 targets are under attack, 0 new targets and 18 targets from previous attack
New Targets(0):
Targets from prev attack(18): www.mef.gov.it, www.spid.gov.it, kniazha.ua, home.l4.ua, siac.difesa.it, www.portsofgenoa.com, stdru.adm.gov.it, x-city.ua, telematicoprova.adm.gov.it, megaprostir.net, www.shtorm.net, www.portidiroma.it, www.acquacampania.com, l4.ua, telematico.adm.gov.it, www.sad.it, www.kvorum.com.ua, www.kd-life.com.ua
Dismissed Targets(11): www.lavoro.gov.it, richiestamodifiche.adm.gov.it, www.porto.trieste.it, www.portialtotirreno.it, support.vulcanair.com, www.gruppoa2a.it, assistenza.adm.gov.it, www.amat.pa.it, cpanel.vulcanair.com, www.acquanovaravco.eu, shop.vulcanair.com
New Targets(0):
Targets from prev attack(18): www.mef.gov.it, www.spid.gov.it, kniazha.ua, home.l4.ua, siac.difesa.it, www.portsofgenoa.com, stdru.adm.gov.it, x-city.ua, telematicoprova.adm.gov.it, megaprostir.net, www.shtorm.net, www.portidiroma.it, www.acquacampania.com, l4.ua, telematico.adm.gov.it, www.sad.it, www.kvorum.com.ua, www.kd-life.com.ua
Dismissed Targets(11): www.lavoro.gov.it, richiestamodifiche.adm.gov.it, www.porto.trieste.it, www.portialtotirreno.it, support.vulcanair.com, www.gruppoa2a.it, assistenza.adm.gov.it, www.amat.pa.it, cpanel.vulcanair.com, www.acquanovaravco.eu, shop.vulcanair.com
2025-10-31_12-10-11
Noname057(16) has targeted various websites primarily in Italy and Ukraine. The attacks have affected government sites, utility companies, and other organizations. Key countries under attack include Italy, with sites like lavoro.gov.it and mef.gov.it, and Ukraine, with sites such as l4.ua and kniazha.ua. The attacks highlight a focus on critical infrastructure and public services in these regions.AI generated29 targets are under attack, 8 new targets and 21 targets from previous attack
New Targets(8): www.kvorum.com.ua, l4.ua, www.kd-life.com.ua, megaprostir.net, kniazha.ua, x-city.ua, www.shtorm.net, home.l4.ua
Targets from prev attack(21): shop.vulcanair.com, www.acquanovaravco.eu, www.lavoro.gov.it, www.acquacampania.com, cpanel.vulcanair.com, richiestamodifiche.adm.gov.it, www.mef.gov.it, www.portidiroma.it, telematico.adm.gov.it, www.gruppoa2a.it, www.spid.gov.it, telematicoprova.adm.gov.it, stdru.adm.gov.it, siac.difesa.it, assistenza.adm.gov.it, www.sad.it, www.portialtotirreno.it, www.amat.pa.it, www.porto.trieste.it, support.vulcanair.com, www.portsofgenoa.com
Dismissed Targets(0):
New Targets(8): www.kvorum.com.ua, l4.ua, www.kd-life.com.ua, megaprostir.net, kniazha.ua, x-city.ua, www.shtorm.net, home.l4.ua
Targets from prev attack(21): shop.vulcanair.com, www.acquanovaravco.eu, www.lavoro.gov.it, www.acquacampania.com, cpanel.vulcanair.com, richiestamodifiche.adm.gov.it, www.mef.gov.it, www.portidiroma.it, telematico.adm.gov.it, www.gruppoa2a.it, www.spid.gov.it, telematicoprova.adm.gov.it, stdru.adm.gov.it, siac.difesa.it, assistenza.adm.gov.it, www.sad.it, www.portialtotirreno.it, www.amat.pa.it, www.porto.trieste.it, support.vulcanair.com, www.portsofgenoa.com
Dismissed Targets(0):
2025-10-31_07-20-27
Noname057(16) has targeted various websites primarily in Italy, including government and municipal sites. Key sectors under attack include transportation, public administration, and utilities. Notable attacked sites are associated with agencies like the Ministry of Economy and Finance and local ports, indicating a focus on critical infrastructure within the country.AI generated21 targets are under attack, 21 new targets and 0 targets from previous attack
New Targets(21): cpanel.vulcanair.com, telematicoprova.adm.gov.it, richiestamodifiche.adm.gov.it, support.vulcanair.com, www.porto.trieste.it, www.amat.pa.it, www.acquanovaravco.eu, www.portidiroma.it, telematico.adm.gov.it, www.mef.gov.it, www.sad.it, assistenza.adm.gov.it, stdru.adm.gov.it, www.portialtotirreno.it, www.lavoro.gov.it, siac.difesa.it, www.spid.gov.it, www.acquacampania.com, www.gruppoa2a.it, www.portsofgenoa.com, shop.vulcanair.com
Targets from prev attack(0):
Dismissed Targets(24): www.portoditriesteservizi.it, www.portsofnapa.com, o3.ua, www.cittametropolitana.ct.it, stat.uar.net, www.acqualatina.it, homenet.ua, www.port.ravenna.it, best.net.ua, sso.comune.palermo.it, www.marina.difesa.it, my.homenet.ua, www.arst.sardegna.it, w3.ars.sicilia.it, uar.net, www.lanet.ua, www.olbiagolfoaranci.it, my.o3.ua, www.porto.ancona.it, www.agenziatplbergamo.it, www.atb.bergamo.it, www.agenziaindustriedifesa.it, www.sinfomar.it, www.comune.novara.it
New Targets(21): cpanel.vulcanair.com, telematicoprova.adm.gov.it, richiestamodifiche.adm.gov.it, support.vulcanair.com, www.porto.trieste.it, www.amat.pa.it, www.acquanovaravco.eu, www.portidiroma.it, telematico.adm.gov.it, www.mef.gov.it, www.sad.it, assistenza.adm.gov.it, stdru.adm.gov.it, www.portialtotirreno.it, www.lavoro.gov.it, siac.difesa.it, www.spid.gov.it, www.acquacampania.com, www.gruppoa2a.it, www.portsofgenoa.com, shop.vulcanair.com
Targets from prev attack(0):
Dismissed Targets(24): www.portoditriesteservizi.it, www.portsofnapa.com, o3.ua, www.cittametropolitana.ct.it, stat.uar.net, www.acqualatina.it, homenet.ua, www.port.ravenna.it, best.net.ua, sso.comune.palermo.it, www.marina.difesa.it, my.homenet.ua, www.arst.sardegna.it, w3.ars.sicilia.it, uar.net, www.lanet.ua, www.olbiagolfoaranci.it, my.o3.ua, www.porto.ancona.it, www.agenziatplbergamo.it, www.atb.bergamo.it, www.agenziaindustriedifesa.it, www.sinfomar.it, www.comune.novara.it
2025-10-30_12-05-12
The attacks by noname057(16) primarily targeted websites in Italy and Ukraine. Key sectors affected include local government services, transportation, and defense. Notable cities under attack include Ancona, Palermo, Ravenna, and Novara in Italy, along with various regions in Ukraine. The incidents highlight vulnerabilities in critical infrastructure and public services in these countries.AI generated24 targets are under attack, 8 new targets and 16 targets from previous attack
New Targets(8): uar.net, o3.ua, homenet.ua, www.lanet.ua, best.net.ua, stat.uar.net, my.o3.ua, my.homenet.ua
Targets from prev attack(16): www.olbiagolfoaranci.it, www.arst.sardegna.it, www.atb.bergamo.it, www.comune.novara.it, www.agenziatplbergamo.it, www.sinfomar.it, www.porto.ancona.it, sso.comune.palermo.it, www.acqualatina.it, www.portoditriesteservizi.it, www.port.ravenna.it, www.cittametropolitana.ct.it, w3.ars.sicilia.it, www.portsofnapa.com, www.agenziaindustriedifesa.it, www.marina.difesa.it
Dismissed Targets(0):
New Targets(8): uar.net, o3.ua, homenet.ua, www.lanet.ua, best.net.ua, stat.uar.net, my.o3.ua, my.homenet.ua
Targets from prev attack(16): www.olbiagolfoaranci.it, www.arst.sardegna.it, www.atb.bergamo.it, www.comune.novara.it, www.agenziatplbergamo.it, www.sinfomar.it, www.porto.ancona.it, sso.comune.palermo.it, www.acqualatina.it, www.portoditriesteservizi.it, www.port.ravenna.it, www.cittametropolitana.ct.it, w3.ars.sicilia.it, www.portsofnapa.com, www.agenziaindustriedifesa.it, www.marina.difesa.it
Dismissed Targets(0):
2025-10-30_07-40-10
The attacks by noname057(16) primarily targeted websites in Italy, affecting various sectors including local government, transportation, and defense. Key cities under attack include Bergamo, Palermo, Novara, Ravenna, Trieste, and Ancona, highlighting a significant focus on regional and municipal services.AI generated16 targets are under attack, 0 new targets and 16 targets from previous attack
New Targets(0):
Targets from prev attack(16): www.atb.bergamo.it, www.sinfomar.it, www.agenziaindustriedifesa.it, w3.ars.sicilia.it, www.porto.ancona.it, sso.comune.palermo.it, www.comune.novara.it, www.port.ravenna.it, www.portsofnapa.com, www.acqualatina.it, www.marina.difesa.it, www.cittametropolitana.ct.it, www.portoditriesteservizi.it, www.olbiagolfoaranci.it, www.arst.sardegna.it, www.agenziatplbergamo.it
Dismissed Targets(0):
New Targets(0):
Targets from prev attack(16): www.atb.bergamo.it, www.sinfomar.it, www.agenziaindustriedifesa.it, w3.ars.sicilia.it, www.porto.ancona.it, sso.comune.palermo.it, www.comune.novara.it, www.port.ravenna.it, www.portsofnapa.com, www.acqualatina.it, www.marina.difesa.it, www.cittametropolitana.ct.it, www.portoditriesteservizi.it, www.olbiagolfoaranci.it, www.arst.sardegna.it, www.agenziatplbergamo.it
Dismissed Targets(0):
2025-10-30_07-20-08
The attacks attributed to noname057 primarily targeted websites in Italy, including government and municipal services, transportation agencies, and defense-related sites. Key affected regions include the Italian Navy, various municipalities like Novara and Palermo, and transportation services in Bergamo and Sardinia. The attacks also extended to ports, such as Ravenna and Ancona, highlighting a focus on critical infrastructure within the country.AI generated16 targets are under attack, 16 new targets and 0 targets from previous attack
New Targets(16): www.marina.difesa.it, www.sinfomar.it, www.portoditriesteservizi.it, www.comune.novara.it, www.olbiagolfoaranci.it, www.agenziatplbergamo.it, www.port.ravenna.it, w3.ars.sicilia.it, www.cittametropolitana.ct.it, www.agenziaindustriedifesa.it, www.porto.ancona.it, sso.comune.palermo.it, www.arst.sardegna.it, www.atb.bergamo.it, www.acqualatina.it, www.portsofnapa.com
Targets from prev attack(0):
Dismissed Targets(35): www.regione.veneto.it, www.tiscali.it, zbx.skm.com.ua, www.globaltenders.com, www.nexi.it, pm5.skm.com.ua, www.difesa.it, www.comune.aosta.it, scada.online.sumy.ua, shop.jonathan.it, mobile.online.sumy.ua, z.skm.com.ua, www.coopvoce.it, www.italytenders.com, www.cedacri.it, www.regione.emilia-romagna.it, cacti.skm.com.ua, www.regione.liguria.it, www.ehiweb.it, skm.com.ua, www.regione.toscana.it, www.regione.piemonte.it, online.sumy.ua, www.tendersinfo.com, mail.tiscali.it, www.banchedati.biz, www.regione.vda.it, private.coopvoce.it, bill.skm.com.ua, ntcitalia.it, www.comune.portoferraio.li.it, connessioneinfibra.it, www.noitel.it, www.uilpa.it, assistenza.tiscali.it
New Targets(16): www.marina.difesa.it, www.sinfomar.it, www.portoditriesteservizi.it, www.comune.novara.it, www.olbiagolfoaranci.it, www.agenziatplbergamo.it, www.port.ravenna.it, w3.ars.sicilia.it, www.cittametropolitana.ct.it, www.agenziaindustriedifesa.it, www.porto.ancona.it, sso.comune.palermo.it, www.arst.sardegna.it, www.atb.bergamo.it, www.acqualatina.it, www.portsofnapa.com
Targets from prev attack(0):
Dismissed Targets(35): www.regione.veneto.it, www.tiscali.it, zbx.skm.com.ua, www.globaltenders.com, www.nexi.it, pm5.skm.com.ua, www.difesa.it, www.comune.aosta.it, scada.online.sumy.ua, shop.jonathan.it, mobile.online.sumy.ua, z.skm.com.ua, www.coopvoce.it, www.italytenders.com, www.cedacri.it, www.regione.emilia-romagna.it, cacti.skm.com.ua, www.regione.liguria.it, www.ehiweb.it, skm.com.ua, www.regione.toscana.it, www.regione.piemonte.it, online.sumy.ua, www.tendersinfo.com, mail.tiscali.it, www.banchedati.biz, www.regione.vda.it, private.coopvoce.it, bill.skm.com.ua, ntcitalia.it, www.comune.portoferraio.li.it, connessioneinfibra.it, www.noitel.it, www.uilpa.it, assistenza.tiscali.it