| # | domain | network | attack type |
|---|
2026-02-13_15-15-08
Noname057(16) has targeted various websites primarily in Japan and Ukraine. The main countries under attack include Japan, with multiple local government and corporate sites being compromised, and Ukraine, where several businesses and government-related websites have been affected. The attacks highlight a focus on both regional administrative entities and key industrial sectors in these nations.AI generated23 targets are under attack, 0 new targets and 23 targets from previous attack
New Targets(0):
Targets from prev attack(23): www.sanoyas.co.jp, www.pref.aomori.lg.jp, www.pref.ehime.jp, ohorona-bezpeka.com, oib.com.ua, www.i-ppi.jp, www.city.fukui.lg.jp, ohorona-kyiv.com, www.0175.co.jp, www.city.nanao.lg.jp, www.ferrexpo.ua, www.morozov.com.ua, cabinet.oib.com.ua, zmturbines.com, photopribor.ck.ua, spetstechnoexport.com, bezpeka-zahyst.com.ua, www.city.matsuyama.ehime.jp, www.city.maebashi.gunma.jp, www.city.akita.lg.jp, www.pref.ishikawa.lg.jp, www.pref.fukui.lg.jp, www.malyshevplant.com
Dismissed Targets(3): www.konanbus.com, aoimorirailway.com, www.kkj.go.jp
New Targets(0):
Targets from prev attack(23): www.sanoyas.co.jp, www.pref.aomori.lg.jp, www.pref.ehime.jp, ohorona-bezpeka.com, oib.com.ua, www.i-ppi.jp, www.city.fukui.lg.jp, ohorona-kyiv.com, www.0175.co.jp, www.city.nanao.lg.jp, www.ferrexpo.ua, www.morozov.com.ua, cabinet.oib.com.ua, zmturbines.com, photopribor.ck.ua, spetstechnoexport.com, bezpeka-zahyst.com.ua, www.city.matsuyama.ehime.jp, www.city.maebashi.gunma.jp, www.city.akita.lg.jp, www.pref.ishikawa.lg.jp, www.pref.fukui.lg.jp, www.malyshevplant.com
Dismissed Targets(3): www.konanbus.com, aoimorirailway.com, www.kkj.go.jp
2026-02-13_15-10-08
The recent attacks attributed to noname057(16) primarily targeted websites in Japan and Ukraine. Key regions under attack include various prefectures in Japan, such as Aomori, Ishikawa, Ehime, and Fukui, along with multiple cities like Nanao, Akita, and Maebashi. In Ukraine, notable targets include sites related to security and industry, highlighting a significant focus on both governmental and commercial entities in these countries.AI generated26 targets are under attack, 0 new targets and 26 targets from previous attack
New Targets(0):
Targets from prev attack(26): www.pref.aomori.lg.jp, www.morozov.com.ua, bezpeka-zahyst.com.ua, www.kkj.go.jp, www.city.nanao.lg.jp, www.city.akita.lg.jp, www.pref.ehime.jp, www.pref.ishikawa.lg.jp, www.i-ppi.jp, spetstechnoexport.com, ohorona-kyiv.com, www.malyshevplant.com, www.city.fukui.lg.jp, www.konanbus.com, www.sanoyas.co.jp, oib.com.ua, cabinet.oib.com.ua, www.city.maebashi.gunma.jp, ohorona-bezpeka.com, www.0175.co.jp, www.city.matsuyama.ehime.jp, photopribor.ck.ua, zmturbines.com, www.pref.fukui.lg.jp, aoimorirailway.com, www.ferrexpo.ua
Dismissed Targets(4): glossary.mizuho-sc.com, reserve.seikan-ferry.jp, www.mizuho-sc.com, information1.gov-procurement.go.jp
New Targets(0):
Targets from prev attack(26): www.pref.aomori.lg.jp, www.morozov.com.ua, bezpeka-zahyst.com.ua, www.kkj.go.jp, www.city.nanao.lg.jp, www.city.akita.lg.jp, www.pref.ehime.jp, www.pref.ishikawa.lg.jp, www.i-ppi.jp, spetstechnoexport.com, ohorona-kyiv.com, www.malyshevplant.com, www.city.fukui.lg.jp, www.konanbus.com, www.sanoyas.co.jp, oib.com.ua, cabinet.oib.com.ua, www.city.maebashi.gunma.jp, ohorona-bezpeka.com, www.0175.co.jp, www.city.matsuyama.ehime.jp, photopribor.ck.ua, zmturbines.com, www.pref.fukui.lg.jp, aoimorirailway.com, www.ferrexpo.ua
Dismissed Targets(4): glossary.mizuho-sc.com, reserve.seikan-ferry.jp, www.mizuho-sc.com, information1.gov-procurement.go.jp
2026-02-13_11-05-09
The attacks attributed to noname057 primarily targeted websites in Japan and Ukraine. Key Japanese sites include various local government and transportation websites, such as those from Ehime, Aomori, Ishikawa, and Akita prefectures, as well as companies like Mizuho and Sanoyas. In Ukraine, the attacks involved sites related to government procurement and defense, including Morozov and Ferrexpo. The focus on these countries indicates a mix of local government and industrial targets, reflecting a diverse range of interests.AI generated30 targets are under attack, 11 new targets and 19 targets from previous attack
New Targets(11): ohorona-bezpeka.com, www.morozov.com.ua, zmturbines.com, cabinet.oib.com.ua, bezpeka-zahyst.com.ua, www.ferrexpo.ua, photopribor.ck.ua, spetstechnoexport.com, ohorona-kyiv.com, www.malyshevplant.com, oib.com.ua
Targets from prev attack(19): www.pref.ehime.jp, information1.gov-procurement.go.jp, aoimorirailway.com, www.kkj.go.jp, www.pref.ishikawa.lg.jp, www.pref.aomori.lg.jp, www.city.maebashi.gunma.jp, www.city.nanao.lg.jp, www.mizuho-sc.com, reserve.seikan-ferry.jp, www.city.akita.lg.jp, www.city.fukui.lg.jp, www.i-ppi.jp, www.0175.co.jp, www.konanbus.com, www.sanoyas.co.jp, www.city.matsuyama.ehime.jp, www.pref.fukui.lg.jp, glossary.mizuho-sc.com
Dismissed Targets(0):
New Targets(11): ohorona-bezpeka.com, www.morozov.com.ua, zmturbines.com, cabinet.oib.com.ua, bezpeka-zahyst.com.ua, www.ferrexpo.ua, photopribor.ck.ua, spetstechnoexport.com, ohorona-kyiv.com, www.malyshevplant.com, oib.com.ua
Targets from prev attack(19): www.pref.ehime.jp, information1.gov-procurement.go.jp, aoimorirailway.com, www.kkj.go.jp, www.pref.ishikawa.lg.jp, www.pref.aomori.lg.jp, www.city.maebashi.gunma.jp, www.city.nanao.lg.jp, www.mizuho-sc.com, reserve.seikan-ferry.jp, www.city.akita.lg.jp, www.city.fukui.lg.jp, www.i-ppi.jp, www.0175.co.jp, www.konanbus.com, www.sanoyas.co.jp, www.city.matsuyama.ehime.jp, www.pref.fukui.lg.jp, glossary.mizuho-sc.com
Dismissed Targets(0):
2026-02-13_08-05-09
The attacks attributed to noname057(16) primarily targeted websites in Japan. Key regions affected include Ehime, Fukui, Ishikawa, Aomori, Akita, and Gunma. The compromised sites represent various sectors, including government, transportation, and local services, indicating a broad impact on public infrastructure and services across these areas.AI generated19 targets are under attack, 0 new targets and 19 targets from previous attack
New Targets(0):
Targets from prev attack(19): www.city.matsuyama.ehime.jp, www.pref.ehime.jp, information1.gov-procurement.go.jp, aoimorirailway.com, www.mizuho-sc.com, glossary.mizuho-sc.com, www.pref.fukui.lg.jp, www.pref.ishikawa.lg.jp, www.city.nanao.lg.jp, www.sanoyas.co.jp, www.pref.aomori.lg.jp, www.konanbus.com, www.i-ppi.jp, www.0175.co.jp, reserve.seikan-ferry.jp, www.kkj.go.jp, www.city.akita.lg.jp, www.city.maebashi.gunma.jp, www.city.fukui.lg.jp
Dismissed Targets(1): azocm.postavschiki.ua
New Targets(0):
Targets from prev attack(19): www.city.matsuyama.ehime.jp, www.pref.ehime.jp, information1.gov-procurement.go.jp, aoimorirailway.com, www.mizuho-sc.com, glossary.mizuho-sc.com, www.pref.fukui.lg.jp, www.pref.ishikawa.lg.jp, www.city.nanao.lg.jp, www.sanoyas.co.jp, www.pref.aomori.lg.jp, www.konanbus.com, www.i-ppi.jp, www.0175.co.jp, reserve.seikan-ferry.jp, www.kkj.go.jp, www.city.akita.lg.jp, www.city.maebashi.gunma.jp, www.city.fukui.lg.jp
Dismissed Targets(1): azocm.postavschiki.ua
2026-02-13_07-10-08
The attacks attributed to noname057(16) primarily targeted websites in Japan, including various local government sites and transportation companies. Key regions under attack include Gunma, Ishikawa, Aomori, Fukui, Ehime, and Akita. Additionally, there was an attack on a Ukrainian site, indicating a broader geographical reach beyond Japan.AI generated20 targets are under attack, 19 new targets and 1 targets from previous attack
New Targets(19): www.city.maebashi.gunma.jp, www.kkj.go.jp, information1.gov-procurement.go.jp, www.pref.ishikawa.lg.jp, aoimorirailway.com, reserve.seikan-ferry.jp, www.0175.co.jp, www.city.nanao.lg.jp, www.pref.aomori.lg.jp, www.konanbus.com, www.city.fukui.lg.jp, www.i-ppi.jp, www.city.akita.lg.jp, www.mizuho-sc.com, www.pref.ehime.jp, www.city.matsuyama.ehime.jp, www.pref.fukui.lg.jp, www.sanoyas.co.jp, glossary.mizuho-sc.com
Targets from prev attack(1): azocm.postavschiki.ua
Dismissed Targets(23): yuzhmash.com, www.esri.cao.go.jp, www.port-of-nagoya.jp, www.dss-ua.com, www.ukrniat.com, www.jcaa.or.jp, www.azot.com.ua, www.shugiin.go.jp, www.city.aomori.aomori.jp, www.cao.go.jp, www.paj.gr.jp, octavacapital.ua, www.aomori-airport.co.jp, www.naikaizosen.co.jp, roboneers.net, amstor.com, www.rieti.go.jp, www.jbaudit.go.jp, www.city.sendai.jp, www.osakametro.co.jp, lansys.com.ua, www.city.osaka.lg.jp, www.siteitosi.jp
New Targets(19): www.city.maebashi.gunma.jp, www.kkj.go.jp, information1.gov-procurement.go.jp, www.pref.ishikawa.lg.jp, aoimorirailway.com, reserve.seikan-ferry.jp, www.0175.co.jp, www.city.nanao.lg.jp, www.pref.aomori.lg.jp, www.konanbus.com, www.city.fukui.lg.jp, www.i-ppi.jp, www.city.akita.lg.jp, www.mizuho-sc.com, www.pref.ehime.jp, www.city.matsuyama.ehime.jp, www.pref.fukui.lg.jp, www.sanoyas.co.jp, glossary.mizuho-sc.com
Targets from prev attack(1): azocm.postavschiki.ua
Dismissed Targets(23): yuzhmash.com, www.esri.cao.go.jp, www.port-of-nagoya.jp, www.dss-ua.com, www.ukrniat.com, www.jcaa.or.jp, www.azot.com.ua, www.shugiin.go.jp, www.city.aomori.aomori.jp, www.cao.go.jp, www.paj.gr.jp, octavacapital.ua, www.aomori-airport.co.jp, www.naikaizosen.co.jp, roboneers.net, amstor.com, www.rieti.go.jp, www.jbaudit.go.jp, www.city.sendai.jp, www.osakametro.co.jp, lansys.com.ua, www.city.osaka.lg.jp, www.siteitosi.jp
2026-02-12_11-25-10
Noname057(16) has targeted various websites primarily in Japan and Ukraine. The attacks include government and organizational sites such as the Japan Civil Aviation Bureau and several municipal sites in Japanese cities like Sendai and Osaka. Additionally, Ukrainian websites, including those related to auditing and capital investment, have also been affected.AI generated24 targets are under attack, 1 new targets and 23 targets from previous attack
New Targets(1): www.dss-ua.com
Targets from prev attack(23): www.jcaa.or.jp, amstor.com, www.shugiin.go.jp, www.jbaudit.go.jp, azocm.postavschiki.ua, www.naikaizosen.co.jp, www.paj.gr.jp, www.ukrniat.com, www.siteitosi.jp, www.cao.go.jp, lansys.com.ua, www.rieti.go.jp, www.city.sendai.jp, www.city.osaka.lg.jp, roboneers.net, www.aomori-airport.co.jp, octavacapital.ua, www.port-of-nagoya.jp, www.esri.cao.go.jp, yuzhmash.com, www.azot.com.ua, www.osakametro.co.jp, www.city.aomori.aomori.jp
Dismissed Targets(0):
New Targets(1): www.dss-ua.com
Targets from prev attack(23): www.jcaa.or.jp, amstor.com, www.shugiin.go.jp, www.jbaudit.go.jp, azocm.postavschiki.ua, www.naikaizosen.co.jp, www.paj.gr.jp, www.ukrniat.com, www.siteitosi.jp, www.cao.go.jp, lansys.com.ua, www.rieti.go.jp, www.city.sendai.jp, www.city.osaka.lg.jp, roboneers.net, www.aomori-airport.co.jp, octavacapital.ua, www.port-of-nagoya.jp, www.esri.cao.go.jp, yuzhmash.com, www.azot.com.ua, www.osakametro.co.jp, www.city.aomori.aomori.jp
Dismissed Targets(0):
2026-02-12_11-20-09
Noname057(16) has targeted various websites primarily in Japan and Ukraine. The main countries under attack include Japan, with significant hits on sites related to airports, cities, and governmental organizations, and Ukraine, where several sites associated with local businesses and services have been compromised.AI generated23 targets are under attack, 8 new targets and 15 targets from previous attack
New Targets(8): www.azot.com.ua, yuzhmash.com, amstor.com, azocm.postavschiki.ua, octavacapital.ua, roboneers.net, www.ukrniat.com, lansys.com.ua
Targets from prev attack(15): www.paj.gr.jp, www.port-of-nagoya.jp, www.cao.go.jp, www.siteitosi.jp, www.osakametro.co.jp, www.shugiin.go.jp, www.aomori-airport.co.jp, www.city.sendai.jp, www.city.osaka.lg.jp, www.naikaizosen.co.jp, www.rieti.go.jp, www.jcaa.or.jp, www.jbaudit.go.jp, www.esri.cao.go.jp, www.city.aomori.aomori.jp
Dismissed Targets(0):
New Targets(8): www.azot.com.ua, yuzhmash.com, amstor.com, azocm.postavschiki.ua, octavacapital.ua, roboneers.net, www.ukrniat.com, lansys.com.ua
Targets from prev attack(15): www.paj.gr.jp, www.port-of-nagoya.jp, www.cao.go.jp, www.siteitosi.jp, www.osakametro.co.jp, www.shugiin.go.jp, www.aomori-airport.co.jp, www.city.sendai.jp, www.city.osaka.lg.jp, www.naikaizosen.co.jp, www.rieti.go.jp, www.jcaa.or.jp, www.jbaudit.go.jp, www.esri.cao.go.jp, www.city.aomori.aomori.jp
Dismissed Targets(0):
2026-02-12_07-10-08
The attacks by noname057(16) primarily targeted Japanese websites, focusing on various sectors including government, transportation, and local municipalities. Key cities affected include Osaka, Nagoya, Aomori, and Sendai, indicating a concentrated effort against critical infrastructure and public services in Japan.AI generated15 targets are under attack, 4 new targets and 11 targets from previous attack
New Targets(4): www.shugiin.go.jp, www.cao.go.jp, www.esri.cao.go.jp, www.city.aomori.aomori.jp
Targets from prev attack(11): www.city.osaka.lg.jp, www.port-of-nagoya.jp, www.siteitosi.jp, www.paj.gr.jp, www.jbaudit.go.jp, www.osakametro.co.jp, www.aomori-airport.co.jp, www.jcaa.or.jp, www.city.sendai.jp, www.naikaizosen.co.jp, www.rieti.go.jp
Dismissed Targets(0):
New Targets(4): www.shugiin.go.jp, www.cao.go.jp, www.esri.cao.go.jp, www.city.aomori.aomori.jp
Targets from prev attack(11): www.city.osaka.lg.jp, www.port-of-nagoya.jp, www.siteitosi.jp, www.paj.gr.jp, www.jbaudit.go.jp, www.osakametro.co.jp, www.aomori-airport.co.jp, www.jcaa.or.jp, www.city.sendai.jp, www.naikaizosen.co.jp, www.rieti.go.jp
Dismissed Targets(0):
2026-02-12_07-05-10
The attacks attributed to noname057 primarily targeted websites in Japan. Key cities under attack include Osaka and Sendai, with notable sites like the Osaka city government, Nagoya port, and various local transportation and airport services being compromised. The focus appears to be on municipal and transportation-related entities across the country.AI generated11 targets are under attack, 11 new targets and 0 targets from previous attack
New Targets(11): www.city.osaka.lg.jp, www.port-of-nagoya.jp, www.siteitosi.jp, www.paj.gr.jp, www.jbaudit.go.jp, www.osakametro.co.jp, www.aomori-airport.co.jp, www.jcaa.or.jp, www.city.sendai.jp, www.naikaizosen.co.jp, www.rieti.go.jp
Targets from prev attack(0):
Dismissed Targets(29): bezpeka.ua, www.jimin.jp, www.materials.kiev.ua, temp3000.com, merydian.kiev.ua, www.pult-ohrana.kiev.ua, ufpb.kiev.ua, www.sonyfg.co.jp, www.chancenavi.jp, prime-as.co.jp, lreri.tripod.com, www.autokraz.com.ua, www.jmuc.co.jp, www.tokyo-jimin.jp, www.sompo-am.co.jp, www.nomuraholdings.com, jimin-miekenren.jp, bezpeka-ltd.com, www.td-holdings.co.jp, pribor.zp.ua, www.idcj.jp, www.kyoto-jimin.jp, www.jcci.or.jp, phoenix-s.com.ua, www.sompo-rc.co.jp, www.ism.kiev.ua, www.hakodate-dock.co.jp, ab.com.ua, www.orion.te.ua
New Targets(11): www.city.osaka.lg.jp, www.port-of-nagoya.jp, www.siteitosi.jp, www.paj.gr.jp, www.jbaudit.go.jp, www.osakametro.co.jp, www.aomori-airport.co.jp, www.jcaa.or.jp, www.city.sendai.jp, www.naikaizosen.co.jp, www.rieti.go.jp
Targets from prev attack(0):
Dismissed Targets(29): bezpeka.ua, www.jimin.jp, www.materials.kiev.ua, temp3000.com, merydian.kiev.ua, www.pult-ohrana.kiev.ua, ufpb.kiev.ua, www.sonyfg.co.jp, www.chancenavi.jp, prime-as.co.jp, lreri.tripod.com, www.autokraz.com.ua, www.jmuc.co.jp, www.tokyo-jimin.jp, www.sompo-am.co.jp, www.nomuraholdings.com, jimin-miekenren.jp, bezpeka-ltd.com, www.td-holdings.co.jp, pribor.zp.ua, www.idcj.jp, www.kyoto-jimin.jp, www.jcci.or.jp, phoenix-s.com.ua, www.sompo-rc.co.jp, www.ism.kiev.ua, www.hakodate-dock.co.jp, ab.com.ua, www.orion.te.ua
2026-02-11_11-10-08
The attacks attributed to noname057 primarily targeted websites in Ukraine and Japan. Key sectors affected include finance, technology, and local government services. Ukraine's sites, such as pribor.zp.ua and autokraz.com.ua, highlight the focus on critical infrastructure, while Japan's targets like nomuraholdings.com and sompo-rc.co.jp reflect interests in major corporations and financial institutions. Overall, the campaign demonstrates a concentrated effort against entities in these two countries.AI generated29 targets are under attack, 14 new targets and 15 targets from previous attack
New Targets(14): ufpb.kiev.ua, www.pult-ohrana.kiev.ua, pribor.zp.ua, temp3000.com, www.orion.te.ua, lreri.tripod.com, ab.com.ua, merydian.kiev.ua, bezpeka-ltd.com, www.ism.kiev.ua, www.materials.kiev.ua, phoenix-s.com.ua, bezpeka.ua, www.autokraz.com.ua
Targets from prev attack(15): www.nomuraholdings.com, www.tokyo-jimin.jp, www.sompo-am.co.jp, www.kyoto-jimin.jp, www.jimin.jp, www.sonyfg.co.jp, www.idcj.jp, www.td-holdings.co.jp, www.jcci.or.jp, www.jmuc.co.jp, prime-as.co.jp, jimin-miekenren.jp, www.chancenavi.jp, www.sompo-rc.co.jp, www.hakodate-dock.co.jp
Dismissed Targets(0):
New Targets(14): ufpb.kiev.ua, www.pult-ohrana.kiev.ua, pribor.zp.ua, temp3000.com, www.orion.te.ua, lreri.tripod.com, ab.com.ua, merydian.kiev.ua, bezpeka-ltd.com, www.ism.kiev.ua, www.materials.kiev.ua, phoenix-s.com.ua, bezpeka.ua, www.autokraz.com.ua
Targets from prev attack(15): www.nomuraholdings.com, www.tokyo-jimin.jp, www.sompo-am.co.jp, www.kyoto-jimin.jp, www.jimin.jp, www.sonyfg.co.jp, www.idcj.jp, www.td-holdings.co.jp, www.jcci.or.jp, www.jmuc.co.jp, prime-as.co.jp, jimin-miekenren.jp, www.chancenavi.jp, www.sompo-rc.co.jp, www.hakodate-dock.co.jp
Dismissed Targets(0):
2026-02-11_07-05-08
Noname057(16) has targeted various websites primarily in Japan. The attacked sites include government-related domains, financial institutions, and corporate entities, indicating a focus on Japanese infrastructure and businesses.AI generated15 targets are under attack, 15 new targets and 0 targets from previous attack
New Targets(15): jimin-miekenren.jp, www.jimin.jp, www.sonyfg.co.jp, www.td-holdings.co.jp, www.jmuc.co.jp, prime-as.co.jp, www.nomuraholdings.com, www.sompo-rc.co.jp, www.tokyo-jimin.jp, www.chancenavi.jp, www.idcj.jp, www.hakodate-dock.co.jp, www.kyoto-jimin.jp, www.jcci.or.jp, www.sompo-am.co.jp
Targets from prev attack(0):
Dismissed Targets(17): www.rada-poltava.gov.ua, kompek.rada.gov.ua, chervonyi.com.ua, komzakonpr.rada.gov.ua, mariupolrada.gov.ua, zp.gov.ua, kompravpol.rada.gov.ua, komfinbank.rada.gov.ua, komsamovr.rada.gov.ua, loga.gov.ua, komtrans.rada.gov.ua, adm.dp.gov.ua, smr.gov.ua, komnbor.rada.gov.ua, awex.com.ua, www.vmr.gov.ua, kompravlud.rada.gov.ua
New Targets(15): jimin-miekenren.jp, www.jimin.jp, www.sonyfg.co.jp, www.td-holdings.co.jp, www.jmuc.co.jp, prime-as.co.jp, www.nomuraholdings.com, www.sompo-rc.co.jp, www.tokyo-jimin.jp, www.chancenavi.jp, www.idcj.jp, www.hakodate-dock.co.jp, www.kyoto-jimin.jp, www.jcci.or.jp, www.sompo-am.co.jp
Targets from prev attack(0):
Dismissed Targets(17): www.rada-poltava.gov.ua, kompek.rada.gov.ua, chervonyi.com.ua, komzakonpr.rada.gov.ua, mariupolrada.gov.ua, zp.gov.ua, kompravpol.rada.gov.ua, komfinbank.rada.gov.ua, komsamovr.rada.gov.ua, loga.gov.ua, komtrans.rada.gov.ua, adm.dp.gov.ua, smr.gov.ua, komnbor.rada.gov.ua, awex.com.ua, www.vmr.gov.ua, kompravlud.rada.gov.ua
2026-02-10_08-10-08
The sites attacked by noname057(16) primarily belong to Ukraine, indicating a focus on Ukrainian government and municipal websites. The targeted domains include various regional administrations and local government entities, highlighting the ongoing cyber threats faced by Ukraine amidst geopolitical tensions.AI generated17 targets are under attack, 0 new targets and 17 targets from previous attack
New Targets(0):
Targets from prev attack(17): smr.gov.ua, mariupolrada.gov.ua, zp.gov.ua, kompravlud.rada.gov.ua, adm.dp.gov.ua, www.vmr.gov.ua, komfinbank.rada.gov.ua, loga.gov.ua, komsamovr.rada.gov.ua, awex.com.ua, komtrans.rada.gov.ua, www.rada-poltava.gov.ua, kompek.rada.gov.ua, kompravpol.rada.gov.ua, komnbor.rada.gov.ua, komzakonpr.rada.gov.ua, chervonyi.com.ua
Dismissed Targets(14): www.furesoe.dk, www.horsholm.dk, www.hillerod.dk, fredensborg.dk, www.faxekommune.dk, www.egedalkommune.dk, herlev.dk, www.gladsaxe.dk, www.htk.dk, www.brondby.dk, www.dragoer.dk, www.ballerup.dk, www.frederikssund.dk, albertslund.dk
New Targets(0):
Targets from prev attack(17): smr.gov.ua, mariupolrada.gov.ua, zp.gov.ua, kompravlud.rada.gov.ua, adm.dp.gov.ua, www.vmr.gov.ua, komfinbank.rada.gov.ua, loga.gov.ua, komsamovr.rada.gov.ua, awex.com.ua, komtrans.rada.gov.ua, www.rada-poltava.gov.ua, kompek.rada.gov.ua, kompravpol.rada.gov.ua, komnbor.rada.gov.ua, komzakonpr.rada.gov.ua, chervonyi.com.ua
Dismissed Targets(14): www.furesoe.dk, www.horsholm.dk, www.hillerod.dk, fredensborg.dk, www.faxekommune.dk, www.egedalkommune.dk, herlev.dk, www.gladsaxe.dk, www.htk.dk, www.brondby.dk, www.dragoer.dk, www.ballerup.dk, www.frederikssund.dk, albertslund.dk
2026-02-10_07-05-09
The sites attacked by noname057 primarily include government and municipal websites from Ukraine and Denmark. The main countries under attack are Ukraine, with several regional and local government sites targeted, and Denmark, where numerous municipal websites have been compromised.AI generated31 targets are under attack, 17 new targets and 14 targets from previous attack
New Targets(17): loga.gov.ua, awex.com.ua, chervonyi.com.ua, smr.gov.ua, kompravlud.rada.gov.ua, adm.dp.gov.ua, www.rada-poltava.gov.ua, kompek.rada.gov.ua, komtrans.rada.gov.ua, kompravpol.rada.gov.ua, komzakonpr.rada.gov.ua, komfinbank.rada.gov.ua, komsamovr.rada.gov.ua, mariupolrada.gov.ua, komnbor.rada.gov.ua, www.vmr.gov.ua, zp.gov.ua
Targets from prev attack(14): www.furesoe.dk, www.ballerup.dk, www.frederikssund.dk, www.brondby.dk, albertslund.dk, www.gladsaxe.dk, www.horsholm.dk, www.hillerod.dk, www.htk.dk, fredensborg.dk, herlev.dk, www.faxekommune.dk, www.egedalkommune.dk, www.dragoer.dk
Dismissed Targets(0):
New Targets(17): loga.gov.ua, awex.com.ua, chervonyi.com.ua, smr.gov.ua, kompravlud.rada.gov.ua, adm.dp.gov.ua, www.rada-poltava.gov.ua, kompek.rada.gov.ua, komtrans.rada.gov.ua, kompravpol.rada.gov.ua, komzakonpr.rada.gov.ua, komfinbank.rada.gov.ua, komsamovr.rada.gov.ua, mariupolrada.gov.ua, komnbor.rada.gov.ua, www.vmr.gov.ua, zp.gov.ua
Targets from prev attack(14): www.furesoe.dk, www.ballerup.dk, www.frederikssund.dk, www.brondby.dk, albertslund.dk, www.gladsaxe.dk, www.horsholm.dk, www.hillerod.dk, www.htk.dk, fredensborg.dk, herlev.dk, www.faxekommune.dk, www.egedalkommune.dk, www.dragoer.dk
Dismissed Targets(0):
2026-02-09_17-10-11
Noname057(16) has targeted several municipal websites in Denmark, primarily affecting local government and community services. The attacked sites include those from cities such as Frederikssund, Hørsholm, Herlev, Hillerød, and Ballerup, among others. This indicates a focused campaign against Danish public institutions.AI generated14 targets are under attack, 0 new targets and 14 targets from previous attack
New Targets(0):
Targets from prev attack(14): www.horsholm.dk, www.frederikssund.dk, www.hillerod.dk, herlev.dk, www.htk.dk, www.faxekommune.dk, fredensborg.dk, www.furesoe.dk, www.egedalkommune.dk, www.ballerup.dk, albertslund.dk, www.dragoer.dk, www.brondby.dk, www.gladsaxe.dk
Dismissed Targets(16): www.milanbergamoairport.it, www.teamnor.no, www.pkol.pl, www.teamdeutschland.de, www.sea-aeroportimilano.it, passauto.milanocortina2026.org, olympic.ca, www.eok.ee, www.frederiksberg.dk, bgolympic.org, www.coe.es, www.olympiakomitea.fi, www.ltok.lt, www.olympic.cz, www.cortinaparking.it, www.olympia.at
New Targets(0):
Targets from prev attack(14): www.horsholm.dk, www.frederikssund.dk, www.hillerod.dk, herlev.dk, www.htk.dk, www.faxekommune.dk, fredensborg.dk, www.furesoe.dk, www.egedalkommune.dk, www.ballerup.dk, albertslund.dk, www.dragoer.dk, www.brondby.dk, www.gladsaxe.dk
Dismissed Targets(16): www.milanbergamoairport.it, www.teamnor.no, www.pkol.pl, www.teamdeutschland.de, www.sea-aeroportimilano.it, passauto.milanocortina2026.org, olympic.ca, www.eok.ee, www.frederiksberg.dk, bgolympic.org, www.coe.es, www.olympiakomitea.fi, www.ltok.lt, www.olympic.cz, www.cortinaparking.it, www.olympia.at
2026-02-09_11-05-08
The attacks attributed to noname057 primarily targeted websites in Denmark, with numerous local municipalities such as htk.dk, fredensborg.dk, hillerod.dk, and others being affected. Other notable countries include the Czech Republic (olympic.cz), Poland (pkol.pl), Estonia (eok.ee), Lithuania (ltok.lt), Spain (coe.es), Norway (teamnor.no), Germany (teamdeutschland.de), Italy (cortinaparking.it, milanbergamoairport.it), and Austria (olympia.at). The attacks appear to focus on sports-related organizations and local government sites across these nations.AI generated30 targets are under attack, 15 new targets and 15 targets from previous attack
New Targets(15): www.eok.ee, olympic.ca, www.ltok.lt, passauto.milanocortina2026.org, www.coe.es, www.olympia.at, www.olympiakomitea.fi, www.teamnor.no, www.sea-aeroportimilano.it, bgolympic.org, www.teamdeutschland.de, www.cortinaparking.it, www.milanbergamoairport.it, www.olympic.cz, www.pkol.pl
Targets from prev attack(15): www.frederiksberg.dk, www.frederikssund.dk, www.faxekommune.dk, www.brondby.dk, herlev.dk, www.htk.dk, fredensborg.dk, www.hillerod.dk, www.horsholm.dk, www.ballerup.dk, www.egedalkommune.dk, www.dragoer.dk, www.gladsaxe.dk, www.furesoe.dk, albertslund.dk
Dismissed Targets(0):
New Targets(15): www.eok.ee, olympic.ca, www.ltok.lt, passauto.milanocortina2026.org, www.coe.es, www.olympia.at, www.olympiakomitea.fi, www.teamnor.no, www.sea-aeroportimilano.it, bgolympic.org, www.teamdeutschland.de, www.cortinaparking.it, www.milanbergamoairport.it, www.olympic.cz, www.pkol.pl
Targets from prev attack(15): www.frederiksberg.dk, www.frederikssund.dk, www.faxekommune.dk, www.brondby.dk, herlev.dk, www.htk.dk, fredensborg.dk, www.hillerod.dk, www.horsholm.dk, www.ballerup.dk, www.egedalkommune.dk, www.dragoer.dk, www.gladsaxe.dk, www.furesoe.dk, albertslund.dk
Dismissed Targets(0):
2026-02-09_08-10-08
The websites targeted by noname057(16) primarily belong to municipalities in Denmark. The attacks have affected various local government sites, including those from cities such as Hillerød, Egedal, Albertslund, Herlev, Gladsaxe, Faxe, Ballerup, Brøndby, Dragør, Høje-Taastrup, Furesø, Hørsholm, Frederiksberg, Fredensborg, and Frederikssund. This indicates a focused campaign against Danish local authorities.AI generated15 targets are under attack, 15 new targets and 0 targets from previous attack
New Targets(15): www.hillerod.dk, www.egedalkommune.dk, fredensborg.dk, herlev.dk, www.frederiksberg.dk, www.gladsaxe.dk, www.faxekommune.dk, www.ballerup.dk, www.brondby.dk, www.dragoer.dk, www.furesoe.dk, www.horsholm.dk, albertslund.dk, www.htk.dk, www.frederikssund.dk
Targets from prev attack(0):
Dismissed Targets(12): www.comune.parma.it, www.regione.emilia-romagna.it, www.dosb.de, www.valgardena.it, www.skirama.it, www.herabit.com, www.ski.it, www.kronplatz.com, www.bormioski.eu, www.consiglio.vda.it, www.cortinaexpress.it, www.comune.giugliano.na.it
New Targets(15): www.hillerod.dk, www.egedalkommune.dk, fredensborg.dk, herlev.dk, www.frederiksberg.dk, www.gladsaxe.dk, www.faxekommune.dk, www.ballerup.dk, www.brondby.dk, www.dragoer.dk, www.furesoe.dk, www.horsholm.dk, albertslund.dk, www.htk.dk, www.frederikssund.dk
Targets from prev attack(0):
Dismissed Targets(12): www.comune.parma.it, www.regione.emilia-romagna.it, www.dosb.de, www.valgardena.it, www.skirama.it, www.herabit.com, www.ski.it, www.kronplatz.com, www.bormioski.eu, www.consiglio.vda.it, www.cortinaexpress.it, www.comune.giugliano.na.it
2026-02-09_07-05-07
Noname057(16) has targeted several websites primarily in Italy and Germany. The attacks include ski resort and tourism-related sites such as skirama.it, kronplatz.com, and valgardena.it, indicating a focus on the winter sports industry. Additionally, various local government sites like comune.giugliano.na.it and regione.emilia-romagna.it were also compromised, highlighting a broader threat to public sector entities in these countries.AI generated12 targets are under attack, 0 new targets and 12 targets from previous attack
New Targets(0):
Targets from prev attack(12): www.skirama.it, www.dosb.de, www.kronplatz.com, www.regione.emilia-romagna.it, www.herabit.com, www.valgardena.it, www.bormioski.eu, www.cortinaexpress.it, www.ski.it, www.consiglio.vda.it, www.comune.giugliano.na.it, www.comune.parma.it
Dismissed Targets(2): www.stradeanas.it, www.ristorantetivolicortina.it
New Targets(0):
Targets from prev attack(12): www.skirama.it, www.dosb.de, www.kronplatz.com, www.regione.emilia-romagna.it, www.herabit.com, www.valgardena.it, www.bormioski.eu, www.cortinaexpress.it, www.ski.it, www.consiglio.vda.it, www.comune.giugliano.na.it, www.comune.parma.it
Dismissed Targets(2): www.stradeanas.it, www.ristorantetivolicortina.it
2026-02-08_22-30-09
The attacks by noname057 primarily targeted websites in Italy, particularly in regions known for tourism and skiing, such as Val Gardena, Cortina, and Bormio. Additionally, some sites related to local government and transportation, like the municipality of Parma and Strade Anas, were also affected. The attacks appear to focus on sectors that are vital for regional infrastructure and tourism.AI generated14 targets are under attack, 0 new targets and 14 targets from previous attack
New Targets(0):
Targets from prev attack(14): www.valgardena.it, www.stradeanas.it, www.comune.parma.it, www.ristorantetivolicortina.it, www.skirama.it, www.ski.it, www.comune.giugliano.na.it, www.bormioski.eu, www.herabit.com, www.cortinaexpress.it, www.consiglio.vda.it, www.kronplatz.com, www.dosb.de, www.regione.emilia-romagna.it
Dismissed Targets(2): www.olympiakomitea.fi, www.olympia.at
New Targets(0):
Targets from prev attack(14): www.valgardena.it, www.stradeanas.it, www.comune.parma.it, www.ristorantetivolicortina.it, www.skirama.it, www.ski.it, www.comune.giugliano.na.it, www.bormioski.eu, www.herabit.com, www.cortinaexpress.it, www.consiglio.vda.it, www.kronplatz.com, www.dosb.de, www.regione.emilia-romagna.it
Dismissed Targets(2): www.olympiakomitea.fi, www.olympia.at
2026-02-08_22-05-10
The attacks attributed to noname057 primarily targeted websites in Italy and Germany. Key sectors affected include regional government sites, tourism and ski resort platforms, and local municipality pages. Notable countries under attack are Italy, with multiple regional and municipal sites, and Germany, represented by a sports organization website.AI generated16 targets are under attack, 0 new targets and 16 targets from previous attack
New Targets(0):
Targets from prev attack(16): www.regione.emilia-romagna.it, www.kronplatz.com, www.stradeanas.it, www.ski.it, www.comune.giugliano.na.it, www.bormioski.eu, www.cortinaexpress.it, www.herabit.com, www.dosb.de, www.olympiakomitea.fi, www.consiglio.vda.it, www.comune.parma.it, www.olympia.at, www.valgardena.it, www.ristorantetivolicortina.it, www.skirama.it
Dismissed Targets(1): www.teamdeutschland.de
New Targets(0):
Targets from prev attack(16): www.regione.emilia-romagna.it, www.kronplatz.com, www.stradeanas.it, www.ski.it, www.comune.giugliano.na.it, www.bormioski.eu, www.cortinaexpress.it, www.herabit.com, www.dosb.de, www.olympiakomitea.fi, www.consiglio.vda.it, www.comune.parma.it, www.olympia.at, www.valgardena.it, www.ristorantetivolicortina.it, www.skirama.it
Dismissed Targets(1): www.teamdeutschland.de
2026-02-08_08-05-08
The attacks by noname057 primarily targeted websites in Italy and Germany. Key affected sites include various regional and municipal government platforms, ski resorts, and tourism-related businesses, indicating a focus on the tourism sector in these countries. Notable locations include Emilia-Romagna, Giugliano, and Cortina in Italy, as well as multiple German sites related to sports and tourism.AI generated17 targets are under attack, 0 new targets and 17 targets from previous attack
New Targets(0):
Targets from prev attack(17): www.herabit.com, www.ristorantetivolicortina.it, www.valgardena.it, www.bormioski.eu, www.cortinaexpress.it, www.comune.giugliano.na.it, www.teamdeutschland.de, www.skirama.it, www.comune.parma.it, www.dosb.de, www.olympiakomitea.fi, www.consiglio.vda.it, www.kronplatz.com, www.olympia.at, www.stradeanas.it, www.regione.emilia-romagna.it, www.ski.it
Dismissed Targets(10): www.vbb.de, www.limbach-oberfrohna.de, frontend-api.sbahn-hannover.de, start-ni-mitte.de, www.dortmund.de, www.l.de, www.gladbeck.de, www.vg-arendsee-kalbe.de, www.bmi.bund.de, www.kaiserslautern.de
New Targets(0):
Targets from prev attack(17): www.herabit.com, www.ristorantetivolicortina.it, www.valgardena.it, www.bormioski.eu, www.cortinaexpress.it, www.comune.giugliano.na.it, www.teamdeutschland.de, www.skirama.it, www.comune.parma.it, www.dosb.de, www.olympiakomitea.fi, www.consiglio.vda.it, www.kronplatz.com, www.olympia.at, www.stradeanas.it, www.regione.emilia-romagna.it, www.ski.it
Dismissed Targets(10): www.vbb.de, www.limbach-oberfrohna.de, frontend-api.sbahn-hannover.de, start-ni-mitte.de, www.dortmund.de, www.l.de, www.gladbeck.de, www.vg-arendsee-kalbe.de, www.bmi.bund.de, www.kaiserslautern.de
2026-02-08_07-10-09
The attacks attributed to noname057 primarily targeted websites in Germany, Italy, and Finland. Key sites affected include municipal and regional government portals, tourism and ski-related websites, and sports organizations. Notable examples are the city portals of Kaiserslautern, Gladbeck, and Dortmund in Germany, as well as various Italian sites like those of Val Gardena and Emilia-Romagna. The attacks highlight a focus on infrastructure and public services across these countries.AI generated27 targets are under attack, 0 new targets and 27 targets from previous attack
New Targets(0):
Targets from prev attack(27): www.kaiserslautern.de, www.valgardena.it, www.consiglio.vda.it, www.regione.emilia-romagna.it, www.olympiakomitea.fi, www.olympia.at, www.stradeanas.it, www.gladbeck.de, www.dosb.de, www.comune.giugliano.na.it, www.cortinaexpress.it, www.herabit.com, www.ski.it, www.ristorantetivolicortina.it, www.vg-arendsee-kalbe.de, start-ni-mitte.de, www.bmi.bund.de, www.l.de, www.teamdeutschland.de, www.skirama.it, frontend-api.sbahn-hannover.de, www.vbb.de, www.kronplatz.com, www.limbach-oberfrohna.de, www.comune.parma.it, www.bormioski.eu, www.dortmund.de
Dismissed Targets(5): www.hotelcortina.com, www.delaposte.it, www.hotelambracortina.it, www.franceschiparkhotel.com, www.hotelvictoriacortina.com
New Targets(0):
Targets from prev attack(27): www.kaiserslautern.de, www.valgardena.it, www.consiglio.vda.it, www.regione.emilia-romagna.it, www.olympiakomitea.fi, www.olympia.at, www.stradeanas.it, www.gladbeck.de, www.dosb.de, www.comune.giugliano.na.it, www.cortinaexpress.it, www.herabit.com, www.ski.it, www.ristorantetivolicortina.it, www.vg-arendsee-kalbe.de, start-ni-mitte.de, www.bmi.bund.de, www.l.de, www.teamdeutschland.de, www.skirama.it, frontend-api.sbahn-hannover.de, www.vbb.de, www.kronplatz.com, www.limbach-oberfrohna.de, www.comune.parma.it, www.bormioski.eu, www.dortmund.de
Dismissed Targets(5): www.hotelcortina.com, www.delaposte.it, www.hotelambracortina.it, www.franceschiparkhotel.com, www.hotelvictoriacortina.com
2026-02-08_07-05-10
The attacks by noname057 primarily targeted websites in Germany, Italy, and Finland. Notable sites affected include municipal and regional government portals, tourism and hotel websites, as well as sports organizations. The attacks highlight vulnerabilities in local government and tourism sectors across these countries.AI generated32 targets are under attack, 17 new targets and 15 targets from previous attack
New Targets(17): www.herabit.com, www.valgardena.it, www.teamdeutschland.de, www.bormioski.eu, www.ski.it, www.skirama.it, www.consiglio.vda.it, www.regione.emilia-romagna.it, www.olympiakomitea.fi, www.olympia.at, www.kronplatz.com, www.stradeanas.it, www.comune.parma.it, www.dosb.de, www.comune.giugliano.na.it, www.cortinaexpress.it, www.ristorantetivolicortina.it
Targets from prev attack(15): www.kaiserslautern.de, www.vg-arendsee-kalbe.de, start-ni-mitte.de, www.bmi.bund.de, frontend-api.sbahn-hannover.de, www.hotelcortina.com, www.vbb.de, www.delaposte.it, www.l.de, www.hotelambracortina.it, www.limbach-oberfrohna.de, www.franceschiparkhotel.com, www.gladbeck.de, www.hotelvictoriacortina.com, www.dortmund.de
Dismissed Targets(3): www.zwickau.de, www.tender24.de, reiner-haseloff.de
New Targets(17): www.herabit.com, www.valgardena.it, www.teamdeutschland.de, www.bormioski.eu, www.ski.it, www.skirama.it, www.consiglio.vda.it, www.regione.emilia-romagna.it, www.olympiakomitea.fi, www.olympia.at, www.kronplatz.com, www.stradeanas.it, www.comune.parma.it, www.dosb.de, www.comune.giugliano.na.it, www.cortinaexpress.it, www.ristorantetivolicortina.it
Targets from prev attack(15): www.kaiserslautern.de, www.vg-arendsee-kalbe.de, start-ni-mitte.de, www.bmi.bund.de, frontend-api.sbahn-hannover.de, www.hotelcortina.com, www.vbb.de, www.delaposte.it, www.l.de, www.hotelambracortina.it, www.limbach-oberfrohna.de, www.franceschiparkhotel.com, www.gladbeck.de, www.hotelvictoriacortina.com, www.dortmund.de
Dismissed Targets(3): www.zwickau.de, www.tender24.de, reiner-haseloff.de
2026-02-07_08-05-10
The attacks attributed to noname057(16) primarily targeted websites in Germany and Italy. Key German sites include various municipal and transportation sites such as dortmund.de, kaiserslautern.de, and vbb.de, while Italian targets include hotel websites like hotelcortina.com and delaposte.it. The attacks demonstrate a focus on local government and hospitality sectors in these countries.AI generated18 targets are under attack, 4 new targets and 14 targets from previous attack
New Targets(4): www.vbb.de, start-ni-mitte.de, www.l.de, frontend-api.sbahn-hannover.de
Targets from prev attack(14): www.hotelambracortina.it, www.hotelcortina.com, www.dortmund.de, www.kaiserslautern.de, www.zwickau.de, www.delaposte.it, reiner-haseloff.de, www.limbach-oberfrohna.de, www.franceschiparkhotel.com, www.vg-arendsee-kalbe.de, www.bmi.bund.de, www.gladbeck.de, www.hotelvictoriacortina.com, www.tender24.de
Dismissed Targets(1): casa.tiscali.it
New Targets(4): www.vbb.de, start-ni-mitte.de, www.l.de, frontend-api.sbahn-hannover.de
Targets from prev attack(14): www.hotelambracortina.it, www.hotelcortina.com, www.dortmund.de, www.kaiserslautern.de, www.zwickau.de, www.delaposte.it, reiner-haseloff.de, www.limbach-oberfrohna.de, www.franceschiparkhotel.com, www.vg-arendsee-kalbe.de, www.bmi.bund.de, www.gladbeck.de, www.hotelvictoriacortina.com, www.tender24.de
Dismissed Targets(1): casa.tiscali.it
2026-02-07_07-10-09
The attacks by noname057(16) primarily targeted websites in Germany and Italy. Notable sites include various municipal and governmental portals from Germany such as www.kaiserslautern.de and www.bmi.bund.de, as well as several hotel websites in Italy like www.hotelambracortina.it and www.hotelvictoriacortina.com. The attacks indicate a focus on both local government and hospitality sectors in these countries.AI generated15 targets are under attack, 7 new targets and 8 targets from previous attack
New Targets(7): www.tender24.de, www.hotelambracortina.it, www.delaposte.it, www.vg-arendsee-kalbe.de, www.hotelcortina.com, www.franceschiparkhotel.com, www.hotelvictoriacortina.com
Targets from prev attack(8): www.limbach-oberfrohna.de, reiner-haseloff.de, casa.tiscali.it, www.kaiserslautern.de, www.bmi.bund.de, www.zwickau.de, www.dortmund.de, www.gladbeck.de
Dismissed Targets(42): www.comune.bard.ao.it, www.zdf.de, www.teamdeutschland.de, www.stradeanas.it, www.ristorantetivolicortina.it, www.olympic.sk, www.comune.champorcher.ao.it, www.dosb.de, www.comune.re.it, hostingdomini.tiscali.it, www.teamgb.com, www.olympijskytym.cz, www.simico.it, www.comune.brusson.ao.it, milanocortina2026.coni.it, www.ladige.it, www.comune.avise.ao.it, www.technoalpin.com, www.comune.fontainemore.ao.it, www.olympia.at, www.comune.chamois.ao.it, www.skiaustria.at, www.swissolympicteam.ch, www.olympiakomitea.fi, www.equipedefrance.com, tickets.milanocortina2026.org, www.comune.piacenza.it, sok.se, www.comune.arnad.ao.it, www.tiscali.it, nocnsf.nl, www.comune.challand-st-victor.ao.it, www.ilgiornale.it, www.esselunga.it, www.comune.ayas.ao.it, hospitality.milanocortina2026.org, mail.tiscali.it, www.comune.challand-st-anselme.ao.it, www.leonardo.com, assistenza.tiscali.it, www.comune.etroubles.ao.it, www.ard.de
New Targets(7): www.tender24.de, www.hotelambracortina.it, www.delaposte.it, www.vg-arendsee-kalbe.de, www.hotelcortina.com, www.franceschiparkhotel.com, www.hotelvictoriacortina.com
Targets from prev attack(8): www.limbach-oberfrohna.de, reiner-haseloff.de, casa.tiscali.it, www.kaiserslautern.de, www.bmi.bund.de, www.zwickau.de, www.dortmund.de, www.gladbeck.de
Dismissed Targets(42): www.comune.bard.ao.it, www.zdf.de, www.teamdeutschland.de, www.stradeanas.it, www.ristorantetivolicortina.it, www.olympic.sk, www.comune.champorcher.ao.it, www.dosb.de, www.comune.re.it, hostingdomini.tiscali.it, www.teamgb.com, www.olympijskytym.cz, www.simico.it, www.comune.brusson.ao.it, milanocortina2026.coni.it, www.ladige.it, www.comune.avise.ao.it, www.technoalpin.com, www.comune.fontainemore.ao.it, www.olympia.at, www.comune.chamois.ao.it, www.skiaustria.at, www.swissolympicteam.ch, www.olympiakomitea.fi, www.equipedefrance.com, tickets.milanocortina2026.org, www.comune.piacenza.it, sok.se, www.comune.arnad.ao.it, www.tiscali.it, nocnsf.nl, www.comune.challand-st-victor.ao.it, www.ilgiornale.it, www.esselunga.it, www.comune.ayas.ao.it, hospitality.milanocortina2026.org, mail.tiscali.it, www.comune.challand-st-anselme.ao.it, www.leonardo.com, assistenza.tiscali.it, www.comune.etroubles.ao.it, www.ard.de
2026-02-07_07-05-09
The attacks by noname057(16) have primarily targeted websites in Italy, Germany, and Austria. Notable Italian sites include municipal websites from various regions, such as Bard, Champorcher, and Piacenza, as well as tourism and hospitality-related domains like milanocortina2026.org. German targets include ZDF and various municipal sites like Dortmund and Kaiserslautern. In Austria, sites related to the Olympics and local municipalities were also affected. The attacks indicate a focus on governmental and organizational websites across these countries.AI generated50 targets are under attack, 7 new targets and 43 targets from previous attack
New Targets(7): www.limbach-oberfrohna.de, reiner-haseloff.de, www.kaiserslautern.de, www.bmi.bund.de, www.zwickau.de, www.dortmund.de, www.gladbeck.de
Targets from prev attack(43): www.comune.bard.ao.it, www.zdf.de, www.teamdeutschland.de, www.stradeanas.it, www.ristorantetivolicortina.it, www.olympic.sk, www.comune.champorcher.ao.it, www.dosb.de, www.comune.re.it, hostingdomini.tiscali.it, www.teamgb.com, www.olympijskytym.cz, www.simico.it, www.comune.brusson.ao.it, milanocortina2026.coni.it, www.ladige.it, www.comune.avise.ao.it, www.technoalpin.com, www.comune.fontainemore.ao.it, www.olympia.at, www.comune.chamois.ao.it, www.skiaustria.at, www.swissolympicteam.ch, www.olympiakomitea.fi, www.equipedefrance.com, www.comune.piacenza.it, www.comune.arnad.ao.it, tickets.milanocortina2026.org, sok.se, www.tiscali.it, nocnsf.nl, www.comune.challand-st-victor.ao.it, casa.tiscali.it, www.comune.ayas.ao.it, www.esselunga.it, www.ilgiornale.it, hospitality.milanocortina2026.org, mail.tiscali.it, www.comune.challand-st-anselme.ao.it, www.leonardo.com, assistenza.tiscali.it, www.comune.etroubles.ao.it, www.ard.de
Dismissed Targets(0):
New Targets(7): www.limbach-oberfrohna.de, reiner-haseloff.de, www.kaiserslautern.de, www.bmi.bund.de, www.zwickau.de, www.dortmund.de, www.gladbeck.de
Targets from prev attack(43): www.comune.bard.ao.it, www.zdf.de, www.teamdeutschland.de, www.stradeanas.it, www.ristorantetivolicortina.it, www.olympic.sk, www.comune.champorcher.ao.it, www.dosb.de, www.comune.re.it, hostingdomini.tiscali.it, www.teamgb.com, www.olympijskytym.cz, www.simico.it, www.comune.brusson.ao.it, milanocortina2026.coni.it, www.ladige.it, www.comune.avise.ao.it, www.technoalpin.com, www.comune.fontainemore.ao.it, www.olympia.at, www.comune.chamois.ao.it, www.skiaustria.at, www.swissolympicteam.ch, www.olympiakomitea.fi, www.equipedefrance.com, www.comune.piacenza.it, www.comune.arnad.ao.it, tickets.milanocortina2026.org, sok.se, www.tiscali.it, nocnsf.nl, www.comune.challand-st-victor.ao.it, casa.tiscali.it, www.comune.ayas.ao.it, www.esselunga.it, www.ilgiornale.it, hospitality.milanocortina2026.org, mail.tiscali.it, www.comune.challand-st-anselme.ao.it, www.leonardo.com, assistenza.tiscali.it, www.comune.etroubles.ao.it, www.ard.de
Dismissed Targets(0):
2026-02-06_15-05-10
The attacks by noname057 primarily targeted websites in several countries, including the Netherlands, Finland, Austria, Germany, Italy, Sweden, the Czech Republic, and France. These attacks affected a range of organizations, including Olympic committees, local government sites, media outlets, and service providers, indicating a focus on high-profile and public-facing entities.AI generated43 targets are under attack, 2 new targets and 41 targets from previous attack
New Targets(2): www.ilgiornale.it, www.ladige.it
Targets from prev attack(41): www.olympia.at, nocnsf.nl, www.olympiakomitea.fi, www.dosb.de, www.comune.brusson.ao.it, www.tiscali.it, www.simico.it, www.comune.chamois.ao.it, sok.se, www.comune.fontainemore.ao.it, www.teamdeutschland.de, www.zdf.de, www.comune.challand-st-victor.ao.it, www.swissolympicteam.ch, www.olympijskytym.cz, hostingdomini.tiscali.it, www.equipedefrance.com, www.comune.ayas.ao.it, www.comune.bard.ao.it, www.ristorantetivolicortina.it, hospitality.milanocortina2026.org, www.teamgb.com, www.comune.avise.ao.it, www.technoalpin.com, tickets.milanocortina2026.org, www.comune.piacenza.it, www.comune.champorcher.ao.it, www.comune.re.it, www.comune.arnad.ao.it, www.skiaustria.at, assistenza.tiscali.it, milanocortina2026.coni.it, www.esselunga.it, www.comune.challand-st-anselme.ao.it, www.stradeanas.it, www.olympic.sk, www.ard.de, www.comune.etroubles.ao.it, mail.tiscali.it, casa.tiscali.it, www.leonardo.com
Dismissed Targets(0):
New Targets(2): www.ilgiornale.it, www.ladige.it
Targets from prev attack(41): www.olympia.at, nocnsf.nl, www.olympiakomitea.fi, www.dosb.de, www.comune.brusson.ao.it, www.tiscali.it, www.simico.it, www.comune.chamois.ao.it, sok.se, www.comune.fontainemore.ao.it, www.teamdeutschland.de, www.zdf.de, www.comune.challand-st-victor.ao.it, www.swissolympicteam.ch, www.olympijskytym.cz, hostingdomini.tiscali.it, www.equipedefrance.com, www.comune.ayas.ao.it, www.comune.bard.ao.it, www.ristorantetivolicortina.it, hospitality.milanocortina2026.org, www.teamgb.com, www.comune.avise.ao.it, www.technoalpin.com, tickets.milanocortina2026.org, www.comune.piacenza.it, www.comune.champorcher.ao.it, www.comune.re.it, www.comune.arnad.ao.it, www.skiaustria.at, assistenza.tiscali.it, milanocortina2026.coni.it, www.esselunga.it, www.comune.challand-st-anselme.ao.it, www.stradeanas.it, www.olympic.sk, www.ard.de, www.comune.etroubles.ao.it, mail.tiscali.it, casa.tiscali.it, www.leonardo.com
Dismissed Targets(0):
2026-02-06_11-10-10
The attacks attributed to noname057 primarily targeted websites in Italy, Austria, the Netherlands, Germany, and Finland. Notable sectors affected include local government sites, sports organizations, and hospitality platforms, indicating a diverse range of interests and potential motivations behind the attacks.AI generated41 targets are under attack, 18 new targets and 23 targets from previous attack
New Targets(18): www.comune.brusson.ao.it, www.comune.challand-st-victor.ao.it, hostingdomini.tiscali.it, www.comune.challand-st-anselme.ao.it, www.comune.avise.ao.it, www.comune.ayas.ao.it, casa.tiscali.it, www.tiscali.it, www.comune.arnad.ao.it, www.comune.bard.ao.it, mail.tiscali.it, www.comune.champorcher.ao.it, www.comune.fontainemore.ao.it, www.comune.re.it, www.comune.piacenza.it, assistenza.tiscali.it, www.comune.chamois.ao.it, www.comune.etroubles.ao.it
Targets from prev attack(23): www.teamdeutschland.de, www.stradeanas.it, www.skiaustria.at, nocnsf.nl, tickets.milanocortina2026.org, www.ristorantetivolicortina.it, www.olympia.at, www.olympic.sk, www.olympiakomitea.fi, www.teamgb.com, www.olympijskytym.cz, www.esselunga.it, www.swissolympicteam.ch, sok.se, www.ard.de, www.technoalpin.com, www.zdf.de, milanocortina2026.coni.it, www.leonardo.com, www.equipedefrance.com, www.dosb.de, hospitality.milanocortina2026.org, www.simico.it
Dismissed Targets(0):
New Targets(18): www.comune.brusson.ao.it, www.comune.challand-st-victor.ao.it, hostingdomini.tiscali.it, www.comune.challand-st-anselme.ao.it, www.comune.avise.ao.it, www.comune.ayas.ao.it, casa.tiscali.it, www.tiscali.it, www.comune.arnad.ao.it, www.comune.bard.ao.it, mail.tiscali.it, www.comune.champorcher.ao.it, www.comune.fontainemore.ao.it, www.comune.re.it, www.comune.piacenza.it, assistenza.tiscali.it, www.comune.chamois.ao.it, www.comune.etroubles.ao.it
Targets from prev attack(23): www.teamdeutschland.de, www.stradeanas.it, www.skiaustria.at, nocnsf.nl, tickets.milanocortina2026.org, www.ristorantetivolicortina.it, www.olympia.at, www.olympic.sk, www.olympiakomitea.fi, www.teamgb.com, www.olympijskytym.cz, www.esselunga.it, www.swissolympicteam.ch, sok.se, www.ard.de, www.technoalpin.com, www.zdf.de, milanocortina2026.coni.it, www.leonardo.com, www.equipedefrance.com, www.dosb.de, hospitality.milanocortina2026.org, www.simico.it
Dismissed Targets(0):
2026-02-06_07-05-08
The attacks attributed to noname057(16) have primarily targeted websites associated with the Olympic Games and various national sports organizations. The main countries under attack include Finland, Germany, Italy, the Netherlands, Austria, Switzerland, France, the Czech Republic, and Sweden. These attacks seem to focus on entities related to the upcoming Milan-Cortina 2026 Winter Olympics, as well as national Olympic committees and sports teams.AI generated23 targets are under attack, 23 new targets and 0 targets from previous attack
New Targets(23): www.olympiakomitea.fi, www.ard.de, hospitality.milanocortina2026.org, nocnsf.nl, www.technoalpin.com, www.zdf.de, www.olympic.sk, www.stradeanas.it, www.olympia.at, www.teamgb.com, www.swissolympicteam.ch, www.simico.it, www.dosb.de, tickets.milanocortina2026.org, www.equipedefrance.com, www.olympijskytym.cz, www.skiaustria.at, www.esselunga.it, www.leonardo.com, www.ristorantetivolicortina.it, www.teamdeutschland.de, sok.se, milanocortina2026.coni.it
Targets from prev attack(0):
Dismissed Targets(28): www.bormioski.eu, dolomitibus.it, shop.vulcanair.com, www.olbiagolfoaranci.it, www.porto.trieste.it, vialattea-webshop.axess.shop, www.kronplatz.com, www.ski.it, www.snow-forecast.com, cpanel.vulcanair.com, www.gruppoa2a.it, richiestamodifiche.adm.gov.it, www.amat.pa.it, www.acquanovaravco.eu, skiforum.it, www.globaltenders.com, www.portsofnapa.com, www.skirama.it, w3.ars.sicilia.it, www.cortinaexpress.it, sso.comune.palermo.it, www.sinfomar.it, www.portialtotirreno.it, www.lavoro.gov.it, www.italytenders.com, support.vulcanair.com, assistenza.adm.gov.it, www.valgardena.it
New Targets(23): www.olympiakomitea.fi, www.ard.de, hospitality.milanocortina2026.org, nocnsf.nl, www.technoalpin.com, www.zdf.de, www.olympic.sk, www.stradeanas.it, www.olympia.at, www.teamgb.com, www.swissolympicteam.ch, www.simico.it, www.dosb.de, tickets.milanocortina2026.org, www.equipedefrance.com, www.olympijskytym.cz, www.skiaustria.at, www.esselunga.it, www.leonardo.com, www.ristorantetivolicortina.it, www.teamdeutschland.de, sok.se, milanocortina2026.coni.it
Targets from prev attack(0):
Dismissed Targets(28): www.bormioski.eu, dolomitibus.it, shop.vulcanair.com, www.olbiagolfoaranci.it, www.porto.trieste.it, vialattea-webshop.axess.shop, www.kronplatz.com, www.ski.it, www.snow-forecast.com, cpanel.vulcanair.com, www.gruppoa2a.it, richiestamodifiche.adm.gov.it, www.amat.pa.it, www.acquanovaravco.eu, skiforum.it, www.globaltenders.com, www.portsofnapa.com, www.skirama.it, w3.ars.sicilia.it, www.cortinaexpress.it, sso.comune.palermo.it, www.sinfomar.it, www.portialtotirreno.it, www.lavoro.gov.it, www.italytenders.com, support.vulcanair.com, assistenza.adm.gov.it, www.valgardena.it