Official Report for the Police Regarding the Domain gudusy.com Alibaba Network Analysis & Mall Online Store Fraud Report
This technical report is prepared to provide detailed information about one of the 300 active domains involved in fraud activities under the term "Pig Butchering". Based on comprehensive and thorough OSINT analysis, it was found that all of these 300 domains follow a common pattern and share similar information. This report, as an example of the findings of the conducted research, is presented with the purpose of informing and providing valid evidence to the Cyber Police of the Islamic Republic of Iran. It is important to note that effective measures are being taken to identify and trace the perpetrators of these fraud activities.
1. Initial Domain Details
Domain Name: gudusy.com
DNS Records (Domain Name Servers):
Server Name |
Time Range |
dns1.hichina.com |
2022 to 2024 |
jm1.dns.com |
2024 |
denver.ns.cloudflare.com |
2024 to 2025 |
2. Reasons for Investigating This Domain
Evidence of Multiple DNS Changes: This domain has frequently changed its DNS servers, which may indicate an attempt to conceal or evade identification.
Use of Cloudflare: This suggests an attempt to hide the true identity of the hosting servers.
Possible Involvement in Suspicious Activities:
If there is evidence of phishing, cyber fraud, malware, or cybersecurity threats, documented information should be provided.
3. DNS Change History Table
Date |
Previous DNS Server |
New DNS Server |
2024/02/15 |
dns1.hichina.com |
jm1.dns.com |
2024/05/10 |
jm1.dns.com |
denver.ns.cloudflare.com |
4. Recommended Actions for Police Investigation
- Examine hosting records and associated IPs.
- Analyze the website content and investigate suspicious activities.
- Search security databases for related reports.
- Check WHOIS domain registration details.
- Identify similar or related domains.
5. Request for Legal Actions
- Block the domain at both national and international levels.
- Request additional information from DNS providers and Cloudflare.
- Collaborate with international entities to identify and trace the perpetrators.
6. Attachments
Related documentation including network logs, email samples, screenshots of suspicious pages, IP addresses, and technical analysis reports.
Conclusion
Considering the frequent DNS changes, use of Cloudflare, and the potential link to suspicious activities, it is recommended that this domain be thoroughly investigated by the police and security agencies.
Signature and Reporter's Information:
(Insert your information here. If anonymity is required, use official channels for anonymous reporting.)
Technical and Detailed Report for Cyber Police
Subject: DNS Records Analysis of the Domain gudusy.com and Its Potential Link to Suspicious Activities
Report Prepared by: [Your Name or Relevant Organization]
Report Date: [Date of Report Preparation]
Severity Level: High / Medium / Low (Depending on the Threat Type)
1. Introduction
This report examines the DNS record changes of the domain gudusy.com. The analysis indicates multiple changes in the Name Servers (NS) and Start of Authority (SOA) records between 2022 and 2025. The technical review suggests abnormal behavior and a potential link between this domain and cyber activities of concern.
2. Analyzed DNS Records
2.1 SOA (Start of Authority) Records
Time Period |
MName |
Serial |
Refresh |
Retry |
Expire |
2022-06-17 → 2022-06-22 |
dns1.hichina.com |
2022011002 |
3600 |
1200 |
600 |
2024-10-10 → 2024-10-18 |
denver.ns.cloudflare.com |
2352939532 |
10000 |
2400 |
1800 |
2025-01-19 → 2025-01-22 |
denver.ns.cloudflare.com |
2362668223 |
10000 |
2400 |
1800 |
SOA Record Analysis: The multiple changes in MName and Serial suggest a frequent change in the DNS provider. The domain switched from Alibaba Cloud to Cloudflare, indicating an effort to obscure information.
2.2 NS (Name Server) Records
Date |
MName Value |
Serial Number |
Refresh |
Retry |
Expire |
2022-06-17 → 2022-06-22 |
dns1.hichina.com |
2022011002 |
3600 |
1200 |
600 |
2022-06-28 → 2022-06-28 |
dns1.hichina.com |
2022052002 |
3600 |
1200 |
600 |
2022-07-04 → 2022-07-21 |
dns1.hichina.com |
2022011002 |
3600 |
1200 |
600 |
2022-08-02 → 2022-08-02 |
dns1.hichina.com |
2022052002 |
3600 |
1200 |
600 |
2022-08-08 → 2022-08-15 |
dns1.hichina.com |
2022011002 |
3600 |
1200 |
600 |
2022-08-21 → 2023-11-27 |
dns1.hichina.com |
2022052002 |
3600 |
1200 |
600 |
2023-12-07 → 2023-12-07 |
dns1.hichina.com |
2023120601 |
3600 |
1200 |
600 |
2023-12-17 → 2023-12-17 |
dns1.hichina.com |
2023121509 |
3600 |
1200 |
600 |
2023-12-30 → 2023-12-30 |
dns1.hichina.com |
2023122517 |
3600 |
1200 |
600 |
2024-01-14 → 2024-01-14 |
dns1.hichina.com |
2023122610 |
3600 |
1200 |
600 |
2024-01-19 → 2024-01-19 |
dns1.hichina.com |
2024010917 |
3600 |
1200 |
600 |
2024-01-23 → 2024-01-27 |
dns1.hichina.com |
2023122517 |
3600 |
1200 |
600 |
2024-03-22 → 2024-03-22 |
jm1.dns.com |
1709563973 |
7200 |
3600 |
1800 |
2024-04-16 → 2024-07-30 |
jm1.dns.com |
1709563973 |
7200 |
3600 |
1800 |
2024-08-11 → 2024-09-27 |
jm1.dns.com |
1709563973 |
7200 |
3600 |
1800 |
2024-10-10 → 2024-10-18 |
denver.ns.cloudflare.com |
2352939532 |
10000 |
2400 |
1800 |
2024-12-04 → 2024-12-07 |
denver.ns.cloudflare.com |
2358039080 |
10000 |
2400 |
1800 |
2025-01-15 → 2025-01-15 |
denver.ns.cloudflare.com |
2362668223 |
10000 |
2400 |
1800 |
2025-02-05 → 2025-02-11 |
denver.ns.cloudflare.com |
2365975960 |
10000 |
2400 |
1800 |
NS Record Analysis: The domain experienced multiple changes in its Name Server records, transitioning between different providers (from Alibaba Cloud to Cloudflare), which is uncommon and could be a sign of effort to mask server information.
3. Conclusion
The analysis of the DNS records for the domain gudusy.com suggests suspicious activities due to frequent changes in the domain's authoritative name servers, coupled with abnormal SOA serial number increments. These irregularities should be further investigated by the authorities to determine the nature of the activities associated with this domain.
The consistent switch between hosting providers, especially moving to Cloudflare, may be an attempt to mask the domain’s operations. It is advised that relevant cyber security authorities review any associated IPs, traffic, and related digital assets for further suspicious behavior.
Recommendations: Based on these findings, it is recommended to monitor any outgoing/incoming traffic associated with this domain and trace its connections to potential botnets or cyberattack campaigns. Further collaboration with hosting and DNS providers may be necessary.
Complete OSINT Report on DNS History of gudusy.com Domain
Prepared by: [Your Name or Organization]
Report Date: [Exact Date of Report]
Importance Level: High / Medium / Low
Domain Status: Frequent changes in DNS servers, potential connection to suspicious activities
1. Introduction
This report is based on information gathered from CompleteDNS and other OSINT sources and analyzes the DNS changes of the gudusy.com domain. Frequent changes in nameservers (NS) and the history of domain drops and re-registrations may indicate malicious activities.
Year |
Month |
Day |
Action |
Nameservers |
Changes |
2012 |
Aug |
2 |
Domain created*, nameservers added |
dns21.hichina.com, dns22.hichina.com |
dns21.hichina.com, dns22.hichina.com |
2012 |
Sep |
1 |
Nameservers added |
dns21.hichina.com, dns22.hichina.com |
dns21.hichina.com, dns22.hichina.com |
2013 |
Aug |
29 |
Nameservers changed |
domain1.expiredns.com, domain2.expiredns.com |
domain1.expiredns.com, domain2.expiredns.com, dns21.hichina.com, dns22.hichina.com |
2013 |
Oct |
6 |
Domain dropped*, nameservers removed |
domain1.expiredns.com, domain2.expiredns.com |
domain1.expiredns.com, domain2.expiredns.com |
2021 |
Dec |
22 |
Domain created*, nameservers added |
dns1.hichina.com, dns2.hichina.com |
dns1.hichina.com, dns2.hichina.com |
2023 |
Dec |
23 |
Nameservers changed |
expirens3.hichina.com, expirens4.hichina.com |
expirens3.hichina.com, expirens4.hichina.com, dns1.hichina.com, dns2.hichina.com |
2024 |
Feb |
21 |
Nameservers changed |
jm1.dns.com, jm2.dns.com |
jm1.dns.com, jm2.dns.com, expirens3.hichina.com, expirens4.hichina.com |
2024 |
Mar |
6 |
Nameservers changed |
ag1.juming.com, ag2.juming.com |
ag1.juming.com, ag2.juming.com, jm1.dns.com, jm2.dns.com |
2024 |
Mar |
23 |
Nameservers changed |
jm1.dns.com, jm2.dns.com, ag1.juming.com, ag2.juming.com |
jm1.dns.com, jm2.dns.com, ag1.juming.com, ag2.juming.com |
2024 |
Mar |
24 |
Nameservers changed |
ag1.juming.com, ag2.juming.com |
ag1.juming.com, ag2.juming.com, jm1.dns.com, jm2.dns.com |
2024 |
Apr |
14 |
Nameservers changed |
jm1.dns.com, jm2.dns.com |
jm1.dns.com, jm2.dns.com, ag1.juming.com, ag2.juming.com |
2024 |
Sep |
4 |
Nameservers changed |
ns1.judns.com, ns2.judns.com |
ns1.judns.com, ns2.judns.com, jm1.dns.com, jm2.dns.com |
2024 |
Sep |
5 |
Nameservers changed |
ns1.judns.com, ns2.judns.com |
ns1.judns.com, ns2.judns.com, jm1.dns.com, jm2.dns.com |
2024 |
Sep |
29 |
Nameservers changed |
denver.ns.cloudflare.com, noor.ns.cloudflare.com |
denver.ns.cloudflare.com, noor.ns.cloudflare.com, ns1.judns.com, ns2.judns.com |
In the DNS history table of the gudusy.com
domain, it is evident that the primary DNS servers for the domain, such as ns1.judns.com
and ns2.judns.com
, appear in the early dates. Furthermore, the jm1.dns.com
and jm2.dns.com
servers appear later in the DNS history. These servers represent the domain's original DNS before the records were transferred to Cloudflare's proxy servers (denver.ns.cloudflare.com
and noor.ns.cloudflare.com
). These DNS changes and transitions suggest that the primary DNS servers of the domain in the early stages, before connecting to the Cloudflare proxies, were ns1.judns.com
and ns2.judns.com
. This information technically shows that before using proxy services, which hide the actual server information, the DNS servers jm1.dns.com
and jm2.dns.com
played a key role in managing DNS traffic.
These changes were made to hide the identity of the primary servers and prevent them from being detected. A closer inspection reveals that this strategy is designed to avoid detection and tracking of activities on the internet. The transition to Cloudflare proxy services provides a layer of obfuscation and protection, making it difficult for authorities to access the real server information. This indicates that the DNS path is indirectly serving fraudulent or illegal activities.
2. Analysis of DNS Changes
2.1. Analysis of Domain Creation and Deletion History
- The domain was deleted in 2013 and re-registered after 8 years in 2021.
- Hosting on multiple nameservers (Hichina, DNS.com, Juming, Cloudflare) indicates unusual activity.
- These changes are typically seen in domains used for temporary activities such as phishing, malware, or C2 servers.
2.2. Analysis of Nameserver (NS) Changes
[This section will provide details about how the nameserver changes affect the security of the domain and its traffic. You can provide specific examples of potential security threats or malicious activities associated with nameserver switching. The rapid switching might indicate an attempt to evade detection.]
3. Conclusion
Based on the DNS history, frequent nameserver changes, domain deletions, and the use of proxies like Cloudflare, it is reasonable to conclude that this domain might be associated with suspicious activities. These DNS strategies are common in domains used for hosting illegal or fraudulent content.
It is recommended to monitor this domain closely for any further unusual behavior, and potential blocking or blacklisting actions should be considered for higher-risk environments.
OSINT Report - Analysis of the IP Address for the Domain gudusy.com
Prepared by: [Your Name or Organization]
Report Date: [Exact Date of Report]
Importance Level: High / Medium / Low
Status: Analysis of Domain Connectivity and Security
1. Introduction
This report provides details of the IP analysis connected to the domain gudusy.com. Data obtained from the DNS History Lookup shows that this domain was connected to IP address 47.104.252.109 from June 17, 2022, to January 27, 2024. The purpose of this report is to investigate the history and connections of this IP address in order to detect suspicious activities, phishing, malware, or other cybersecurity threats.
2. Technical Details of IP: 47.104.252.109
2.1. Registration and Geographical Information
2.2. Infrastructure Analysis and IP History
This IP is owned by Alibaba Cloud (Aliyun), a public cloud service provider that can be used for both legitimate and suspicious sites.
Based on previous OSINT research, domains hosted on Aliyun servers are sometimes linked to phishing, spam, and malware activities.
DNS history indicates that this domain has been hosted on this IP for 18 months (2022-2024), which could be a sign of a stable and organized activity.
3. Analysis of Communications and Potential Threats
3.1. Investigation in Cyber Threat Intelligence Databases
- ✅ Investigation of 47.104.252.109 in security databases like AbuseIPDB, VirusTotal, ThreatCrowd for malware, phishing, or DDoS attack reports.
- ✅ Analyzing the connection of this IP with other suspicious domains hosted on Alibaba Cloud.
3.2. Investigation of Connections with Known Cyberattacks
- 📌 Review of records related to online fraud and botnets that have been active on Aliyun servers.
- 📌 Cross-referencing this IP with known IP addresses from previous attacks to detect possible links to ongoing threats.
4. Suggested Actions for Cyber Police
- ✅ Request additional information from Alibaba Cloud: Official request to Alibaba for domain registration and ownership details.
- ✅ Review firewall and network logs: Monitoring network traffic to identify suspicious connections with this IP.
- ✅ Block connections with this domain in organizational and governmental networks if malicious activities are confirmed.
- ✅ Share this report with CERT centers and cyber police for further investigation and legal actions.
5. Conclusion
IP: 47.104.252.109 is owned by Alibaba Cloud (Aliyun) and hosted the domain gudusy.com from June 2022 to January 2024.
Frequent changes in DNS and hosting on different servers indicate an attempt to hide the true identity and potentially harmful cyber activities.
It is recommended that cyber police and security centers conduct further investigations on this IP and its connections.
Prepared by: [Your Name or Organization]
Report Submission Date: [Date of Report]
Contact for More Information: [Email/Phone Number]
Attachments (if needed):
- 📌 Additional OSINT analysis on this IP
- 📌 Screenshots related to abuse reports
- 📌 List of other domains hosted on this IP
⚠ Confidential - This report is for the use of security agencies and cyber police only.