{"id":11025,"date":"2021-10-24T10:43:29","date_gmt":"2021-10-24T08:43:29","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=11025"},"modified":"2022-03-25T14:15:39","modified_gmt":"2022-03-25T13:15:39","slug":"monero-mining-pool-fqdns","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/","title":{"rendered":"Monero Mining Pool FQDNs"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Malware that deploys crypto mining software has become more and more popular and annoying. It&#8217;s not always possible to scan every device in your network with our free or commercial compromise assessment scanners.<\/p>\n<p>The good news is that the mining pools for the most popular crypto currency Monero (Symbol: XMR) are limited.<\/p>\n<p>Therefore we&#8217;ve decided to compile a list of these mining pools that you can use to monitor your firewall or DNS servers.<\/p>\n<p>For a very generic approach, your could try using the following patterns:<\/p>\n<p>*xmr.*<br \/>*pool.com<br \/>*pool.org<br \/>pool.*<\/p>\n<p>Our customers can use THOR to scan for scripts, executables, DNS cache, process connections, log entries and other elements for traces of crypto mining activity.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-24-at-10.54.07.png&#8221; title_text=&#8221;Screenshot 2021-10-24 at 10.54.07&#8243; _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Monero Mining Pool Addresses<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.11.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>pool.minexmr.com<br \/>fr.minexmr.com<br \/>de.minexmr.com<br \/>sg.minexmr.com<br \/>ca.minexmr.com<br \/>us-west.minexmr.com<br \/>pool.supportxmr.com<br \/>mine.c3pool.com<br \/>xmr-eu1.nanopool.org<br \/>xmr-eu2.nanopool.org<br \/>xmr-us-east1.nanopool.org<br \/>xmr-us-west1.nanopool.org<br \/>xmr-asia1.nanopool.org<br \/>xmr-jp1.nanopool.org<br \/>xmr-au1.nanopool.org<br \/>xmr.2miners.com<br \/>xmr.hashcity.org<br \/>xmr.f2pool.com<br \/>xmrpool.eu<br \/>pool.hashvault.pro<br \/>moneroocean.stream<br \/>monerocean.stream<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware that deploys crypto mining software has become more and more popular and annoying. It&#8217;s not always possible to scan every device in your network with our free or commercial compromise assessment scanners. The good news is that the mining pools for the most popular crypto currency Monero (Symbol: XMR) are limited. Therefore we&#8217;ve decided to compile a list of these mining pools that you can use to monitor your firewall or DNS servers. For a very generic approach, your could try using the following patterns: *xmr.**pool.com*pool.orgpool.* Our customers can use THOR to scan for scripts, executables, DNS cache, process connections, log entries and other elements for traces of crypto mining activity.Monero Mining Pool Addressespool.minexmr.comfr.minexmr.comde.minexmr.comsg.minexmr.comca.minexmr.comus-west.minexmr.compool.supportxmr.commine.c3pool.comxmr-eu1.nanopool.orgxmr-eu2.nanopool.orgxmr-us-east1.nanopool.orgxmr-us-west1.nanopool.orgxmr-asia1.nanopool.orgxmr-jp1.nanopool.orgxmr-au1.nanopool.orgxmr.2miners.comxmr.hashcity.orgxmr.f2pool.comxmrpool.eupool.hashvault.promoneroocean.streammonerocean.stream<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[87],"tags":[],"class_list":["post-11025","post","type-post","status-publish","format-standard","hentry","category-security-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Monero Mining Pool FQDNs - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Monero Mining Pool FQDNs\",\"datePublished\":\"2021-10-24T08:43:29+00:00\",\"dateModified\":\"2022-03-25T13:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\"},\"wordCount\":306,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"articleSection\":[\"Security Monitoring\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\",\"name\":\"Monero Mining Pool FQDNs - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2021-10-24T08:43:29+00:00\",\"dateModified\":\"2022-03-25T13:15:39+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monero Mining Pool FQDNs - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Monero Mining Pool FQDNs","datePublished":"2021-10-24T08:43:29+00:00","dateModified":"2022-03-25T13:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/"},"wordCount":306,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"articleSection":["Security Monitoring"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/","url":"https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/","name":"Monero Mining Pool FQDNs - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2021-10-24T08:43:29+00:00","dateModified":"2022-03-25T13:15:39+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2021\/10\/24\/monero-mining-pool-fqdns\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=11025"}],"version-history":[{"count":9,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11025\/revisions"}],"predecessor-version":[{"id":11048,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11025\/revisions\/11048"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=11025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=11025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=11025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}