...

Deep Code

contact@decodecybercrime.com

Bearhost Bolts — But the Investigation Is Just Beginning

Bearhost Bolts — But the Investigation Is Just Beginning

Bearhost — one of the largest bulletproof hosting providers, also known as UNDERGROUND and VOODOO SERVERS — pulled off an exit scam in early May 2025, marking the end of its nine-year operation. A screenshot of a related message—originally posted by X.com user @club31337—was shared on Exploit[.]in by the user voodoo_servers (ID: 150104).In this investigation, we combined the expertise of our offshore investigators with OSINT techniques and blockchain analysis to identify the operators behind Bearhost, map their extended network, and expose their illicit clientele.

Bearhost maintained an active presence on underground forums such as Exploit[.]in, carder[.]market, and breachforums[.]st, and was notably active on Telegram. Their Telegram footprint was documented in a November 2023 article by @joshuapenny88 on Medium. A screenshot of Bearhost-associated Telegram accounts, as captured in that report, is included below.

In November 2023, Medium user @joshuapenny88 conducted an investigation into the bulletproof hosting provider Chang Way Technologies Co. Limited (Registration No. 72251304), a company incorporated in Hong Kong on 23 September 2020. Below is a screenshot of the company’s registration record as listed in the Hong Kong Companies Registry.

Medium user @joshuapenny88 uncovered that Chang Way Technologies Co. Limited, operating under ASN AS57523, was linked to 3,328 unique IPv4 addresses, primarily distributed across Saint Petersburg and Moscow, with a smaller subset located in Hong Kong.

Additionally, the company was associated with the domain changway.hk, registered using the email bernard.webmail@gmail.com and the registrant name “Victor Zaycev”. Zaycev was also found to be connected to another Hong Kong-based entity, Cat Technologies Co. Limited (Registration No. 73819094), registered at the same physical address.

Further investigation by @joshuapenny88, using historical DNS records, revealed another email—processor.webmail@gmail.com—listed as the SOA RNAME for changway.hk.

Using Osint.Industries, we determined that processor.webmail@gmail.com was used to register accounts on the following platforms:

Platform Username / ID Notes
Google 116053294777095834771 N/A
Chess.com

G00DM4N13 / 199988697

Registered: 3 October 2022

Name: Lenar Davletshin

Location: Bangkok, Thailand

Premium account

Pinterest N/A N/A
Adobe N/A N/A
DigitalOcean (cloud) N/A N/A
Apple N/A Phone Hint: * (***) ***-**-91
Samsung N/A +798**06**91

Company Registration Records – Hong Kong, Russia, Cyprus

We conducted a deeper review of the company registration records for the two Hong Kong entities previously identified: Chang Way Technologies Co. Limited (Registration No. 72251304) and Cat Technologies Co. Limited (Registration No. 73819094). The filings revealed that both companies list a Russian national, Lenar Davletshin, as their shareholder and director. Relevant screenshots of the registration documents are provided below.

We conducted additional searches for Lenar Davletshin in the Russian company registry. The companies linked to him are listed in the table below.

Company Name Registration Records / Date Notes
Davletshin Lenar Igorevich

[ДАВЛЕТШИН ЛЕНАР ИГОРЕВИЧ]

INN: 500516641210

Registered: 8 May 2014

Status: Active

 
Red Byte

[ООО “КРАСНЫЙ БАЙТ”]

INN: 7814769133

OGRN: 1197847233154

Registered: 26 November 2019

Location: Saint Petersburg

Main activity:

Communication activities based on wired technologies

Status: Active

For 2023, the company’s loss amounted to 72,972 thousand rubles ($885 USD as of 10 May 2025)
INFORMATION TECHNOLOGIES (IT)

[ООО “ИТ”]

INN: 7840072571

OGRN: 1177847370788

Registered: 16 November 2017

Location: Saint Petersburg

Main activity: Consulting activities and work in the field of computer technology

Status: Inactive since 20 January 2023 (excluded from the Unified State Register of Legal Entities due to inaccuracy records)

 
HOSTWAY

[ООО “ХОСТВЭЙ”]

INN: 7802698897

OGRN: 1197847226829

Registered: 18 November 2019

Location: Saint Petersburg

Main activity: Communications based on wired technologies

Status: Inactive since 20 January 2023 (excluded from the Unified State Register of Legal Entities due to inaccuracy records)

 
HOSTWAY RUS

[ООО “ХОСТВЭЙ РУС”]

INN: 7810900115

OGRN: 1207800095744

Registered: 4 August 2020

Location: Saint Petersburg

Main activity: Communications based on wired technologies

Status: Inactive since 31 March 2022

 
TRIOSTARS

[ООО “ТРИОСТАРС”]

INN: 7730702929

OGRN: 1147746236010

Registered: 7 March 2014

Location: Moscow

Main activity: retail trade, carried out directly with the help of the information and communication network Internet

Status: Inactive since 19 September 2016

The company was headed by DAVLETSHINA ALMIRА VENEROVNA (INN: 164901748826); DAVLETSHIN LENAR IGOREVICH was co-founder.
“F1”

[ООО “Ф1”]

INN: 9724052144

OGRN: 1217700302775

Registered: 24 June 2021

Location: Moscow

Main activity: repair of computers and peripheral computer equipment

Status: Inactive since 13 June 2024

For 2023, the company’s loss amounted to 2 thousand rubles.

DAVLETSHIN LENAR IGOREVICH was co-founder. BOBKOVA TATYANA VIKTOROVNA (INN: 773104002072) was General Director.

Davletshin Lenar Igorevich was also found to be connected to an active company registered in Nicosia, CyprusSTARCRECIUM LIMITED (Registration No. HE410784), incorporated on 6 July 2020. The company is managed by Svilen Spasov (Director; associated with approximately 121 other entities), while Emil Tsunizhov serves as Secretary (linked to approximately 32 other companies). STARCRECIUM LIMITED has also been associated with hostway.ru, as illustrated in the screenshot below.

Two historical IP subnets — 45.146.166.0/23 and 152.89.198.0/24 — were linked to STARCRECIUM LIMITED based on a May 2021 post titled To the Asshole in Cyprus Attacking the MV Server”.

Further evidence of a connection between Chang Way Technologies Co. Limited and STARCRECIUM LIMITED was detailed in an August 2022 article titled Analyzing Attack Data and Trends Targeting Ukrainian Domains”. The report highlighted IP address 152.89.196.102, previously geolocated in Russia and part of an ASN registered to Chang Way but assigned to Starcrecium. According to the article, this IP was blocked 78,438 times on .ua domains and was responsible for a total of 3,803,734 blocked attack attempts globally.

changway.hk – Insights from Breach Data Analysis

We conducted additional searches for the domain changway.hk across various breach datasets to gather more information. The relevant record is displayed in the table below.

Breach Dataset Details
WineStyle.ru, October 2024 (the database of the largest Russian wine retailer) Email: dl@changway.hk

Phone: 798******91

IP addresses: 185.81.68.149 (Chang Way Technologies Co. Limited; geolocated in St. Petersburg, Russia)

91.197.11.222 (GP Internet Ltd; geolocated in Moscow)

Name: Davletshin

A reverse phone number lookup for 798******91 conducted through Osint.Industries revealed the following online accounts.

Platform Username / ID Notes
WhatsApp N/A N/A
Telegram Voodooserv / 6798641294 Name: VOODOO

Last Seen: 2025-04-30T07:31:36+00:00

Yandex N/A N/A
Facebook N/A N/A
VIEWCALLER   Name: Ленар Давлетшин

[Lenar Davletshin]

Microsoft B025C7302134E7CB Name: Lenar Davletshin

Location: Russia

Email: ecocor@yandex.ru

Last Seen: 2025-04-09T05:15:55.740000+00:00

Apple N/A Email: ecocor@yandex.ru

The phone number 798******91 was also associated with the Telegram channel tunast0ck, which offers bulletproof servers. It is connected to tunastock (ID: 358642344) and @Insidder_Incc (ID: 5775809485).

Building on the Telegram accounts previously linked to Bearhost, as identified by @joshuapenny88 in his Medium article, we conducted additional searches to map the current active Telegram accounts associated with Bearhost. A summary of the findings is provided in the table below.

Platform / Type  Username / ID Notes
Telegram, channel @dear31337 /

-1001307148482

Display Name: @bear31337 BEARHOST

771 subscribers

Admin: @bear31337 (t.me/HitSeller)

Jabber: bearhost@exploit.im

Telegram, username @bear31337 / 5391735940 Display Name: BEAR SERVERS
Telegram, username @HitSeller / 1022584088 Display Name: 🏴‍☠️Bear Host
Telegram, channel @beor31337 /

-1001978851488

Display Name: bear31337 ✴️

15 subscribers

Seller: @ricco_sups (ID: 5858167344)

Telegram, username @bearhost / 800399696 Display Name: BEAR HOST
Telegram, username @bearhosting / 6274839068 Display Name: BEAR HOST
Telegram, channel @underground81337 /

-1001416509206

Display Name: Bulletproof servers [ @underground31337]

318 subscribers

Telegram, channel @underground313370 /

-1001673616819

11 subscribers

Seller: @sellergods (Display Name: Trofim)

Telegram, username @underground31337 /

2028655744

Display Name: John Smith
Telegram, username @underground313371 /

5133937618

Display Name:

@underground31337

Telegram, channel @underground313377 /

-1001536088771

Display Name:

@underground31337

72 subscribers

Telegram, channel @underground31337_info /

-1001716719566

Display Name:

@underground31337

2,058 subscribers

Telegram, channel @Bear31137 /

-1001686487199

Display Name:

Bear31337 [SERVERS]

1,386 subscribers

Admin:@Bear31337 (t.me/Subadm1)

Telegram, channel @bear31337_official /

-1001558020440

Display Name: bear31337

2,792 subscribers

Telegram, username @billing31337 / 6009237494 Display Name:

UNDERGROUND SERVERS

Domain and IP Infrastructure

Through Fofa.info and Shodan.io, we mapped the domain and IP infrastructure associated with Bearhost. The favicon hash 931731413 was found to be linked to Bearhost’s websites. A search using this hash revealed the domains, servers, and infrastructure providers listed below.

Domain Server / Geolocation Infrastructure Provider / Details
N/A 193.201.9.152, Russia OOO Selectel (AS49505)

Certificate Issuer: Hostway

Country: Russia

CommonName: 192.168.200.151

Email Address:

webmaster@hostway.ru

Header:

X-Powered-By: PHP/8.3.1

N/A 193.201.9.153, Russia Title: UNDERGROUND/BEARHOST

OOO Selectel (AS49505)

Certificate CommonName:

billing.hostway.ru

Header:

Vary: X-Inertia

X-Powered-By: PHP/8.3.3

31337.ru 172.67.69.209, United States Title: UNDERGROUND/BEARHOST

Cloudflare Inc (AS13335)

Certificate CommonName: 31337.ru

Header:

Vary: X-Inertia

X-Powered-By: PHP/8.3.3

Three more domains were uncovered during the OSINT investigation.

Domain Server / Geolocation Infrastructure Provider / Details
changway.hk Last IP: 92.255.85.113 , Hong Kong

(hostway.ru was hosted on the same IP address in the past)

Chang Way Technologies Co. Limited

 

31337.hk Last IP: 172.67.181.146, United States

(Historic IP: 185.11.61.251, Hong Kong)

Cloudflare Inc (AS13335)

The domain 31337.hk previously hosted the subdomain bearhost.31337.hk, which also appeared as the Common Name in historical SSL certificates

hostway.ru Last IP: 185.215.113.104, Seychelles

(Historically hosted on IP: 176.113.115.5, Hong Kong; hosting provider, Cat Technologies Co. Limited)

1337Team Limited (ELITETEAM) – bulletproof hosting provider operated from Russia

Notably, 31337.ru was previously hosted on the IP address 185.11.61.251, geolocated in Russia, and was linked to STARCRECIUM LIMITED. Additionally, Cat Technologies Co. Limited was found to be associated with the email/domain abuse@starcrecium.com, as indicated in the registration records for AS57678 (Cat Technologies) displayed in the RIPE Database.

Using Shodan.io, we mapped the IP servers associated with Chang Way Technologies Co. Limited. As of 10 May 2025, 1,016 servers were identified as being geolocated in Russia. A screenshot of the findings is provided below.

A similar search was conducted for Cat Technologies Co. Limited, revealing 44 servers geolocated in Russia as of 10 May 2025. CrdPro (CrdPro.link), a credit card-selling forum, was identified as one of their customers.

Using the Hurricane Electric BGP tool, it was found that as of 10 May 2025, all IPv4 prefixes linked to AS57523 (Chang Way Technologies Co. Limited) were down. Two prefixes, 80.64.30.0/24 and 185.42.12.0/24, were connected to Horizon LLC, which is geolocated in the UAE, possibly indicating the current location of the operator or their associates. The only peer IPv4 company identified was Global Network Management Inc (AS31500; trade name “GNM Inc”), registered in Antigua and Barbuda and managed by Vladimir V. Vedeneev from the Netherlands. GNM Inc. is a backbone network operator.

Horizon LLC is located in Moscow, Russia, with Evgeniy Atnalin listed as the admin in RIPE records. Further investigation in the Russian company registry uncovered OOO “HORIZONT” [ООО “ГОРИЗОНТ”; INN: 9704085529; OGRN: 1217700401236], a company previously managed by Evgeniy Valerievich Atnalin (INN: 595702205104; not a professional income taxpayer as of 22 January 2025). This company, which was registered on 26 August 2021, and de-registered on 18 December 2024, primarily engaged in wholesale trade of timber, building materials, and sanitary equipment.

Regarding Cat Technologies Co. Limited (AS57678), the Hurricane Electric BGP tool showed that the ASN has been absent from the global routing table since 29 April 2025. The only identified peer IPv4 company is iHome LLC (AS25478), based in Moscow, Russia.

Bearhost’s Customers via Domain/IP Infrastructure

In his Medium article, @joshuapenny88 has associated Chang Way Technologies Co. Limited with the malicious activities listed in the below screenshot.

In the article Proton66 Part 2: Compromised WordPress Pages and Malware Campaigns, Trustwave identified a connection between Proton66 (AS198953) and Chang Way Technologies through shared IP addresses involved in phishing and malware activities. Trustwave detailed various malware campaigns associated with Proton66, including compromised WordPress sites redirecting Android users to fake Google Play stores, an XWorm campaign targeting Korean-speaking chat room users, and the WeaXor Ransomware.

In February 2025, KrebsOnSecurity published an article titled Notorious Malware, Spam Host ‘Prospero’ Moves to Kaspersky Lab, in which they noted that in 2024, the French security firm Intrinsec reported a link between PROSPERO (AS200593) and Proton66 (AS198953) to bulletproof hosting services promoted on Russian underground forums under the names Securehost, UNDERGROUND, and BEARHOST.

Intrinsec’s analysis revealed that Prospero frequently hosted malware operations, including SocGholish and GootLoader. Other examples of malicious activity linked to PROSPERO (AS200593) and Proton66 (AS198953) include ransomware groups (e.g., SuperBlack) and infostealers (e.g., Strela Stealer, Lumma Stealer).

Notably, Proton66 (AS198953) is associated with the IPv4 prefix 91.212.166.0/24, which is linked to Next Limited (Registration no. 76321783), a company registered in Hong Kong on 15 March 2024. The company became dormant on 11 April 2024. Next Limited is registered at Room 1405, 135 Bonham Strand Trade Centre, 135 Bonham Strand, Sheung Wan, Hong Kong.

The company is managed by Fedor Berg (a Kyrgyzstani national) and Ilya Pojarkow. Next Limited was identified with ASN 50159, which has not been visible in the global routing table since 23 November 2023.

Fedor Berg also serves as the director of another company, Address Limited (registration number: 77270008), registered on 4 November 2024. Address Limited was found to be associated with the website addressn.com. Previously, Address Limited was linked to three ASNs: 62300 (currently associated with Intercom LLC), 61048 (currently linked to InfoLink LLC), and 50308 (currently connected to Mosnet LLC).

Blockchain Analytics via AMLBot – Insights into Illicit Transactions

Using AMLBot.com, we investigated Bitcoin addresses linked to Bearhost, revealing valuable insights into the associated illicit entities through incoming illicit transactions.

The first BTC cluster revealed the following relevant incoming illicit transactions, listed from the highest to lowest BTC amount.

Incoming Source Category Amount (BTC)
FTX Thief 2022 Stolen coins 0.05458228
Ripple Co-Founder Thief 2024 Stolen coins 0.02757337
Change Healthcare Ransom Ransom 0.02458511
Hydra Marketplace Dark market; sanctions 0.01355092
Incognito Market Dark market 0.04283006
WeTheNorth Dark market 0.00956383
Black Sprut Dark market 0.00698933
Legit Western Union Hack and Bank Transfer Dark market 0.00616197
SafelyChange (prev. NetEx24.net) Sanctions 0.00571469
SamSam (Samas) Ransom 0.00534926
MEGA DARKNET MARKET Dark market 0.00486688
Samourai Wallet Enforcement action 0.00471056
ASAP Market Dark market 0.00381819
OMG!OMG! Dark market 0.00115408
InfoDig Dark market 0.00007119

The second BTC cluster uncovered the following relevant incoming illicit transactions, ranked from highest to lowest BTC amount.

Incoming Source Category Amount (BTC)
Potential BTCTurk Thief 2024 Stolen coins 0.03126843
MEGA DARKNET MARKET Dark market 0.029671
InfoDig Dark market 0.01710825
Genesis Marketplace Sanctions 0.01575969
Kraken Darknet Dark market 0.01572785
OMG!OMG! Dark market 0.01020887
Black Sprut Dark market 0.01007156
Ripple Co-Founder Thief 2024 Stolen coins 0.00580702
Bybit Thief 2025 Stolen coins 0.00559741
DMM Bitcoin Thief 2024 Stolen coins 0.00459929
Lazarus Group Sanctions 0.00454
Legit Western Union Hack and Bank Transfer Dark market 0.0049818
Garantex Sanctions 0.00484315
Stake Thief 2023 Stolen coins 0.00241701
eXch Exchange Illegal service; enforcement action 0.00278784
FTX Thief 2022 Stolen coins 0.00146631
Verifpro fake ids Dark market 0.00078313
Solaris Dark market 0.00014799
OFAC: ZSERVERS Sanctions 0.00005306
OnionLABS Botnet Service Dark market 0.00002697

The third BTC cluster uncovered the following relevant incoming illicit transactions, listed from highest to lowest BTC amount.

Incoming Source Category Amount (BTC)
Genesis Marketplace Sanctions 1.69974947
Garantex Sanctions 0.4694078
Black Sprut Dark market 0.21621169
Russian Anonymous Marketplace Dark market 0.09242346
MEGA DARKNET MARKET Dark market 0.09159432
Tejodes Ransom 0.07937664
Abraxas Dark market 0.05056351
Hydra Marketplace Dark Market; Sanctions 0.0403249
MedusaLocker Ransom 0.03593824
LockBit 2.0 Ransom 0.03559414
Kraken Darknet Dark market 0.03480828
ASAP Market Dark market 0.03285443
OMG!OMG! Dark market 0.03112564
InfoDig Dark market 0.02992
Abacus Market Dark market 0.02102798
UniCCShop Dark service 0.0195082
Conti Ransom 0.01492756
Incognito Market Dark market 0.00684457
coinbase-drop.com Scam 0.00617168
Makop Ransom 0.00218484
Eternity Dark market 0.00036872
Nobitex Sanctions 0.00002348

Predictive Insights – Beyond the Exit Scam

Following Bearhost’s exit scam, it is highly probable that the malicious activities previously conducted within their network will shift towards PROSPERO (AS200593) and Proton66 (AS198953), as well as the Hong Kong-based entities, Next Limited and/or Address Limited.

Moving forward, our efforts will be focused on monitoring these bulletproof hosting providers and tracking any emerging illicit entities that could arise from this shift.

administrator

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.