2025 Report: 10 Million Abusive URLs from SecuNET/CryptoServers

Analysis of AS208273 (CryptoServers/SecuNET) reveals a large-scale operation centered on the systematic distribution of NCSEI. SecuNET coordinates an ecosystem of domains that distribute and abuse NCSEI content with registered IPs in Belize and the Seychelles.

Over 10.7 million URLs reported for abuse is currently hosted on SecuNET, ignoring standard DMCA protocols through a complex chain of upstream providers including Melbikomas UAB (AS56630),  IP Volume (AS202425), and FiberXpress BV (AS57717).

Reports from Google Transparency Report confirms that this single family of domains has been linked to over 10.7 million unique URLs submitted for delisting. This scale of reporting highlights SecuNET’s centralized infrastructure optimized specifically to profit from distributing non-consensual content while bypassing standard regulatory oversight.

Delisting Requests by Domain

Security Warning: The hosts of the domains identified below are known for high-risk activity, including the distribution of malware, NCSEI, and aggressive user tracking. Interaction with these websites is not recommended.

Website Domain URLs Requested for Delisting Google Transparency Report
webcamrecordings[.]com 5,421,095 Live ReportArchive
camcaps[.]me 1,424,840 Live ReportArchive
fastimages[.]org 856,836 Live ReportArchive
camshowsrecorded[.]com 813,199 Live Report, Archive
teencamvideos[.]me 614,513 Live Report, Archive
nakedcamvideos[.]me 456,566 Live Report, Archive
sweetcams[.]me 557,748 Live Report, Archive
nakedcams[.]me 498,670 Live Report, Archive
hardcorecams[.]me 99,940 Live Report, Archive
camsexvideos[.]me 29,490 Live Report, Archive
Total Reported Infringements 10,772,897 Aggregated

Upstream Infrastructure: Melbicom, IP Volume, and FiberExpress

Connectivity graph of CryptoServers/SecuNET (AS208273) network infrastructure, revealing dependencies on Melbicom (AS56630), IP Volume (AS202425), and FiberXpress BV (AS57717). Retrieved from bgp.tools, December 26, 2025.

Connectivity graph of CryptoServers/SecuNET (AS208273) network infrastructure, revealing dependencies on Melbicom (AS56630), IP Volume (AS202425), and FiberXpress BV (AS57717). Retrieved from bgp.tools, December 26, 2025.

Analysis of the network topology reveals that IP Volume (AS202425), based in the Seychelles, and Melbicom/Melbikomas UAB (AS56630), based in Lithuania, provides the critical transit layer for the network. IP Volume relies on FiberExpress BV (AS57717), a primary upstream provider in the Netherlands.

Role Provider Jurisdiction
Immediate Hosting Provider SecuNET (AS208273) Seychelles, Belize
First-Degree Upstream Provider Melbikomas UAB (AS56630) Lithuania
First-Degree Upstream Provider IP Volume (AS202425) Seychelles
Second-Degree Upstream Provider FiberXpress BV (AS57717) Netherlands

The CryptoServers/SecuNET network transmits NCSEI content from Belize, to the Seychelles, to Lithuania, and through the Netherlands, highlighting a pattern of using globally distributed infrastructure to bypass legal removal requests.

IP Volume has a multi-year history of hosting abusive content, including the distribution of CSAM.

Accountability at the infrastructure level and collaboration at an international scale is essential to disrupting this high-volume infringement infrastructure.

December 26, 2025 Update: Melbicom/Melbikomas UAB is now providing additional upstream services to the SecuNET/Cryptoservers network.

Citation Information

Title: 2025 Report: 10 Million Abusive URLs from SecuNET/CryptoServers

Author: Luca Maugeri

Source: NCSEI Support Hub

Published: December 28, 2025

URL: https://ncsei-support.org/articles/2025-report-10-million-abusive-urls-from-secunet-cryptoservers/

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut