I'm happy to report, after identifying yet more malicious activity on Senpai IT Solutions network, and sending another e-mail to them, Senpai IT Solutions have informed me they've now completely disabled the servers for the following;
126.96.36.199 - static.88-198-81-153.clients.your-server.de
188.8.131.52 - static.88-198-120-177.clients.your-server.de
184.108.40.206 - static.220.127.116.11.clients.your-server.de
18.104.22.168 - static.22.214.171.124.clients.your-server.de
126.96.36.199 - static.188.8.131.52.clients.your-server.de
You'll no doubt already be aware that these have a recent history of malicious activity, and I'd like to thank Siarhei at Senpai for taking action and shutting them down.
I'll be continuing to monitor their network, and have asked him to shut down another couple of servers involved (184.108.40.206 and 220.127.116.11), so we'll see what else pops up.
Little update, I've had a response from Siarhei to inform me .43 has been disabled aswell, and .154 was apparently formatted and sold to someone else two weeks ago (there's been no activity on that IP, within the last two weeks, so obviously the new owner isn't malicious (so far)).
malwaredomainslist.com - The rogues love MDL!
Web Poisoning: Youtube video lead to Rogue Antispyware - Antivirus360