+1.813.321.0987

INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Crypto | Phish

Malware Patrol is a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a group started sharing malicious links using a simple mailing list.

Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries.

Collecting, analyzing, and sharing data for over a decade has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors. The result is our vast database of unique and historically rich – “intelligent” – threat data.

Today, our data is derived from over 60 sources, both public and proprietary.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

What kind of threat data user are you?

Security Enterprise

You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom data or samples for research.

Security Service Provider

MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

Registry

For ICANN compliance purposes, you need to be aware of malicious activity hosted or perpetrated by your TLDs.

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Commercial Threat Data

All our commercial threat data options include an unlimited commercial license for the use and resale of the data, regardless of the number of customers or end users.
 

Enterprise Threat Data Feeds

We offer a wide range of IOC feeds for security enterprises and researchers available for individual purchase: malware samples, malicious IPs, C2s, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
 

Business Protect Data Package

A pre-set package of feeds designed with the needs of small to medium-sized security businesses – MSSPs and ISPs – in mind. The data offered helps protect your customers and their networks against malware and ransomware infections. Request a FREE evaluation.
 

DNS Firewall

Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five separate zone files updated every five minutes, users are protected against C2s, DGAs (used by over 40 malware and ransomware families), malware, cryptominers, and phishing sites. An RPZ subscription also includes access to Business Protect data feeds.
 

Visit our commercial services page for more information about our threat data feeds for security companies.

Non-Commercial Block Lists 

Our block lists are available in a variety of formats, compatible with the most popular security tools. The data is strictly for personal or non-commercial use, such as home computers and the internal networks of businesses and educational organizations. These lists cannot be used to protect external customers or as part of any commercial security products or services.
 

Basic Defense

Subscription-based malware URL block list updated every 4 hours. It contains the entries from our database that have been detected during the last 15 days. Monthly and annual payment options are available, along with a 7-day money back guarantee.
 

Free Guard

Free block list of malware URLs updated every 72 hours. It contains the entries from our database that have been detected during the last 7 days.
 

Visit our non-commercial services page for more information, including the available feed formats for each subscription type.

How big are your threat data gaps?

See for yourself.

Why do companies choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”

Z

Easy to Ingest

The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

T

Maximum Threat Visibility

Customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

From the Blog

microsoft bitlocker

Infosec Articles (7/13/19 – 7/27/19)

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind 9. Malware Patrol provides a zone file compatible with Bind 9. Its usage as a DNSBL (DNS black list) denies...
phishing

Phishing: The Tide Is Still Coming In

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind 9. Malware Patrol provides a zone file compatible with Bind 9. Its usage as a DNSBL (DNS black list) denies...
Monero cryptocurrency

Malware Patrol – Protection Against Crypto Mining Abuse

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...

Cisco ASA FirePOWER Configuration Guide

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...
DNS sinkholes

DNS Sinkholes Detect and Protect. Discovering What’s Inside Them Can Be the Key to Security

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...
Palo Alto Threat Exchange

MineMeld Configuration Guide

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...
squid logo

Squid3 Web Proxy Configuration Guide

There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,” “Sodin,” and “Sodinokibi” ransomware. The NCSC...