+1.813.321.0987

INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Crypto | Phish

Malware Patrol

We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a group started sharing malicious links using a simple mailing list.

Over a decade of collecting, analyzing, and sharing data has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is our vast database of unique and historically rich – “intelligent” – threat data.

Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

LIVE Feed

Latest Malware Detected

    What kind of threat data user are you?

    Security Enterprise

    You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom data or samples for research.

    Security Service Provider

    MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

    Non-Commercial

    You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

    Commercial Threat Data

    Enterprise Threat Data Feeds

    We offer a wide range of IOC feeds for security enterprises and researchers available for individual purchase: malware samples, malicious IPs, C2s, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
     

    Business Protect Data Package

    A pre-set package of feeds designed with the needs of small to medium sized security businesses – MSSPs and ISPs – in mind. The data offered helps protect your customers and their networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.
     

    Details

    Both of these commercial threat data options include an unlimited commercial license for the use and resale of the data, regardless of the number of customers and/or end users.

    Visit our commercial services page for more information about our threat data feeds for security companies.

    threat data

    Non-Commercial Block Lists 

    Free Guard

    Free block list of malware URLs updated every 72 hours. It contains the entries from our database that have been detected during the last 7 days.
     

    Basic Defense

    Subscription-based malware URL block list updated every 4 hours. It contains the entries from our database that have been detected during the last 15 days. Monthly and annual payment options are available, along with a 7-day money back guarantee.
     

    Details

    The malware URL block lists above are available in a variety of formats, compatible with the most popular filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and the internal networks of businesses and educational organizations. These lists cannot be used to protect external customers or as part of any commercial security products or services.
     
    Visit our non-commercial services page for more information, including the available feed formats for each subscription type.

    How big are your threat data gaps?

    See for yourself.

    Why do companies choose Malware Patrol?

    Dedicated & Accessible Support

    There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

    Focused, Real-Time Protection

    Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”

    Z

    Easy to Ingest

    The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

    T

    Maximum Threat Visibility

    Customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

    From the Blog

    squid logo

    Squid3 Web Proxy Configuration Guide

    Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and reusing frequently requested web pages. It runs on...
    mysterybot malware

    Infosec Articles – June 2018

    We've compiled a few of our favorite recent infosec articles from the best sources in the industry. Keep reading to learn about a decryptor tool for Everbe ransomware, malicious code ADB.miner, and...
    point-of-sale malware

    Infosec Articles (2/29/19 – 3/14/19)

    Over the last couple of weeks we've seen point-of-sale malware making its way to the top of the threats list, at least in terms of headlines and focus. A rather shocking discovery was a PDF flaw...
    new MacOS Malware

    Infosec Articles (8/14/18 – 9/3/18)

    Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.

    cryptominer

    Infosec Articles – April 2018

    We are thankful that so many companies and individual researchers take the time to publish articles about the latest threats. And when they share IOCs, it's even better! We've put together some of...
    malicious Microsoft Office documents

    Infosec Articles (12/13/2018 – 12/31/2018)

    During the last couple weeks of the year the infosec industry was abuzz about methods for both building and using malicious Microsoft Office documents. Utilizing another staple of the office world,...
    ransomware infections

    Whitelisting for Block Lists

    Malware Patrol's #1 goal is to protect customers from malware and ransomware infections. These days, this can mean blocking mainstream domains. Consequently, our customers report potential false...

    Phishing’s Next Wave: AI-Enabled Tactics for Attackers and Cybersecurity Pros

    Cybercrime steals an estimated $600 billion from the global economy every year. In the next several years we can expect that number to reach well into the trillions. Phishing and spear phishing open...
    Best Practice

    Spoofed DDoS Attacks and BCP 38

    The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...
    cybersecurity resources

    DDoS Reflection and Amplification Attacks

    Reflection and amplification are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP...

    BIND9 Configuration Guide

    Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind 9. Malware Patrol provides a zone file compatible with Bind 9. Its usage as a DNSBL (DNS black list) denies...
    Malware

    Popular Domains Hosting Malware

    Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block...

    Cisco ASA FirePOWER Configuration Guide

    “With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated approach...
    Linux security

    Infosec Articles (1/15/19 – 1/29/19)

    Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and Office documents continue to be infection vectors....
    Infosec Articles (10/01/2018- 10/14/2018)

    Infosec Articles (10/2/2018 – 10/15/2018)

    Infosec articles we found in the first half of October 2018. We have included an article on what to do after a breach. Learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play, and more. 

    #onpatrol4malware

    Accessing threat data on AWS S3 buckets

    Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon...
    antimalware

    Role of DGAs in Malware and Ransomware Campaigns

    The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to...
    antivirus protection

    Comparing Protection Mechanisms

    In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

    DNS

    Why choose Malware Patrol over a free DNS protection service?

    Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in...
    cryptocurrency mining malware

    Infosec Articles (1/1/19 – 1/14/19)

    Off to an active start in 2019, cryptocurrency mining malware is topping lists once again. Read articles about this nuisance and several others in our industry article picks for the first of the...