Malware | Ransomware | DDoS | Crypto | Phish

Threat Data Experts

Based in the USA and Brazil, our history is one of community spirit and dedication to Internet security that began in 2005 when a group started sharing malicious links via email.

The indicators of compromise (IOCs) collected by Malware Patrol are now used by thousands to protect networks and assets in more than 175 countries.

Collecting, analyzing, and sharing data for over a decade has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors. The result is our vast database of unique and historically rich – “intelligent” – threat data.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, the Malware Patrol team is continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.


malicious IPs

What kind of threat data user are you?

Security Enterprise

You use IOCs in your SIEM/TIP or other platform, integrate data into your security products, or need custom data for research purposes.

Security Service Provider

MSSP or small security team, you use threat data to provide network security management services to your customers or internal networks.


For ICANN compliance purposes you need to track and be able to act on malicious activity hosted at or perpetrated by your TLDs.


You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Commercial Data Services

All commercial options include an unlimited license for the use and resale of the data, regardless of the number of  customers or end users.

Enterprise Data Feeds

We offer a wide range of IOC feeds for security teams, incident responders, enterprises and researchers available for individual purchase: malware URLs and samples, malicious IPs, C2s, DGAs, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation or download the product sheet. 

DNS Firewall

Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five separate zone files updated every five minutes, users are protected against C2s, DGAs (used by over 40 malware and ransomware families), malware, cryptominers, and phishing sites. A DNS Firewall subscription also includes the Business Protect package. 

Phishing Threat Intelligence

Our phishing URLs come from a variety of sources – crawlers, emails, spam traps and more – to ensure coverage of the most current campaigns. A combination of human and machine analysis allows us to catch even those hard-to-detect phish. We also capture JPEG images of the phishing websites from our feed and generate perceptual hashing data, both of which can be added on to a phishing feed subscription for machine learning and educational uses. 

Registry Compliance Data

This service helps registries track malicious activities related to their TLDs, an ICANN compliance requirement. An easy-to-use report, based only on the registry’s TLDs, is offered with IOCs related to the following threat types:

  • Anti-Mining
  • Command and Control Servers (C2s)
  • DGAs
  • Malware & Ransomware
  • Phishing

Small Business Protection

A package of malware URLs feeds in a variety of useful formats. This service was designed with the needs of small to medium-sized businesses – particularly MSSPs and ISPs – in mind. The data offered protects against the latest malware and ransomware campaigns. We offer a 7-day full access trial.

How big are your threat data gaps?

See for yourself.

Why choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”


Easy to Ingest

The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.


Maximum Threat Visibility

Malware Patrol’s customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

InfoSec Articles (10/03/20 – 10/17/20)

There has been a lot of RATs as well as botnets lately, such as HEH. HEH Botnet is spreading through brute force of the Telnet service on ports 23/2323. The bot does not...

InfoSec Articles (09/18/20 – 10/02/20)

One of the common malware being reported nowadays is the Remote Access Trojan or RAT, such as the LodaRAT. Written in Autolt, LodaRAT not only have abandoned their usual...

InfoSec Articles (09/03/20 – 09/17/20)

With almost everything being done online, cybercriminals were able to develop Baka skimmer to perform their goals. Baka skimmer has a sophisticated design intended to...

InfoSec Articles (08/19/20 – 09/02/20)

This batch of the most recent infosec articles from around the web, includes an evolution analysis of Transparent Tribe. In the last four years, Transparent Tribe has never...

InfoSec Articles (08/04/20 – 08/18/20)

Lots of malware have been creating cybercrime, but the old Agent Tesla uses new tricks to be able to stay on top. The Agent Tesla RAT has become one of the most prevalent...

InfoSec Articles (07/20/20 – 08/03/20)

We have now come into a new month, and this set of InfoSec articles discusses how some specific malware operates. One of these is the Evilnum malware which was previously...

InfoSec Articles (07/05/20 – 07/19/20)

Onto the second half of 2020, and a lot of trojans are actively upping their game to spread banking malware. One of these is Trojan Cerberus which disguised itself as a...

InfoSec Articles (06/20/20 – 07/04/20)

The latter half of the year has already begun, and cybercrimes show no signs of stopping. Just like how they're using Cobalt Strike to deploy Anchor backdoor and RYUK...

InfoSec Articles (06/05/20 – 06/19/20)

Ransomware and malware, such as GuLoader, have been very active in campaigns against security. GuLoader is used to deliver malware with the help of cloud services such as...

InfoSec Articles (05/21/20 – 06/04/20)

Half of 2020 is here and malware such as Mylobot, ComRAT, and the likes have also upgraded their game. Mylobot has the ability to download and execute any type of payload...

InfoSec Articles (05/06/20 – 05/20/20)

Ransomware has topped this InfoSec articles. One of which is the Netwalker ransomware. This involves malware that is not compiled but written in PowerShell and executed...

InfoSec Articles (04/21/20 – 05/05/20)

Among the cybercrime known to us, EventBot seems to be a real threat among many users. EventBot is targeting financial applications and steal SMS messages to allow malware...

DoH! Not so great to the Enterprise

DoH, or DNS over HTTPS (RFC 8484), is  a relatively new protocol that provides increased privacy and security. It does this by encrypting DNS queries and responses, which...

InfoSec Articles (04/06/20 – 04/20/20)

xHelper, together with other malware and threat attacks, have added to the concerns of Android users. Read about this threat and more in the latest security industry news...

InfoSec Articles (03/22/20 – 04/05/20)

Cyber attacks, phishing, stalkerware, and malware such as Emissary Panda, have been rampant. They're taking advantage of the vulnerabilities in organizations and even...

Stay Connected

Sign up for our newsletter to receive occasional updates and cybersecurity news.
Newsletter - Sidebar