Intelligent Threat Data
Malware | Ransomware | DDoS | Cryptocurrencies
Welcome to Malware Patrol
We have been gathering malware and ransomware data since 2005. Our extensive network of sensors, sharing agreements, and community contributors have allowed us to grow a database of unique and historically rich – intelligent – threat data. Today, our indicators of compromise (IOCs) are used by thousands of commercial and non-commercial users to protect networks and assets all over the world.
For ease of use, Malware Patrol data feeds and block lists are offered in formats compatible with the most popular threat intelligence platforms, SIEMs, AV, firewall, and proxy systems. For those with specific ingestion requirements, we can fully customize feed contents and/or formats.
Select a profile below to see the best data options for your needs.
From the Blog
Role of DGAs in Malware and Ransomware Campaigns
Spoofed DDoS Attacks and BCP 38
DDoS Reflection and Amplification Attacks
Malware Patrol Partners with Check Point Software
Comparing Protection Mechanisms
In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.