Intelligent Threat Data

Malware | Ransomware | DDoS | Cryptocurrencies

Welcome to Malware Patrol

 

We have been gathering malware and ransomware data since 2005. Our extensive network of sensors, sharing agreements, and community contributors have allowed us to grow a vast database of unique and historically rich – intelligent – threat data. Today, our indicators of compromise (IOCs) are used by thousands of commercial and non-commercial users to protect networks and assets all over the world.

For ease of use, Malware Patrol data feeds and block lists are offered in formats compatible with the most popular threat intelligence platforms, SIEMs, AV, firewall, and proxy systems. For those with specific ingestion requirements, we can fully customize feed contents and/or formats.

 

Select a profile below to see the best data options for your needs.

What kind of threat data user are you?

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Service Provider

MSP, MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

Security Enterprise

You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom data or samples for research.

From the Blog

Malware

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present...
antivirus protection

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

Monero cryptocurrency

Malware Patrol – Protection Against Crypto Mining Abuse

Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for...
Malware Patrol

Malware Patrol Partners with Check Point Software

FOR IMMEDIATE RELEASE Malware Patrol Announces Partnership with Check Point Software Technologies Brazilian security company joins forces with the world’s leading internet security firm. São Paulo,...
antimalware

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive...

DDoS Reflection and Amplification Attacks

Reflections and amplifications are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of...

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques that complicate mitigation efforts and hide the IP address of the originating system. It...

Configuration Guides

BIND9 RPZ – DNS Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ zone files. Response Policy Zone (RPZ) enables DNS administrators to selectively block name resolution of...
squid logo

Squid3 Web Proxy Configuration Guide

Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and reusing frequently requested web pages. It runs on...
pfsense logo

pfBlockerNG Configuration Guide

Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block list, IP filtering, and country block functionalities. You...

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated approach...
pfsense logo

pfSense Configuration Guide

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. In addition to being a...
clamAV

ClamAV Configuration Guide

“ClamAV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides signatures compatible with ClamAV. You can follow these simple...
Bind9

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Malware Patrol provides a zone file compatible with Bind 9. Its usage as a DNSBL (DNS black list) denies access to domains that are involved in malware and...

How big are your threat data gaps?

See for yourself.