Protection Against Malware and Ransomware

Small Business Protection

Our Business Protect threat data feeds offer your customers and networks a highly reliable layer of protection against malware infections and the transmission of compromised data.

Most importantly, the data in our feeds is formatted for ease of use, compatible with the most common security platforms and software – no API required – and:

– Our database is updated constantly by crawlers in the cloud

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

malware infection

Package Details

malware infection
malware infection


Malware URL data for rolling 9-month period, to maximize active threat coverage.

Hashes to verify the integrity of the downloaded data feed.


ClamAV Virus DB
Postfix MTA
SquidGuard Block List
Squid Web Proxy


Data Feeds
Free 7-day data evaluation
Hourly updates
Unlimited downloads
Access to the CyberChef tool set

Subscription Options
Unlimited-use commercial license
Monthly or 1-year subscriptions

About Our Data

Malware Patrol’s threat data is aggregated from diverse sources, including web crawlers, botnet monitors, spam traps, honeypots, research teams, partners and historical data about malicious campaigns. All the data is carefully inspected. As a result, our feeds contain thoroughly vetted indicators sourced from the real world.

Because security budgets are usually limited, it is important to rely on a data source that provides coverage for the current malicious campaigns and threats that directly affect your company and your customers, maintaining a high level of security but using the minimum amount of resources.


How We Can Help

As a SMB, MSP, MSSP, ISP or similar company, there are many ways to use our data to protect your assets, employees and networks, as well as your customers:

  • Reinforce your network defenses by adding continuously updated data to your SIEM, firewalls, IPS/IDS, proxy, and DNS servers
  • Prevent the exfiltration of sensitive data and intellectual property from infected machines
  • Detect malicious content hosted on your networks and servers
  • Improve incident response and forensic capabilities by providing your teams with meaningful information about threats
  • Grow your business by providing industry-leading threat data as a premium service to your customers.

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing...

Clam AV Software Configuration Guide

“Clam AV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides...

SpamAssassin Configuration Guide

Malware Patrol provides block lists compatible with SpamAssassin.   "Apache SpamAssassin is the #1 Open Source anti-spam platform...

DNS RPZ Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ)...

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)"...
malware threats

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind 9. Malware Patrol provides a zone file compatible with Bind 9....
pfsense logo

pfBlockerNG Configuration Guide

Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block list, IP...
squid logo

Squid3 Web Proxy Configuration Guide

Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and...
pfsense logo

pfSense Configuration Guide

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely...