Malware, Ransomware, C2s, Cryptominers, DGAs, DDoS, and More

The Value of Threat Data

Security professionals tasked with protecting assets against malicious actors rely on indicators of compromise (IOCs) from external sources to improve their team’s threat landscape visibility. According to a study conducted by the Ponemon Institute:

  • 78% of respondents rate the importance of threat intelligence in achieving a strong cyber security posture as very high.
  • 46% percent of respondents believe commercial data feeds provide more actionable intelligence than free sources.

Malware Patrol offers a wide variety of IOC feeds for commercial and research purposes. Our data provides a source of verified and actionable indicators that protect your customers and networks against communications with botnets and command and control (C2) servers, malware infections and the transmission of compromised data.

For ease of use, our feeds are formatted for compatibility with the most common security platforms and software – no API required – and:

– Allow for UNLIMITED downloads

– Contain over 13 years of historical data

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

What kind of threat data user are you?

Security Service Provider

MSSP or ISP, you use threat data to provide security management services to your customers.

Threat Researcher/Analyst

You need data or samples for research purposes.

Security Enterprise

You integrate IOCs into your threat intelligence feeds or security products.

Choose the Right Data for Your Needs 

We offer two commercial data options:

Business Protect Data Feeds include a package of data designed to help small- to medium-sized businesses, such as MSSPs and ISPs, protect their customers’ networks and end users. The package includes malware URLs.

Enterprise Data Feeds are feeds for companies that have a mature cybersecurity model and require more specific threat intelligence and/or customization. These feeds can be purchased separately or in bundles, based on your business needs.


Business Protect



SMBs & Security Service Providers
Cyber Security & Threat Research Enterprises
Free data evaluation
Unlimited-use commercial license
Hourly updates
Unlimited downloads
Priority tech support
Subscription options: Monthly or Annual X
Subscription options: Annual or multi-year X
Dedicated account manager X
Free feed customization/formatting X


Malware URLs
Anti-Mining X
Bitcoin Blockchain Strings X
Bitcoin Transactions X
C2 Addresses, Drop Zones & Control Panels X
DDoS Attacks X
DNS Firewall X
DoH Servers X
Domain Names Generated via DGAs X
Malicious Domains X
Malicious IPs X
Malware Hashes or Samples X
Newly Registered Domains X
Phishing X