Threat Trends Digest – February 2026
Welcome to the Threat Trends Digest, a monthly view of real-world threat patterns.
This report compiles data from the previous month using Malware Patrol’s global telemetry and live attack observations to surface key stats on malware, phishing, ransomware, C2s, and domain generation algorithms (DGAs). You’ll find insights into the most exploited TLDs, frequently seen malware hashes and IPs, and other critical indicators. Use this digest to keep a close pulse on attacker behavior, uncover shifting patterns, and better align your defenses with the latest threat activity.
For more articles, check out our #onpatrol4malware blog.
IOCs
Top Malicious IPs
74.115.51.9
213.186.33.16
66.147.242.174
104.21.65.87
172.67.189.179
211.97.84.77
198.23.50.111
8.218.200.39
213.186.33.17
149.56.178.73
95.173.180.244
54.83.252.56
67.20.113.17
82.165.181.201
116.196.150.210
169.150.221.147
142.4.17.174
173.231.196.56
64.37.63.18
60.31.192.68
Top Malware Hashes
59ce0baba11893f90527fc951ac69912
8bdd2cdd39b2ad7b679faa50f629ce2b
3849f30b51a5c49e8d1546960cc206c7
eec5c6c219535fba3a0492ea8118b397
a73ddd6ec22462db955439f665cad4e6
ecf47832c60945488d601012e568b663
3a8e23ef4cc9578a00b292323579b4d4
5377e8f2ebdb280216c37a6195da9d6c
fbe51695e97a45dc61967dc3241a37dc
9b6c3518a91d23ed77504b5416bfb5b3
3a9349af006440c7e0da677724551239
d65960b89e28e465691ed757a2fdec2a
9fa84266be8c795dc61dd60fd5c1567c
c210a847989f7e47e7569ce1df92ae9e
724f25e7f93eae0ae54a80142e11b7ef
dbc520ea1518748fec9fcfcf29755c30
0b0212e124390ff12d9c04a483e2334e
ad6a76af945f652961da68bf364cdde1
cbcb58ffe45c202c11bcf2070496aed6
cb41caac2b6d810837618e153dfc3cc5
Top Attacking IPs
176.65.128.158
84.247.147.74
60.251.54.203
23.137.105.55
154.26.139.222
84.247.147.209
161.97.115.157
95.174.113.63
45.153.34.104
45.153.34.106
34.80.38.201
84.247.147.238
161.97.117.226
173.249.17.160
36.102.207.194
82.197.69.32
84.247.147.68
173.249.25.37
207.180.221.87
173.249.29.134
To learn more about how we collect, analyze, and deliver actionable threat intelligence, explore our Threat Intelligence Services. If you’re interested in running your own queries – whether for threat actors, CVEs, infrastructure, or emerging activity – see how our MCP Server helps turn intelligence into practical security insight. Both are designed to support real-world analysis, investigation, and decision-making.




