Threat Trends Digest – January 2026
Welcome to the Threat Trends Digest, a monthly view of real-world threat patterns.
This report compiles data from the previous month using Malware Patrol’s global telemetry and live attack observations to surface key stats on malware, phishing, ransomware, C2s, and domain generation algorithms (DGAs). You’ll find insights into the most exploited TLDs, frequently seen malware hashes and IPs, and other critical indicators. Use this digest to keep a close pulse on attacker behavior, uncover shifting patterns, and better align your defenses with the latest threat activity.
For more articles, check out our #onpatrol4malware blog.
IOCs
Top Malicious IPs
91.238.72.69
120.138.9.38
103.15.20.10
81.91.85.141
176.53.12.17
43.231.112.25
45.114.225.27
46.59.86.3
72.9.148.195
163.44.198.41
192.250.229.213
31.31.198.199
203.175.8.87
194.93.14.42
198.187.31.106
95.173.180.70
212.99.45.180
203.98.83.109
103.16.146.2
198.38.87.214
Top Malware Hashes
59ce0baba11893f90527fc951ac69912
8bdd2cdd39b2ad7b679faa50f629ce2b
3849f30b51a5c49e8d1546960cc206c7
a73ddd6ec22462db955439f665cad4e6
eec5c6c219535fba3a0492ea8118b397
fbe51695e97a45dc61967dc3241a37dc
9b6c3518a91d23ed77504b5416bfb5b3
3a9349af006440c7e0da677724551239
5377e8f2ebdb280216c37a6195da9d6c
724f25e7f93eae0ae54a80142e11b7ef
dbc520ea1518748fec9fcfcf29755c30
221d8352905f2c38b3cb2bd191d630b0
cbcb58ffe45c202c11bcf2070496aed6
b8ed2cb3e9fedec5b164ce84ad5a08d0
6a16e166948ddb9e6e9f9de503e21c60
fd28239ca545da6ae157a6c7ab14dbf0
ebbcfb749a959fb53e9fc8b6dc915838
c3c561c20e48169f4906c6b0b135984b
936b35bfee8232f437bf6b46e88401dd
5f49ac82edd8f3a3d7c47746b6523de9
Top Attacking IPs
80.75.212.112
205.209.119.82
85.192.63.30
80.75.212.116
80.75.212.126
162.220.15.190
162.220.15.170
193.141.60.60
130.12.183.19
134.209.37.214
69.164.255.130
65.109.32.114
20.12.212.103
204.76.203.223
65.108.231.96
38.190.177.184
135.181.128.54
65.21.123.25
142.132.220.146
65.108.120.126
To learn more about how we collect, analyze, and deliver actionable threat intelligence, explore our Threat Intelligence Services. If you’re interested in running your own queries – whether for threat actors, CVEs, infrastructure, or emerging activity – see how our MCP Server helps turn intelligence into practical security insight. Both are designed to support real-world analysis, investigation, and decision-making.

