www.malwarepatrol.net Open in urlscan Pro
2606:4700:10::ac43:100b  Public Scan

Submitted URL: http://malwarepatrol.net/
Effective URL: https://www.malwarepatrol.net/
Submission: On January 21 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.malwarepatrol.net/

<form role="search" method="get" class="et-search-form" action="https://www.malwarepatrol.net/">
  <input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>

GET https://malwarepatrol.agilecrm.com/formsubmit

<form class="form-view   form5701962645372928" id="agile-form" action="https://malwarepatrol.agilecrm.com/formsubmit" style="max-width:285px;" method="GET">
  <fieldset>
    <legend class="agile-hide-formname">Newsletter - Sidebar</legend>
    <p class="agile-form-description"></p>
    <div style="display: none; height: 0px; width: 0px;">
      <input type="hidden" id="_agile_form_name" name="_agile_form_name" value="Newsletter - Sidebar">
      <input type="hidden" id="_agile_domain" name="_agile_domain" value="malwarepatrol">
      <input type="hidden" id="_agile_api" name="_agile_api" value="6mdji1d962od3g5j3dltssa02f">
      <input type="hidden" id="_agile_redirect_url" name="_agile_redirect_url" value="https://www.malwarepatrol.net/malware-patrol-newsletter-thank-you/">
      <input type="hidden" id="_agile_document_url" name="_agile_document_url" value="">
      <input type="hidden" id="_agile_confirmation_msg" name="_agile_confirmation_msg" value="">
      <input type="hidden" id="_agile_form_id_tags" name="tags" value="Newsletter">
      <input type="hidden" id="_agile_form_id" name="_agile_form_id" value="5700239927279616">
    </div>
    <div class="agile-group required-control">
      <label class="agile-label" for="agilefield-1">Name<span class="agile-span-asterisk"> *</span></label>
      <div class="agile-field-xlarge agile-field">
        <input maxlength="50" id="agilefield-1" name="first_name" type="text" placeholder="" class="agile-height-default" required="">
      </div>
      <div class="agile-custom-clear"></div>
    </div>
    <div class="agile-group required-control">
      <label class="agile-label" for="agilefield-2">Email<span class="agile-span-asterisk"> *</span></label>
      <div class="agile-field-xlarge agile-field">
        <input maxlength="50" id="agilefield-2" name="email" type="email" placeholder="" class="agile-height-default" required="">
      </div>
      <div class="agile-custom-clear"></div>
    </div>
    <div class="agile-group"><label class="agile-label"></label>
      <div class="agile-field-xlarge agile-field">
        <div class="g-recaptcha" style="transform:scale(0.91);-webkit-transform:scale(0.91);transform-origin:0 0;-webkit-transform-origin:0 0; width='250px';" data-sitekey="6LfpGkcUAAAAAOZpgQFVh4tueU-pbiZ0oXTxwlE7"
          data-callback="agileGCaptchaOnSuccess">
          <div style="width: 304px; height: 78px;">
            <div><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LfpGkcUAAAAAOZpgQFVh4tueU-pbiZ0oXTxwlE7&amp;co=aHR0cHM6Ly93d3cubWFsd2FyZXBhdHJvbC5uZXQ6NDQz&amp;hl=de&amp;v=TDBxTlSsKAUm3tSIa0fwIqNu&amp;size=normal&amp;cb=un3m5ajfffud"
                width="304" height="78" role="presentation" name="a-kr26l0f9cel3" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div><textarea id="g-recaptcha-response" name="g-recaptcha-response"
              class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
        <div class="agile-group">
          <label class="agile-label">&nbsp;</label>
          <div class="agile-field agile-button-field">
            <button type="submit" class="agile-button">SUBMIT</button>
            <br><span id="agile-error-msg"></span>
          </div>
        </div>
      </div>
    </div>
  </fieldset>
</form>

Text Content

+1.813.321.0987
 * Twitter

 * Twitter

 * Account Login
 * Blog
 * Contact
 * Support

 * Home
 * Threat Intelligence
   * Overview
   * Enterprise
   * Small Business
   * Registry
   * DNS-over-HTTPS
   * DNS Firewall
   * Phishing
 * Integrations
   * Overview
   * Fortinet
   * Mikrotik
   * MISP
   * Setup Guides
 * Resources
   * Blocklists
   * Community
   * Setup Guides
   * Uptime Status
 * Fala Português?

Select Page
 * Home
 * Threat Intelligence
   * Overview
   * Enterprise
   * Small Business
   * Registry
   * DNS-over-HTTPS
   * DNS Firewall
   * Phishing
 * Integrations
   * Overview
   * Fortinet
   * Mikrotik
   * MISP
   * Setup Guides
 * Resources
   * Blocklists
   * Community
   * Setup Guides
   * Uptime Status
 * Fala Português?
 * Account Login
 * Blog
 * Contact
 * Support




INTELLIGENT THREAT DATA


CRYPTOMINING | MALWARE | PHISH | RANSOMWARE

FREE EVALUATION


THREAT DATA EXPERTS

Based in the USA and Brazil, Malware Patrol’s origins date back to 2005 when a
group of security enthusiasts began to share malicious URLs via email. From this
exchange, we developed a platform and infrastructure to verify and make this
data available to the security community in the form of blocklists. This project
grew into the collection of additional IoCs, and eventually commercial services.

The indicators of compromise (IoCs) collected by Malware Patrol are now used by
thousands to protect networks and assets in more than 175 countries.

After more than 15 years of collecting, analyzing, and sharing data, we have an
extensive network of proprietary sensors, sharing agreements, and community
contributors. The result is our vast database of unique and historically rich –
“intelligent” – threat data.


STAY CONNECTED

Sign up for our newsletter to receive updates and cybersecurity news.

Newsletter - Sidebar




Name *


Email *


 
SUBMIT

REQUEST YOUR EVALUATION



WHAT KIND OF THREAT DATA USER ARE YOU?



ENTERPRISE

You use IoCs in your SIEM, TIP or other platform, integrate data into your
security products, or need custom data for research purposes. A mature
cybersecurity program.



SMB SECURITY TEAM

Small-to-medium business security team or service provider, you use threat data
to provide network security management services to your customers or internal
networks.



DNS PROVIDER

You provide or manage DNS services for your internal or external customers using
BIND9. You need DNS-level data to prevent users from accessing malicious sites.



REGISTRY

For ICANN compliance purposes you need to track and be able to act on malicious
activity hosted at or perpetrated by your TLDs.


DATA SERVICES

To reduce the noise and false positive overload faced by information security
teams and their tools, our automated systems verify each IoC every day to ensure
that our feeds contain only active threats.

For simplicity’s sake, all feeds include an unlimited commercial license for the
use of the data, regardless of the number of  customers or end users.


ENTERPRISE DATA FEEDS

We offer a wide range of IoC feeds for security teams, incident responders,
enterprises and researchers available for individual purchase: malware URLs and
samples, malicious IPs, C2s, DGAs, cryptomining sites, newly registered domains
and more. For those with specific data or ingestion requirements, we can fully
customize feed contents and formats at no additional cost. Request a FREE
evaluation or download the product sheet.




DNS FIREWALL

Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five
separate zone files updated every five minutes, users are protected against C2s,
DGAs (used by over 40 malware and ransomware families), malware, cryptominers,
and phishing sites. A DNS Firewall subscription also includes the Business
Protect package. 




PHISHING THREAT INTELLIGENCE

Our phishing URLs come from a variety of sources – crawlers, emails, spam traps
and more – to ensure coverage of the most current campaigns. A combination of
human and machine analysis allows us to catch even those hard-to-detect phish.
We also capture the raw HTML as well as JPEG images of the phishing websites
from the sites in our feed. From the images, we generate perceptual hashes.
These data sets can be added on to a phishing feed subscription for machine
learning and educational uses. 




REGISTRY COMPLIANCE DATA

This service helps registries track malicious activities related to their TLDs,
an ICANN compliance requirement. An easy-to-use report, based only on the
registry’s TLDs, is offered with IoCs related to the following threat types:

 * Anti-Mining
 * Command & Control Servers (C2s)
 * DGAs
 * Malware & Ransomware
 * Phishing




SMALL BUSINESS PROTECTION

A package of malware URLs feeds in a variety of useful formats. This service was
designed with the needs of small to medium-sized businesses in mind. The data
offered protects against the latest malware and ransomware campaigns. We offer a
7-day full access trial.








HOW BIG ARE YOUR THREAT DATA GAPS?


SEE FOR YOURSELF.

Free Data Evaluation


WHY CHOOSE MALWARE PATROL?




DEDICATED & ACCESSIBLE SUPPORT

There’s no calling 800 numbers to reach the next available agent. Commercial
customers have an assigned team familiar with their specific needs and
technological environments to ensure efficient and accurate implementations and
support.




FOCUSED, REAL-TIME PROTECTION

Our feeds are updated EVERY HOUR and customers have unlimited data downloads.
Because our feeds only contain actionable threats, our customers save time and
resources by avoiding the ingestion and prioritization of “possible threats.”

Z


EASY TO INGEST

The contents or format of Enterprise Data Feeds can be customized to make the
ingestion process as easy and reliable as possible. For our other services, we
offer feeds and lists formatted for compatibility with the most common security
platforms and software.

T


MAXIMUM THREAT VISIBILITY

Malware Patrol’s customers are protected from the latest malicious campaigns
thanks to the large number and variety of ingestion points. Geographically
diverse honeypots, spam pots, and network sensors, along with collaboration
agreements and continuous threat research maximize our data’s coverage.


FEATURED CONTENT


REQUEST YOUR EVALUATION

NAVIGATE

 * Home
 * Blog
 * Contact
 * Threat Intelligence




       


       

© 2005-2021 Malware Patrol / SP Cyber LLC. All rights reserved. I  Terms of Use