Feed

mail-spam and forum-spam domains

Posted on December 21st, 2014 in New Domains by dglosser

Someone asked about providing a list of domains listed in spam messages or forum spam.

Please let us know if that would be of interest.

 

Recent Updates

Posted on December 19th, 2014 in New Domains by dglosser

Added about 400 domains on 12/16 and 12/18 (fake content, fiesta, rogue pharmacies, Get Rich Quick Scams,  fraud, etc).  Sources include pwnedlist, safebrowsing.google.com, spam404, threatglass and dynamoo ((all domains and sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs
* twitter page: https://twitter.com/malwaredomains

* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format.
* We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

krebsonsecurity.com

Posted on December 15th, 2014 in New Domains by dglosser

krebsonsecurity.com is a great site. I visit it daily. For some reason it’s flagged at virustotal as malicious by malwaredomains.com.  Not true.    I’ve contacted virustotal and asked for it to be delisted.

Update: Delisted by virustotal

This week’s updates

Posted on December 14th, 2014 in New Domains by dglosser

12/10 – 347 New Domains
12/12 – 849 New Domains
12/13  – 1193 New Domains

 

Please update your blocklists and follow our terms of use.

1283 domains delisted, 1049 added

Posted on December 8th, 2014 in New Domains by dglosser

Almost an even swap. 1283 domains were delisted and 1049 added. Please update your blocklists and follow our terms of use.

Recent Updates

Posted on December 5th, 2014 in New Domains by dglosser

Recent Updates:

  • 12/1 – 108 domains
  • 12/3 – 421 domains
  • 12/4 – 202 domains

Please update your blocklists and follow our terms of use.

3544 Domains Delisted

Posted on November 29th, 2014 in New Domains by dglosser

3544 Domains have been delisted. Please update your blocklists and follow our terms of use.

================================
****
REMINDER ****
As of Dec 1st, we will be no longer be
publishing the
individual “update” files
(which are located in the “/update” folder)

================================

Big Update – Over 775 domains

Posted on November 27th, 2014 in New Domains by dglosser

Added 778 domains (linuxbot, pwnedlist, malspam, etc) from mwsl.org.cn, deependresearch, dynamoo and others (all domains and sources are listed in our domains.txt file.)

——————————————————————————————
****
REMINDER ****
As of Dec 1st, we will be no longer be
publishing the
individual “update” files
(which are located in the “/update” folder)

——————————————————————————————

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs
* twitter page: https://twitter.com/malwaredomains

* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format.
* We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

cryptolocker domains

Posted on November 26th, 2014 in New Domains by dglosser

Added 98 domains (mostly cryptolocker) from mcafee and malwr.com. Please update your blocklists and follow our terms of use.

——————————————————————————————
~~~
REMINDER ~~~
Starting on Dec 1st, we will be no longer be
publishing the
individual “update” files
(which are located in the “/update” folder)

——————————————————————————————–

 

826 New Domains

Posted on November 24th, 2014 in New Domains by dglosser

Added 826 New Domains from labs.sucuri.net. zeustracker, pwnedlist and others (all domains and sources are listed in our domains.txt file.)

———————————————————————————————————
REMINDER: Starting on Dec 1st, we will be no longer be publishing the
individual “update” files (which are located in the “/update” folder)

——————————————————————————————————–

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs
* twitter page: https://twitter.com/malwaredomains

* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format.
* We also have a mirror dedicated to research and Open Source Projects – please contact us for details.