Feed

140 unsafe, malspam, malvertising domains added

Posted on August 29th, 2013 in New Domains by dglosser

Added 140 domains associated with malvertising (malicious ad banners) and other badness. Sources: safebrowsing.clients.google.com, blog.dynamoo.com, app.webinspector.com and others (all sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs.
* twitter page: https://twitter.com/malwaredomains
* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format. Also Available in AdBlock, ISA, and MaraDNS formats. A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…
We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

8/23 & 8/25 updates – 190 domains

Posted on August 26th, 2013 in New Domains by dglosser

Updates on 8/23 and 8/25 — 190 new domains.  Please update your blocklists

iframes, redirections, malicious javascript

Posted on August 20th, 2013 in New Domains by dglosser

Added 200+ domains associated with iframes, malicious javascript, htaccess redirections, rogue pharmacies, etc. Sources: app.webinspector.com, labs.sucuri.net, thenewfr0ntier.blogspot.com and others (all sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs.
* twitter page: https://twitter.com/malwaredomains
* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format. Also Available in AdBlock, ISA, and MaraDNS formats. A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…
We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

Big Update: 269 Domains (cookiebomb, iframes, redkit, etc)

Posted on August 17th, 2013 in New Domains by dglosser

Added 269 domains associated with iframes, downadup, cookie bomb, redkit, malspam, etc. Sources include dynamoo.com, urlquery.net, threatexpert.com and others ((all sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs.
* twitter page: https://twitter.com/malwaredomains
* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format. Also Available in AdBlock, ISA, and MaraDNS formats. A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…
We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

Aug 13 Update- 261 Domains; Aug 15 Update: 110 Domains

Posted on August 17th, 2013 in New Domains by dglosser

Added 261 Domains on Aug 13 and another 110 on Aug 15… Please update your blocklists and follow our terms of use.

malicious spam, malicious banners…

Posted on August 12th, 2013 in malspam,malvertising,New Domains by dglosser

Added 105 domains (malicious spam, malicious banners, other badness). Sources: threattrack.tumblr.com, safebrowsing.clients.google.com, blog.webroot.com, blog.dynamoo.com (all sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs.
* twitter page: https://twitter.com/malwaredomains
* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format. Also Available in AdBlock, ISA, and MaraDNS formats. A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…
We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

iframes, multibanker, steelrat domains added

Posted on August 6th, 2013 in New Domains by dglosser

Added almost 200 domains associated with multibanker, iframes, steelrat, ramnit, etc. Please update your blocklists and follow our terms of use.

 

bhek, dnsamplification, sutratds, trojan domains

Posted on August 5th, 2013 in BH Exploit Kit,exploit,iframes,New Domains,Phishing,Trojans by dglosser

A small but important update of domains associated with DNS Amplification, SutraTDS, BHEK, phishing domains and other badness.  Sources: blog.dynamoo.com, dnsamplificationattacks.blogspot.com, safeweb.norton.com, www.mwis.ru, etc. (all sources are listed in our domains.txt file.)

* Please help to keep this site free and donate whatever you can: All donations go to hosting and infrastructure costs.
* twitter page: https://twitter.com/malwaredomains
* These malware block lists provided here are for free for noncommercial use as part of the fight against malware. Any use of this list commercially is strictly prohibited without prior approval.
* Please use the “datestamp” and “timestamp” file to determine if the list has been updated and ONLY pull the files you need – abusers will be banned! Use wget -N”!
* Yearly sponsorships are available. Full acknowledgment, an icon, and link back to your site will be placed in the left sidebar.
* Domains.txt file is the complete list along with original reference. Justdomains contains list of only the domain names. BOOT file is in MS DNS format. Malwaredomains.zones file is in BIND format. Also Available in AdBlock, ISA, and MaraDNS formats. A trusted source on the WOT-the Web of Trust . Used by SURBL, MOREnet, SANs, and others…
We also have a mirror dedicated to research and Open Source Projects – please contact us for details.

malspam, neutrino, phishing domains…

Posted on August 2nd, 2013 in New Domains by dglosser

Added >100 domains associated with malspam, neutrino, phishing, malvertising and other badness. Please update your blocklists and follow our terms of use