top of page
Leveraging IP Reputation Feed for Enhanced Cybersecurity

Controller Feed (C2)

Near-real-time monitoring.

Key Features:

DNS Centric, covering all controllers observed – no victims.

Provides the full URL, malware hash, and DNS resource record.

Includes capabilities for blocking compromised nodes, malicious attachments, and application-level firewalling.

Key Advantages:

Real-time identification of botnet command and control (C2) IP addresses.

Continuous monitoring of inactive nodes and networks.

Offers detailed controller feed entries, including all possible IP addresses, domain name, HTTP URL, first seen time, and confidence score.

Use Cases:

Internet service providers can use the feed to block traffic to known malicious controllers, protecting their customers.

Enterprises can integrate the feed into their intrusion detection systems to enhance their security posture.

Data centers can utilize the feed for proactive security measures, preventing malicious traffic from affecting their operations.

​The Most Comprehensive C2 Feed Available…

​The Controller Feed contains all of our botnet controller data from the Botnet Analysis and Reporting System (BARS), a unique system that enables visibility into botnets that normally evade monitoring, plus other sources for our most comprehensive view of Command and Control (C2) for IRC-based, HTTP-based, and P2P-based botnets. This feed provides the full URL, malware hash, and DNS resource record of the controllers enabling you to cross reference, monitor, or block connections.

Feed Details…

  • Near-real-time identification of botnet command and control (C&C) IP addresses (IRC, http, and P2P) built for DDoS, warez, and underground economy to include bot types, passwords, channels, and our insight.

  • Contains all confirmed, active botnet, warez, underground economy and other malware distribution command points.

  • Use this data to automatically block access to C&C IP addresses.

  • The report is updated every 60 minutes.

Controller Feed Entries Include

  • Multiple IP addresses for a single botnet

  • Domain name and HTTP URL

  • First seen time

  • Last checked time

  • Recent up and down times

  • Family, sub-family and version details

  • Protocol and port

  • Whether currently resolves or active in DNS

  • Confidence value

  • SHA1 and MD5 for malware samples

  • SSL and request type for HTTP C2s

  • Password, channel and key for IRC servers

bottom of page