An hourly updated XML feed spanning the last 24 hours of IP addresses seen in nine different categories of malicious activity, including command and control servers.
Along with every Command and Control IP address (C2) for botnets we track, the feed contains IP addresses that have communicated with a C2, a honeypot, or sinkhole we operate. Other example categories of malicious behavior include darknet scans, abused proxies, openresolvers, and IPs hosting phishing sites. Using our global network of darknets, sensors, and sinkholes we formed the most comprehensive feed we have ever produced.
The Reputation Feed is updated hourly and contains an aggregate of the last 24 hours of activity.
Every IP in the feed receives an individual reputation score using several different categories of patterns observed over the past 30 days. The key used to calculate the score is included in the feed and can be used to reconstruct the behavior patterns observed for each individual IP in the feed.
Reputation key patterns include:
As part of the XML schema for this report, each IP has been assigned a “reputation” value derived from various methods. The key used to calculate this value is included in the feed.
The intention is that partners determine what issues are most important to them and adapt their policy accordingly. At Team Cymru, we understand that no one can make that determination for you better than you. To facilitate that decision making capability, we prefer to give you a reputation value to assist you. You may decide that some threats are important, and others are not. This value will help you along the way.