MalwarePatrol

  Malware is everywhere!
Updated every hour
Online since 06/2005 - 7.000.000 hits/month
Last database update: 2017-06-24 16:50 UTC
    

Search MBL#:    

Bookmark and Share

Welcome


Welcome to the Malware Patrol project! We provide feeds of malware URLs and CryptoLocker domains and IPs, so you can protect yourself and your network users from getting infected by Malware. Block lists are available in several formats, including the most popular anti-spam, anti-virus and web proxy systems.

What we do


Malware Patrol is a free, automated and community driven system that monitors URLs for the presence of Viruses, Trojans, Worms, or any other software considered Malware. We also monitor the command and control systems used by ransomware, like CryptoLocker.

Big Image

Our objectives are:

Collect: our crawlling system automatically collects URLs pointing to dangerous extensions.

Analyze: every URL is analyzed for the presence of Malware

Block: we provide feeds in 29 formats. Using this information, administrators can block access to malicious URLs preventing Malware infections

Alert: domain owners, server admins and ISPs hosting Malware receive an e-mail alert from us. Some security groups and CSIRTs are also notified

Monitor: infected URLs are continuously monitored to ensure our block lists are fresh and up to date. Every URL in our database is verified daily

Your use of this web site constitutes agreement to all Terms and Conditions. If you want to use our feeds/block lists in a commercial product or service, please contact us for licensing information.

If you find any false positives, please contact fp (a t) malwarepatrol.net

About us


We are an small company of security experts based out of Sao Paulo, Brazil. It all started in 2005 when friends were sharing malicious links in a security mailing list. Since then, we are collecting, analyzing and monitoring bad links, providing protection to our customers against malware infections. Systems are deployed on cloud servers to make it all work, multiple technologies are used and we are always researching and expanding the incoming data and the threat intelligence produced.

More information


If you want to know more about our project, visit the following pages:

Our thanks to