Skip to content

ThreatMon/ThreatMon-Daily-C2-Feeds

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


📕 ThreatMon's Daily Command and Control (C2) Feed

🗒️ What is Daily C2 Feed?

The Daily C2 Feed is a community contribution provided by ThreatMon Cyber Threat Intelligence under the name TM Threat Intelligence, which provides users with command-and-control (C2) servers that malware uses to exfiltrate data from the computer infected with the malware, limited for everyone's safety.

📊 How to Present the Command and Control (C2) Feed?

This service offered by ThreatMon uses the blacklist format used in firewalls to facilitate integration into users' own security systems and to increase the readability of the data.

The daily data provided free and limited of charge by ThreatMon includes

  • HTTP
  • HTTPS
  • IPv4
  • IPv6
  • Domain

The data given above is archived in the "ThreatMon Daily C2 Feed" repository in a limited number of days.
To access the data, you can go to the folder specified with the year and month you want to access and view the file containing the command-and-control (C2) servers of the day you want to access.

Warning
This command-and-control (C2) data, provided by ThreatMon, presents the top 50 detected data for the day.
In addition, since this limited and free service is for the community, it does not promise users the validity of archived data, assuming that it can be used for legal purposes later on. However, ThreatMon continues to improve to always provide you with the most reliable and accurate data quickly.


ThreatMon offers you URL IPv4, IPv6 Domain, information of malware to ensure that you and your systems are protected from malware. You can take advantage of the free feed service provided by ThreatMon for the security of your systems, or you can check our premium and enterprise services for a higher level of security.

🏬 About ThreatMon

ThreatMon is a company that provides services on Threat Intelligence, Attack Surface Management, Digital Risk Protection and Security Validiton services, especially Cyber Threat Intelligence and Attack Surface Management services, working with expert teams in the field and signing global studies.

For more information about us, please visit our website. 👈

About

IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.

Topics

Resources

Stars

Watchers

Forks