Blue Coat Malnet Dashboard

Malnets (malware networks) are distributed infrastructures within the Internet that are built and maintained for the purpose of launching a variety of attacks against unsuspecting users over extended periods of time. They gather users, typically when they are visiting trusted sites, and route them to malware, via relay, exploit and payload servers that continually shift to new domains and locations. Blue Coat is currently tracking more than 3,300 unique malnets that may be active on any given day. Each of these malnets varies in size from day to day depending on the current level of malicious activities and attacks.

By identifying and tracking malnet infrastructures, the Blue Coat WebPulse collaborative defense can link new servers and domains to known malicious components and block them at the source, before they are used to launch attacks. This negative day defense delivers the most comprehensive protection against web-based threats.

Unique Host Names

66,382

Malnet Entry Points

Top Attack Site Top Level Domains

com 21,471
ru 8,548
de 6,956
pl 4,862
tk 4,819
in 3,661
net 3,642
org 1,845
us 1,165
biz 1,004
info 1,001
co.uk 723
it 695
se 640
nl 434

Top Hazardous Search Term Hits

unblocked games
Duck Dynasty Cast Member Dies
gmail.com
governor of poker
http://facceabok.tk/
2048 unblocked
proxy website
cost for south piedmont community college courses
teen model tumblr
Matextra Nyköping

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

3,128

Malnet Entry Points

Top Attack Site Top Level Domains

com 1,247
de 897
net 115
org 91
it 88
nl 72
se 65
co.uk 59
pl 57
info 37
at 30
co.za 27
in 25
fr 24
ca 20

Top Hazardous Search Term Hits

Order Business Cards Online Cheap
patient resources, diabetes
boyer rameau strigolactones
http://www.technomodel.it/
sap plm
Time course of cerebrovascular autoregulation during extreme Trendelenburg position for robotic-assisted prostatic surgery
skavsta
http://pryca.org/
RSV treatment pediatrics
okq8 hyrbil

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

4,991

Malnet Entry Points

Top Attack Site Top Level Domains

com 2,149
de 599
co.uk 546
nl 291
pl 287
ru 112
org 94
net 90
es 73
be 69
it 63
se 55
com.ar 48
info 48
fr 48

Top Hazardous Search Term Hits

http://www.verschenkdochnix.de/
Test-Drive.pl
excel manutention
Blue Phase Green Tree Python
The DeBolt Company
gann dagersheim
http://www.rene3.de/
mumaith khan bouncing boobs
http://www.wirtshaus-regil.de/
http://www.restaurant-foerderturm.de/

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

3,072

Malnet Entry Points

Top Attack Site Top Level Domains

co.uk 3,064
com 3
info 2
net 1
org 1

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

5,048

Malnet Entry Points

Top Attack Site Top Level Domains

us 4,550
asia 454
biz 43
co.uk 1

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

1,256

Malnet Entry Points

Top Attack Site Top Level Domains

info 1,256

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

555

Malnet Entry Points

Top Attack Site Top Level Domains

cn 555

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

48

Malnet Entry Points

Top Attack Site Top Level Domains

in 48

Top Hazardous Search Term Hits

best formal cufflinks

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

504

Malnet Entry Points

Top Attack Site Top Level Domains

in 455
com 49

Top Hazardous Search Term Hits

list of superpowers
times of india
brosco cad files
the bloggness

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

254

Malnet Entry Points

Top Attack Site Top Level Domains

org 254

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.