How We Make The Project Work – We use a series of Python scripts and a Flask web applicationĀ for the purpose of feeding back and adding the sourced cTLD domains for monitoring and into the local MySQL database. The importance of this is simplicity in comparison with high quality results which is where we excel at.
214,000 Successfully Resolved with All DNS Record Types 100% confirmed to be fraudulent and malicious cTLD domains obtained in real-time and on a daily basis
We Source Our Technical Collection Picks from 100% Publicly Accessible Information
Our Categories of Coverage Include – Malware Download Domains, Phishing Domains, Spam Domains, Malware Command and Control Domains, Disinformation and Misinformation and Fake News Domains, Cybercrime Forums, Cyber Jihad Domains, Advanced Persistent Threat Malware Download Domains and Advanced Persistent Threat Malware Command and Control Domains
We’re also using GeoLite’s Geolocation to resolve all the IPs that responded to their appropriate country and ASN for maximum visibility of our data
We’re covering the following DNS record types:
A
AAAA
AFSDB
APL
CAA
CDNSKEY
CDS
CERT
CNAME
CSYNC
DHCID
DLV
DNAME
DNSKEY
DS
EUI48
EUI64
HINFO
HIP
HTTPS
IPSECKEY
KEY
KX
LOC
MX
NAPTR
NS
NSEC
NSEC3
NSEC3PARAM
OPENPGPKEY
PTR
RP
RRSIG
SIG
SMIMEA
SOA
SRV
SSHFP
SVCB
TA
TKEY
TLSA
TSIG
TXT
URI
ZONEMD
We’re continuously working to improve the Web based interface and add additional features for users to use and take advantage of