Consolidated Malware Sinkhole List

Categories Sinkholes

Lesley Carhart has compiled an epic list of sinkholes over at tisiphone.net [1]. She used methods in a paper by Michael B Jacobs [2] to detect and confirm these, primarily through DNS and behavioural analysis.

Consolidated Malware Sinkhole List:

[1] https://tisiphone.net/2017/05/16/consolidated-malware-sinkhole-list/
[2] https://www.first.org/resources/papers/conf2016/FIRST-2016-78.pdf