An open API service indexing awesome lists of open source software.

https://github.com/spydisec/spydithreatintel

A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.
https://github.com/spydisec/spydithreatintel

blocklist c2 commandandcontrol cybersecurity honeypot indicator-of-compromise ioc ioc-feed iocfeed malware osint pihole threat-hunting threat-intel threat-intelligence

Last synced: 11 months ago
JSON representation

A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.

Awesome Lists containing this project

README

          


Spydi's ThreatIntel Feed 🛡️

![GitHub repo size](https://img.shields.io/github/repo-size/spydisec/spydithreatintel) ![Daily IP List Update](https://healthchecks.io/b/2/58a455ee-d4bb-4081-bca4-0944d3594556.svg) ![Daily C2 Feed Update](https://healthchecks.io/b/2/ad6b7683-29fc-49f4-95d1-70c169e3d8e4.svg) ![Daily Domain List Update](https://healthchecks.io/b/2/9ef2114a-9a4f-4f73-9361-36fa22fd9ea7.svg) ![Daily ThreatFox IP List Update](https://healthchecks.io/b/2/df0b45c9-03bb-416e-9cff-97952285a9b4.svg) ![Daily Maltrail IP List Update](https://healthchecks.io/b/2/21cee47c-1c6c-48aa-a92b-5197170e9610.svg)

## 🚀 About This Project

Spydi's ThreatIntel Feed is a comprehensive threat intelligence platform that aggregates, curates, and maintains high-quality blocklists for malicious IPs and domains. The system combines data from multiple OSINT sources, honeypot networks, and threat intelligence feeds to provide actionable security data.

### Key Features:
- **Automated Updates**: Daily refresh of IP and domain blocklists
- **Multi-Source Intelligence**: Aggregates data from 12+ trusted OSINT feeds
- **Smart Filtering**: Implements whitelisting to minimize false positives
- **Threat Coverage**: Tracks 50+ threat actors and their infrastructure
- **CDN-Aware**: Special handling for CDN networks to prevent service disruption
- **Reference Analysis**: Cross-references removed IPs with OSINT feeds for validation

### Use Cases:
- Network security monitoring
- Firewall rule generation
- Threat intelligence integration
- Security research and analysis
- Malware infrastructure tracking

## Table of Contents
- 🔥[IP Blocklists](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-ip-blocklists)
- 🌐[Domain Blocklists](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-domain-blocklists)
- 📦[Permanent Blocklists](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-permanent-blocklists)
- 📁[Whitelist Files](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-whitelisting)
- 🕵️[Tracked Threats & Source list](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#%EF%B8%8F-tracked-threats--source-list)
- 🙌[Acknowledgements](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-acknowledgements)
- 🤝[Community Contributions](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-community-contributions)
- 📡[Contact me](https://github.com/spydisec/spydithreatintel?tab=readme-ov-file#-contact-me)

---
## 📋 Blocklists
### 🔥 IP Blocklists
| Blocklist Name | File Name | Description | False Positive Risk | Blocklist URL |
|----------------------|---------------------------------|-----------------------------------------------------------------------------|----------------------|-------------------------------------------------------------------|
| **Master IP Blocklist** | `master_malicious_iplist.txt` | Raw aggregated IPs from 12+ OSINT feeds (unfiltered) | **High** | [📥 Direct](https://spydisec.com/master_malicious_iplist.txt) |
| **Main IP Blocklist** | `filtered_malicious_iplist.txt` | Curated IPs with whitelisting applied for minimal false positives | **Low** | [📥 Direct](https://spydisec.com/maliciousips.txt) |
| **C2 Server IPs Blocklist** | `osintc2feed.txt` | Command-and-Control infrastructure from tracked threat actors | **Low** | [📥 Direct](https://spydisec.com/osintc2feed.txt) |

### 🌐 Domain Blocklists
| Name | Description | Blocklist URL |
|-----------------------------------|-----------------------------------------------------------------------------|-------------------------------------------------------------------------|
| **Spam/Scam Domains** | Phishing, scam, and spam domains | [📥 Direct Link](https://spydisec.com/spamblocklist.txt) |
| **Malware Domains** | Active malware distribution, C2, and exploit kit domains | [📥 Direct Link](https://spydisec.com/maliciousblocklist.txt) |
| **Ads & Tracking Domains** | Aggressive ads, trackers, and analytics domains | [📥 Direct Link](https://spydisec.com/adsblocklist.txt) |

### 📦 Permanent Blocklists
Persistent threats validated over 6+ months.
| Name | Description | Blocklist URL |
|-----------------------------------|-----------------------------------------------------------------------------|-------------------------------------------------------------------------|
| **Permanent Malicious IPs** | High-confidence IPs with long-term malicious activity | [📥 Raw](https://spydisec.com/permanentMaliciousIPList.txt) |
| **Permanent Malicious Domains** | Domains linked to persistent campaigns (e.g., ransomware, APTs) | [📥 Raw](https://spydisec.com/permanentMaliciousDomainList.txt) |

### 📁 Whitelisting
**Reduce false positives using these curated lists:**
| Name | Purpose | Raw URL |
|-----------------------------------|-----------------------------------------------------------------------------|-------------------------------------------------------------------------|
| **Removed IPs** | Legitimate IPs removed from the various IP blocklist | [📥 Raw](https://github.com/spydisec/spydithreatintel/tree/main/iplist/removedips) |
| **CDN IP Ranges** | Critical infrastructure IPs (Cloudflare, Akamai, Fastly) | [📥 Raw](https://raw.githubusercontent.com/spydisec/spydithreatintel/main/whitelist/cdnips.txt) |

---
## 🕵️ Tracked Threats & Source list
1. Actively monitored infrastructure across 50+ threat actors:

🔍 Expand Threat Catalog

| C2s | Malware | Botnets |
|---------------------------|----------------------------------|--------------|
| Cobalt Strike | AcidRain Stealer | 7777 |
| Metasploit Framework | Misha Stealer (AKA Grand Misha) | BlackNET |
| Covenant | Patriot Stealer | Doxerina |
| Mythic | RAXNET Bitcoin Stealer | Scarab |
| Brute Ratel C4 | Titan Stealer | 63256 |
| Posh | Collector Stealer | Kaiji |
| Sliver | Mystic Stealer | MooBot |
| Deimos | Gotham Stealer | Mozi |
| PANDA | Meduza Stealer | |
| NimPlant C2 | Quasar RAT | |
| Havoc C2 | ShadowPad | |
| Caldera | AsyncRAT | |
| Empire | DcRat | |
| Ares | BitRAT | |
| Hak5 Cloud C2 | DarkComet Trojan | |
| Pantegana | XtremeRAT Trojan | |
| Supershell | NanoCore RAT Trojan | |
| Poseidon C2 | Gh0st RAT Trojan | |
| Viper C2 | DarkTrack RAT Trojan | |
| Vshell | njRAT Trojan | |
| Villain | Remcos Pro RAT Trojan | |
| Nimplant C2 | Poison Ivy Trojan | |
| RedGuard C2 | Orcus RAT Trojan | |
| Oyster C2 | ZeroAccess Trojan | |
| byob C2 | HOOKBOT Trojan | |
| | RisePro Stealer | |
| | NetBus Trojan | |
| | Bandit Stealer | |
| | Mint Stealer | |
| | Mekotio Trojan | |
| | Gozi Trojan | |
| | Atlandida Stealer | |
| | VenomRAT | |
| | Orcus RAT | |
| | BlackDolphin | |
| | Artemis RAT | |
| | Godzilla Loader | |
| | Jinx Loader | |
| | Netpune Loader | |
| | SpyAgent | |
| | SpiceRAT | |
| | Dust RAT | |
| | Pupy RAT | |
| | Atomic Stealer | |
| | Lumma Stealer | |
| | Serpent Stealer | |
| | Axile Stealer | |
| | Vector Stealer | |
| | Z3us Stealer | |
| | Rastro Stealer | |
| | Darkeye Stealer | |
| | AgniStealer | |
| | Epsilon Stealer | |
| | Bahamut Stealer | |
| | Unam Web Panel / SilentCryptoMiner | |
| | Vidar Stealer | |
| | Kraken RAT | |
| | Bumblebee Loader | |
| | Viper RAT | |
| | Spectre Stealer | |

2. **Sources**: 12+ curated feeds including C2 servers, honeypot data, Mass-scanners, and OSINT feeds.

📚 View Full Source List

| Sources | Source URL |
|---------------------------|----------------------------------------------------------------------------|
| C2 IP Feed | [C2_iplist.txt](https://raw.githubusercontent.com/spydisec/spydithreatintel/refs/heads/main/iplist/C2IPs/osintc2feed.txt) |
| Honeypot Master list | [honeypot_iplist.txt](https://raw.githubusercontent.com/spydisec/spydithreatintel/refs/heads/main/iplist/honeypot/honeypot_extracted_feed.txt) |
| maltrail_scanners | [maltrail_ips.txt](https://raw.githubusercontent.com/stamparm/maltrail/master/trails/static/mass_scanner.txt) |
| botvrij_eu | [botvrij_eu](https://www.botvrij.eu/data/ioclist.ip-dst.raw) |
| feodotracker | [feodotracker](https://feodotracker.abuse.ch/downloads/ipblocklist.txt) |
| feodotracker_recommended | [feodotracker_recommended](https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt) |
| Blocklist_de_all | [Blocklist_de_all](https://lists.blocklist.de/lists/all.txt) |
| ThreatView_High_Confidence| [ThreatView_High_Confidence](https://threatview.io/Downloads/IP-High-Confidence-Feed.txt) |
| IPsumLevel_7 | [IPsumLevel7](https://raw.githubusercontent.com/stamparm/ipsum/refs/heads/master/levels/7.txt) |
| CINS_Score | [CINS_Score](https://cinsscore.com/list/ci-badguys.txt) |
| DigitalSide | [DigitalSide](https://osint.digitalside.it/Threat-Intel/lists/latestips.txt) |
| duggytuxy | [duggytuxy](https://raw.githubusercontent.com/duggytuxy/malicious_ip_addresses/refs/heads/main/botnets_zombies_scanner_spam_ips.txt) |
| etnetera.cz | [etnetera.cz](https://security.etnetera.cz/feeds/etn_aggressive.txt) |
| emergingthreats-compromised| [ET_Comp](https://rules.emergingthreats.net/blockrules/compromised-ips.txt) |
| greensnow.co | [greensnow.co](https://blocklist.greensnow.co/greensnow.txt) |
| More coming Soon! | [Future Updates](#) |

3. Whitelist CDN Coverage Matrix:

View CDN Whitelsit 🛡️

| Provider | Type | Coverage |
|----------------|--------------|--------------------------------------|
| Cloudflare | CDN IPv4/IPv6 | Global CDN |
| Akamai | CDN IPv4/IPv6 | Global CDN & Shield IPs |
| Fastly | CDN IPv4/IPv6 | Global CDN |
| Tailscale | DERP & Control Panel | Relay servers and control plane |

---

## 🙌 Acknowledgements
**Gratitude to our OSINT partners**
This project stands on the shoulders of these valuable resources:

- [Abuse.ch](https://abuse.ch) - Feodo Tracker
- [Botvrij.eu](https://botvrij.eu) - Threat Intelligence
- [Blocklist.de](https://blocklist.de) - Attack Data
- [CINS Army](https://cinsscore.com) - Threat Scoring
- [DigitalSide](https://osint.digitalside.it) - Italian CERT
- ...and 10+ other community maintainers

**Special Thanks** to MontySecurity for their C2 Tracker framework.

The active sources listed contribute to the compilation of block lists but do not have a direct one-to-one correspondence. Each source has its own license; please consult the source files or repositories for details.

---

## 🤝 Community Contributions
**Build a cleaner, more actionable feed**
We welcome contributions to enhance this resource for:
- **Individuals**: Simplify personal network security
- **SMBs**: Deploy cost-effective threat blocking
- **Enterprises**: Integrate scalable threat intelligence

**Key Focus Areas**:
🔹 **Deduplication**: Help eliminate redundant entries across feeds
🔹 **Reduce False Positive**: Help eliminate false positive IOCs from the feeds.
🔹 **Validation**: Flag false positives or outdated indicators
🔹 **Context**: Add threat actor/geo-tags for better filtering
🔹 **Automation**: Suggest workflow improvements for data curation

**How to Help**:
1. Submit verified IOCs via Pull Request
2. Report duplicate entries in [Issues](https://github.com/spydisec/spydithreatintel/issues)
3. Report false positive in [Issues](https://github.com/spydisec/spydithreatintel/issues)
4. Share feedback on enterprise/SMB integration patterns
5. Improve documentation for non-technical users

All contributors are acknowledged in our [Credits](https://github.com/spydisec/spydithreatintel/wiki/Contributors).

---
## 📡 Contact me
- **E-Mail**: [spyditi@proton.me](mailto:spyditi@proton.me) (PGP: [Key](https://pastebin.com/igL3mGVb))

[![OSINT Powered](https://img.shields.io/badge/Intel-OSINT_Powered-yellow?style=for-the-badge)](#)

---