Blue Coat Labs

Select Malnet Type

Unique Host Names

2,448

Malnet Entry Points

Top Attack Site Top Level Domains

com 861
net 286
win 277
top 197
ro 143
info 138
pw 88
ru 64
org 64
pl 40

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

693

Malnet Entry Points

Top Attack Site Top Level Domains

cn 693

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

337

Malnet Entry Points

Top Attack Site Top Level Domains

ws 336
org 1

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

500

Malnet Entry Points

Top Attack Site Top Level Domains

ru 281
su 120
com 75
win 9
eu 6
trade 4
be 4

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.

Unique Host Names

200

Malnet Entry Points

Top Attack Site Top Level Domains

com 200

Network Visualizer

A malnet is comprised of unique domains, servers and websites that work together to funnel users to the malware payload. This visual mapping shows the relationships between the trusted sites that act as the entry point, the relay and exploit servers and the dynamic malware payloads.