This is a non-IMPACT record, meaning that access to the data is not
controlled by IMPACT. For access, see the directions below.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Summary
DS-1210
maltrail
External Tool
External Data Source
GitHub
Unknown
Unknown
57 (lowest rank is 57)
Description
Malicious traffic detection system
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
Additional Details
7.3KB
false
Unknown
maltrail, 1210, inferlink, inferlink corporation, external, source, corporation, external data source, malicious, detection, system, traffic, malware, lists, user, trails, database, compiled, unknown, sql, 130, threats, sqlmap, 109, discovery, 185, executable, url, heuristic, automatic, attacker, black, custom, injection, utilizing, takeover, banjori, static, defined, mechanisms, exe, zvpprsensinaix, trail, 231, advanced, agent, optional, suspicious, publicly, other, harsh02, header, http, hxxp, domain, av, 120, tool, 162, reports