Join the Deteque team at DNS-OARC 39th CENTR Technical Workshop, in Amsterdam, on 13-14 October 2018.

DNS-OARC logoFocused on DNS operations and research, the DNS-OARC event provides attendees with the opportunity to get a deeper understanding of the security and stability of the internet’s DNS infrastructure.

Connect with us to discuss how you can increase the security of your DNS infrastructure, through DNS Firewall Threat Feeds and Passive DNS.
Register here.

We look forward to connecting with attendees of ISF’s 29th Annual World Congress, in Las Vegas, on  27-30 October 2018.

Information Security logo Information Security Forum’s flagship event provides an opportunity for those attending to discuss and find solutions to current security challenges.  Leaning on both the expertise of security industry specialists from around the world and the experience of peers, there is a wealth of information available from best practices to the latest thought leadership.

Deteque’s resellers Security Zones will be on-hand to listen to the security challenges you are facing, and provide you with insights into how you can automatically prevent bad domain connections at a DNS level, alongside demonstrating a simple to use Passive DNS tool that provides a wealth of information for IT security teams, research teams and brand protection specialists. 

Register for ISF’s 29th Annual World Congress here.

We have now launched the production version of our improved Passive DNS Tool, so we are no longer looking for Beta Testers.  However, please click on the link below to get access.

Passive DNS Free Trial

Whether you are a security professional wanting to uncover patterns of malicious activity from networks across the world, or a brand protection specialist wanting to expose the deceptive use of specific domains, utilising Passive DNS data should be part of your toolset.

Digital globe with connections merged with screen with code and text "Passive DNS - Exclusive beta testing opportunity"

Passive DNS – exclusive beta testing opportunity

Passive DNS provides a wealth of valuable information to digital security professionals, enabling the user to review relationships that have both historically and currently exist between online properties e.g. domain names and internet protocol (IP) addresses, across the globe.  Discover more about Passive DNS here.

We are delighted to offer this the opportunity* to become one of the first  to use and provide feedback on our improved and simplified Passive DNS tool. 

Who can apply?

What do we offer?

  • Access to the web portal and API
  • Start-up documentation and a helping hand
  • Advice regarding how to use the tool for incident investigation and brand spoofing investigation

What do we require from you?

  • Must be available to engage in active testing.
  • Provide feedback via a phone call.

Please note that numbers are limited so please apply as soon as possible.

Good-luck and thank you!


*Sadly we can only accept those who meet the outlined requirements onto the beta testing program.

Brian Krebs investigates the Bitcanal “Hijack Factory” story which hit the news this week. Through continually hijacking Border Gateway Protocol (BGP) routes, Bitcanal leased swathes of IP addresses to spammers. Since 2014 Bitcanal has appeared in 103 SBL listings researched by Spamhaus. Read Brian’s article here .

This week sees Spamhaus featurning in the news in Doug Madory’s article focusing on Bitcanal; Shutting Down the BGP Hijack Factory.

The piece focuses on Bitcanal, who has been listed on various block lists of Spamhaus’s for over 3 years.  Doug Madory, Director of Internet Analysis at Oracle Dyn, shines the spotlight on Bitcanal, and focuses on the lessons Internet Exchange Points (IXPs) need to learn from this episode.

Spamhaus has published 103 SBL listings related to Bitcanal, going as far back as December 2014.  There have been inclusions on both their IPv6 Drop list, and ASN Droplist.






Enterprise business and technology service providers in the Japanese and Asia Pacific region now have global cyber threat intelligence on their doorstep. Thanks to a new partnership between Tokyo-based PIPELINE Security and Deteque, DNS threat protection, including DNS firewall data feeds, has never been easier to access.

logo of Pipeline Security

pipeline security delivers DNS protection to APAC

PIPELINE Security brings local delivery and support to the Japanese market. Their understanding of cyber security, combined with local knowledge is illustrated in their drive for precision and excellence.

Deteque provides network security intelligence, including DNS firewall data feeds, leveraging expertly researched threat intelligence from The Spamhaus Project.  The Project is a trusted third party currently protecting three billion user mailboxes and blocking the vast majority of spam and malware sent on the Internet.

Spamhaus and PIPELINE are positioned to help Internet Service Providers (ISPs), Email Service Providers (ESPs) and enterprises defend themselves from spam, malware, botnets and other online threats.

Simon Forster, CEO of Spamhaus Technology commented: “The move is designed to strengthen the Asia Pacific region against cyber attacks and broaden Deteque’s presence in Asian markets. With Pipeline Security we have an excellent partner to bring to new customers the threat intelligence that has been protecting our users for the past 20 years.”

Allan Watanabe, Managing Director of PIPELINE Security commented: “Cyber attacks are rapidly evolving and businesses are struggling to stay ahead of the cyber criminals. It is critical for businesses to utilize a threat intelligence strategy to transition from a reactive security to proactive security model. We are looking forward to providing Deteque’s real time threat intelligence to help secure our customers in Asia Pacific and Japan.












Internet Service Providers (ISPs) and their customers may be missing out on access to Spamhaus’s commercial grade block list feeds for email….and not realise. Here’s how ISPs can ensure their email stays protected with Spamhaus’s domain name server block lists (DNSBLs).

If you are using Google’s Public DNS, or similar public recursive server, and Spamahus’s free domain name server block lists (DNSBLs) your emails may not be protected.  Discover how to ensure you keep free access to Spamhaus’s email threat intelligence whilst using public DNS.

Taking intelligence from Spamhaus’s “The Most Abused Top Level Domains List”, Brian Krebs shines the spotlight on the riskiest top-level domains (TLDs).  Here he investigates the more recently released TLDs, noting their popularity among spammers and scammers.

The 10 Most Abused Top Level Domains