Millions of users, M2M updates & IoT devices rely on the Domain Name System (DNS) to connect automatically to websites and domains. Use RPZ as a DNS firewall so you don’t run the risk of connecting to domains that are used to install malware, ransomware, botnets.
Response Policy Zones (RPZ) threat intelligence provides protection against malicious domains used to install botnets, ransomware and other malware.Start your free trial
Deteque researchers and automated systems gather information from across the internet to identify actively malicious domains, low reputation domains before they become active and compromised IP addresses.
The data sets of poor reputation domains and IP addresses is the cyber threat intelligence you need to provide your network with protection against botnets, ransomware and domain based security threats.
Online fraud, disruption and exploitation take many forms so Deteque Zones are always evolving to take into account new types of threats and new ways cyber criminals abuse the DNS process.Download the datasheet
Deteque’s global research team works on your behalf to bring you the most comprehensive set of malicious domains on the internet. Don’t just rely on user training and vigilance for protection: RPZ provides automated protection from visiting malicious websites and domains (particularly useful as a defence against phishing).
Domains used as malware dropper sites, malware hosting sites, malicious redirectors, domains used by botnets, botnet command and control servers and other malicious activity. It includes domains used as spam sources and senders, known spammers and spam gangs, phishing, virus and malware-related sites.
Includes ‘Slow Release’ segment which holds domains for longer in case bad actors try to recycle domains.
Lists name servers which are known to resolve malicious domains.
Don’t let cyber criminals abuse or hijack your network – these Malware zones block domains that are used specifically to abuse your systems.
This zone contains IPs of known botnet C&C servers so it is highly likely that any machine resolving domains pointing to an IP listed in this zone has been compromised and is hosting malware.
Includes segment of domains generated by Domain Generation Algorithms, created from sandboxed malware and lists domains that the malware might use to contact C&C servers.
A subset of DBL.zone containing just those domains associated with malware. (Spam sources, phish sources and redirectors are excluded from this dataset.)
An extension to malware.zone containing domains which are known to be associated with malware but scoring mechanisms have not included them in the main listing. Due to the ‘aggressive’ nature of this list, it has a slightly greater chance of false positives.
Domains revealed from running adware in sandboxes. Helps you to identify which of your machines need to be cleaned up.
Even the best run networks can be abused occasionally – Deteque keeps track of those that should be temporarily avoided.
Contains legitimate servers and/or services which have been (temporarily) compromised. False positives are possible as the servers are mostly legitimate but being used to distribute malware. Risk averse organizations may consider the tradeoff to be acceptable.
IP ranges from an area of the IP address space reserved, but not yet allocated or delegated, by the Internet Assigned Numbers Authority (IANA) or a delegated Regional Internet Registry (RIR). Frequently used to target specific organizations.
Cyber criminals change their methods constantly – this zone contains the datasets of varying and evolving threats.
Blocks crypto mining networks using browser-based code to hijack processing power.
Known spam sources (IP) Based on the Deteque Block List
TOR exit nodes.
Blocks connections to newly-registered and previously dormant domains for 24 hours. Domains are removed after 24 hours or transferred to another zone feed based on reputation assessment.
There are some domains that you should not connect to under any circumstances – Deteque has compiled a list of the ‘worst of the worst’.
An advisory ‘drop all traffic’ list, consisting of netblocks that are ‘hijacked’ or leased by professional spam or cyber-crime operations (used for dissemination of malware, trojan downloaders, botnet controllers). Designed for use by firewalls and routing equipment to filter out the malicious traffic from these net blocks.
Without RPZ, a client queries a local DNS resolver. If the IP address for that domain is not included in its cache, it will query in turn an external root server, the Top Level Domain server and the domain server itself to get access to the site. The process will return both legitimate and malicious sites.
When a client initiates a query on an RPZ enabled nameserver, each step of the recursive DNS process is analyzed to identify bad domains, addresses and nameservers. If RPZ identifies a security risk then the DNS server returns a ‘does not exist’ type answer to prevent access.Download the factsheet
Concerned that your network might be compromised by connections to malicious or low reputation domains and websites? Need to choke botnets that might be on your network? Then RPZ Threat Intelligence is for you. Cyber criminals are actively trying to trick users into inadvertent connections so use RPZ to ensure your DNS security.
RPZ is such a powerful tool we want you to experience it for free. The DROP (Do not Route Or Peer) Zone protects you from the ‘worst of the worst’ - IP ranges known to have been hijacked by professional spammers and cyber criminals, or have been directly allocated to criminal organizations by a regional internet registry. It also includes a list of IP ranges that cyber criminals have leased from ISPs.
We have made this Zone available as a no-cost public service to direct users of the data. See the positive impact RPZ from Spamhaus can have protecting you, your networks and your users.
To receive RPZ you will need to set up your local recursive resolver. For use with the popular BIND software, download the Set Up Guide.