Skip to content

spydisec/spydithreatintel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

13,281 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Spydi's ThreatIntel Feed πŸ›‘οΈ

Daily IP List Update Daily C2 Feed Update

πŸ“’ Update: Blocklists are now served from Cloudflare R2 for faster global delivery and reduced latency. Use the download links below instead of raw GitHub URLs. Website & API coming soon!

πŸš€ About

Comprehensive threat intelligence blocklists aggregated from multiple OSINT sources, honeypot networks, and C2 trackers. Multi-source validation, confidence-based tiers, and CDN-aware whitelisting.

πŸ“‘ Quick Links: IP Blocklists β€’ Domain Blocklists β€’ Sources β€’ Credits

⚠️ License Notice: Each OSINT feed is governed by its own terms. Users must review original source documentation for specific licensing details.


πŸ”₯ IP Blocklists

Confidence-based tiers with multi-source validation

Tier Blocklist Download
🎯 High High Confidence (Limited ~5K) πŸ“₯ Download
🎯 High High Confidence (Unlimited) πŸ“₯ Download
βš–οΈ Medium Medium Confidence (Limited ~25K) πŸ“₯ Download
βš–οΈ Medium Medium Confidence (Unlimited) πŸ“₯ Download
πŸ”¬ Low Low Confidence (All Others) πŸ“₯ Download
πŸ“Š Research Full Research Blocklist πŸ“₯ Download
πŸ—„οΈ Archive Permanent (Append-Only) πŸ“₯ Download
πŸ” Confidence Scoring Details

Multi-Source Validation: IPs are scored by how many independent threat intelligence sources report them.

Tier Threshold Description
🎯 High Limited 5+ sources Strictest tier - confirmed malicious across 5+ feeds
🎯 High Unlimited 3+ sources High confidence - validated by 3+ independent sources
βš–οΈ Medium 2+ sources Medium confidence - corroborated by 2 sources
πŸ”¬ Low 1 source Single-source reports - use with caution

Example: An IP reported by ThreatFox, Feodo Tracker, IPsum, CINS Score, and Blocklist.de would have source_count=5 β†’ appears in High Limited.

Whitelist Protection: CDN ranges (Cloudflare, Akamai, Fastly, Tailscale) are automatically excluded to prevent false positives.


🌐 Domain Blocklists

Independent category processing - import any/all into Pi-hole/AdGuard

Category Blocklist Download
πŸ›‘οΈ Security Malicious Domains πŸ“₯ Download
πŸ“§ Spam Spam/Scam/Abuse Domains πŸ“₯ Download
πŸ“Ί Privacy Ads & Tracking Domains πŸ“₯ Download
πŸ—„οΈ Archive Permanent Domains (Append-Only) πŸ“₯ Download

πŸ“ Whitelisting

Reduce false positives using these curated lists:

Name Purpose Raw URL
Removed IPs Legitimate IPs removed from blocklists πŸ“₯ Raw
Whitelisted IPs Critical infrastructure IPs (Cloudflare, Akamai, Fastly) πŸ“₯ Raw
Community IPs Community-submitted IP whitelist πŸ“₯ Raw
Community Domains Community-submitted domain whitelist πŸ“₯ Raw

πŸ’‘ Found a false positive? Submit a Whitelist IP Request or Whitelist Domain Request β€” automated validation and processing via GitHub Actions.


πŸ•΅οΈ Tracked Threats & Source list

  1. Actively monitored infrastructure across 50+ threat actors:
πŸ” Expand Threat Catalog
C2s Malware Botnets
Cobalt Strike AcidRain Stealer 7777
Metasploit Framework Misha Stealer (AKA Grand Misha) BlackNET
Covenant Patriot Stealer Doxerina
Mythic RAXNET Bitcoin Stealer Scarab
Brute Ratel C4 Titan Stealer 63256
Posh Collector Stealer Kaiji
Sliver Mystic Stealer MooBot
Deimos Gotham Stealer Mozi
PANDA Meduza Stealer
NimPlant C2 Quasar RAT
Havoc C2 ShadowPad
Caldera AsyncRAT
Empire DcRat
Ares BitRAT
Hak5 Cloud C2 DarkComet Trojan
Pantegana XtremeRAT Trojan
Supershell NanoCore RAT Trojan
Poseidon C2 Gh0st RAT Trojan
Viper C2 DarkTrack RAT Trojan
Vshell njRAT Trojan
Villain Remcos Pro RAT Trojan
Nimplant C2 Poison Ivy Trojan
RedGuard C2 Orcus RAT Trojan
Oyster C2 ZeroAccess Trojan
byob C2 HOOKBOT Trojan
RisePro Stealer
NetBus Trojan
Bandit Stealer
Mint Stealer
Mekotio Trojan
Gozi Trojan
Atlandida Stealer
VenomRAT
Orcus RAT
BlackDolphin
Artemis RAT
Godzilla Loader
Jinx Loader
Netpune Loader
SpyAgent
SpiceRAT
Dust RAT
Pupy RAT
Atomic Stealer
Lumma Stealer
Serpent Stealer
Axile Stealer
Vector Stealer
Z3us Stealer
Rastro Stealer
Darkeye Stealer
AgniStealer
Epsilon Stealer
Bahamut Stealer
Unam Web Panel / SilentCryptoMiner
Vidar Stealer
Kraken RAT
Bumblebee Loader
Viper RAT
Spectre Stealer
  1. Sources: Curated feeds including C2 servers, honeypot data, Mass-scanners, and OSINT feeds.
πŸ“š View Full Source List
Sources Source URL
C2 IP Feed C2_iplist.txt
Honeypot Master list honeypot_iplist.txt
maltrail_scanners maltrail_ips.txt
botvrij_eu botvrij_eu
feodotracker feodotracker
feodotracker_recommended feodotracker_recommended
Blocklist_de_all Blocklist_de_all
ThreatView_High_Confidence ThreatView_High_Confidence
IPsumLevel_7 IPsumLevel7
CINS_Score CINS_Score
DigitalSide DigitalSide
duggytuxy duggytuxy
etnetera.cz etnetera.cz
emergingthreats-compromised ET_Comp
greensnow.co greensnow.co
Threatfox Threatfox
More coming Soon! Future Updates
  1. Whitelist Coverage Matrix:
View Whitelist Sources πŸ›‘οΈ
Provider Type Coverage Source Link
Cloudflare CDN IPv4/IPv6 Global CDN Cloudflare IPs
Akamai CDN IPv4/IPv6 Global CDN & Shield IPs Akamai IPs
Fastly CDN IPv4/IPv6 Global CDN Fastly IPs
Tailscale DERP & Control Panel Relay servers and control plane Tailscale DERP
Uptime Robot IPv4 UptimeRobot Monitoring UptimeRobot IPs

πŸ™Œ Acknowledgements

Gratitude to our OSINT partners This project stands on the shoulders of these valuable resources:

Special Thanks to MontySecurity for their C2 Tracker framework and elliotwutingfeng for Inversion DNSBL Blocklists.


🀝 Community Contributions

Help us build the most reliable threat intelligence feed in the open-source community! πŸš€

We welcome contributions from security researchers, network administrators, and cybersecurity enthusiasts to enhance this resource for:

  • 🏠 Individuals: Strengthen personal network security with accurate blocklists
  • 🏒 SMBs: Deploy cost-effective threat blocking without enterprise overhead
  • πŸ—οΈ Enterprises: Integrate scalable, production-ready threat intelligence

🎯 Key Focus Areas

We're particularly interested in contributions that help us:

  • πŸ”„ Deduplication: Eliminate redundant entries across multiple feeds
  • 🎯 False Positive Reduction: Identify and remove legitimate IPs/domains incorrectly flagged
  • βœ… Validation: Flag outdated indicators or confirm active threats
  • 🏷️ Context Enhancement: Add threat actor attribution, geolocation tags, or threat categories
  • ⚑ Automation: Suggest workflow improvements for data processing and curation

πŸ’‘ How to Contribute

Get involved in multiple ways:

  1. πŸ“ Request Whitelisting - Submit a Whitelist IP or Whitelist Domain request to report false positives (automated validation & processing)
  2. πŸ› Report Issues - Flag duplicates, false positives, or outdated entries in GitHub Issues
  3. πŸ’¬ Share Feedback - Help improve enterprise/SMB integration patterns and use cases
  4. πŸ“š Documentation - Enhance guides for non-technical users and integration tutorials
  5. πŸ”§ Code Contributions - Improve processing scripts, add new data sources, or enhance automation

Every contribution helps make cybersecurity more accessible and effective for everyone! 🌐


πŸ“‘ Contact me

πŸ“§ Email: spydisec@proton.me

About

Spydi ThreatIntel Feed is built on open-source threat intelligence, community-maintained blocklists, and public security research.

Topics

Resources

License

Stars

Watchers

Forks

Contributors