vMoshpit Lab InfoSec
Ctrlk
  • Welcome
  • ☣️Reconnaissance
  • ☣️Initial Access
  • ☣️Weaponization
  • ☣️Data Exfiltration
  • ☣️Persistance
  • ☣️Lateral Movement
  • ☣️Command & Control
  • 📘Blue Team Guides
    • Threat Hunting
    • Malware Analysis
    • Suspicious TLDs
  • 🔍Cheat Sheets
  • ✅Basics
    • Linux Basics
    • Windows Commands
    • Darknet
  • ✅Examples and Walkthroughs
    • Example 01: Exploiting Windows
    • Example 02: Meterpreter Walkthrough
    • Example 03: Placeholder
    • OSCP Notes
    • SQL Injection
  • Exploits
    • CVE-2024-32651
Powered by GitBook
On this page
  1. 📘Blue Team Guides

Suspicious TLDs

Resources

TLD abuse statistics http://www.cybercrimeinfocenter.org/

Spamhaus statistics https://www.spamhaus.org/statistics/tlds/

Cybercrime trends https://trends.netcraft.com/cybercrime/tlds

Hunting Guide https://detect.fyi/threat-hunting-suspicious-tlds-a742c2adbf58

PreviousMalware AnalysisNextCheat Sheets

Last updated 2 years ago