vMoshpit Lab InfoSec
search
⌘Ctrlk
vMoshpit Lab InfoSec
  • Welcome
  • ☣️Reconnaissance
  • ☣️Initial Access
  • ☣️Weaponization
  • ☣️Data Exfiltration
  • ☣️Persistance
  • ☣️Lateral Movement
  • ☣️Command & Control
  • 📘Blue Team Guides
    • Threat Hunting
    • Malware Analysis
    • Suspicious TLDs
  • 🔍Cheat Sheets
  • ✅Basics
    • Linux Basics
    • Windows Commands
    • Darknet
  • ✅Examples and Walkthroughs
    • Example 01: Exploiting Windows
    • Example 02: Meterpreter Walkthrough
    • Example 03: Placeholder
    • OSCP Notes
    • SQL Injection
  • fireExploits
    • CVE-2024-32651
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 📘Blue Team Guides

Suspicious TLDs

hashtag
Resources

TLD abuse statistics http://www.cybercrimeinfocenter.org/arrow-up-right

Spamhaus statistics https://www.spamhaus.org/statistics/tlds/arrow-up-right

Cybercrime trends https://trends.netcraft.com/cybercrime/tldsarrow-up-right

Hunting Guide https://detect.fyi/threat-hunting-suspicious-tlds-a742c2adbf58arrow-up-right

PreviousMalware Analysischevron-leftNextCheat Sheetschevron-right

Last updated 2 years ago