Common Domain-Based Threats
Phishing Domains
Phishing domains impersonate legitimate websites to steal credentials, financial information, or personal data. These domains often use typosquatting (e.g., g00gle.com), homograph attacks with similar-looking Unicode characters, or subdomain deception (e.g., login.bank.example.com). Phishing infrastructure is typically short-lived, with domains active for only hours or days before being taken down and replaced.
Malware Hosting
Malware hosting domains serve malicious payloads to victims. These include initial-stage downloaders (droppers), information stealers, ransomware, and remote access trojans. Threat actors use a mix of dedicated malicious domains, compromised legitimate sites, and file-sharing platforms to distribute malware. Our intelligence tracks malware families including RedLine, Emotet, AgentTesla, AsyncRAT, and dozens more.
Command and Control (C2) Domains
C2 domains are used by attackers to communicate with compromised systems. Once malware infects a device, it connects to C2 infrastructure to receive commands, exfiltrate data, or download additional payloads. Modern C2 frameworks use techniques like domain fronting, DNS tunneling, and legitimate cloud services to evade detection. Identifying C2 domains in your network traffic is a strong indicator of compromise.
Automate Domain Checks with the API
Integrate domain reputation checks into your security workflow:
# Check domain for malware URLs curl -s https://ip.wayscloud.services/api/malware/domain/suspicious-site.xyz # Search for a domain in threat intelligence curl -s "https://ip.wayscloud.services/api/search/suspicious-site.xyz" # Check resolved IPs for a domain curl -s https://ip.wayscloud.services/api/dns/check/suspicious-site.xyz