Summary Report - (Past 24 hours)
Botnets are collections of compromised hosts that attackers remotely control for their own nefarious purposes.
Once installed and running, a malicious bot will attempt to connect to a remote server to receive instructions on what actions to take. The most common command and control (C&C) protocol used for this is Internet Relay Chat (IRC). While a legitimate protocol for online chat, IRC is often used by attackers due to the relative simplicity of the protocol along with the ready availability of bot software written to use it. After connecting, a bot-controlled host can be controlled by an attacker and commanded to conduct malicious actions such as sending spam, scanning the Internet for other potentially controllable hosts, or launching DoS attacks.
ATLAS maintains a real-time database of malicious botnet command and control servers that is continuously updated. This information comes from malware analysis, botnet infiltration, and other sources of data.
Host Number of servers Percentage 184.108.40.206 (220.127.116.11.static.midphase.com) 11.1% 18.104.22.168 (bk73533.trdns.com) 11.1% 22.214.171.124 (ks369213.kimsufi.com) 11.1% 126.96.36.199 (94-182-208-131.shatel.ir) 11.1% 188.8.131.52 (usr-92-255-106-211.clgp.ru) 11.1% 184.108.40.206 (forextrading.ru) 11.1% 220.127.116.11 (ns38215.ovh.net) 11.1% 18.104.22.168 (no-rdns-yet) 11.1% 22.214.171.124 11.1% 126.96.36.199 11.1% Other 8389.2%