Maltrail

Websitehttps://github.com/stamparm/maltrail
CategoryThreat Intelligence

Maltrail is a malicious traffic detection system created by Miroslav Stampar that combines static threat intelligence lists with traffic analysis capabilities. Its static component maintains curated lists of known malicious IPs, domains, and URLs drawn from multiple sources, covering malware distribution, botnet infrastructure, ransomware, cryptominers, and other threats. We use Maltrail's indicator lists on robtex.com and rbls.org as part of our IP and domain reputation analysis.

Source:Maltrail

What is Maltrail?

Maltrail operates as both a network sensor and a threat intelligence repository. While its sensor component is designed for deployment on network perimeters to detect malicious traffic in real time, the project's threat intelligence database is independently valuable and widely used by other security tools and services.

The threat indicators in Maltrail are compiled from multiple sources and categories:

  • Malware - Known distribution points, payload servers, and update infrastructure
  • Ransomware - Payment portals, C2 servers, and distribution networks for ransomware families
  • Botnets - Command-and-control servers and known bot IPs for major botnet families
  • Cryptominers - Mining pool domains and cryptojacking infrastructure
  • Suspicious - IPs and domains associated with reconnaissance, scanning, or other pre-attack activity
  • Known attackers - Addresses with documented histories of exploitation attempts

What distinguishes Maltrail from simple blocklists is its curation approach. Rather than automatically aggregating every available feed, the project maintainers review and categorize indicators with context about the threat type and associated malware family. An IP flagged by Maltrail typically includes information about why it was flagged, not just that it was.

The project is open source, actively maintained, and the indicator database is updated frequently as new threats emerge and old infrastructure is decommissioned.

How We Use This Data

On IP lookup and reputation pages across robtex.com and rbls.org, we check queried addresses against Maltrail's indicator database. When a match is found, we display the threat category and, where available, the specific malware family or campaign associated with the IP.

Maltrail data provides a complementary perspective to scored feeds like IPsum. While IPsum tells you how many lists flag an IP, Maltrail tells you what specific threat the IP is associated with. An IP flagged by Maltrail as ransomware C2 infrastructure carries very different implications than one flagged as a suspected scanner.

The threat categorization helps security teams prioritize response. A connection to known ransomware infrastructure demands immediate investigation, while a connection to a suspected scanner might warrant monitoring but not emergency response.

FAQ

Is Maltrail the same as IPsum? They seem to come from the same author.
Both are created by Miroslav Stampar, but they serve different purposes. IPsum is a meta-aggregator that scores IPs by how many other blocklists flag them, providing a consensus-based confidence score. Maltrail maintains its own curated threat intelligence database with categorized indicators and context about specific threats. IPsum tells you the confidence level; Maltrail tells you the threat type. We use both because they provide complementary information.
Why might a legitimate domain appear in Maltrail?
Legitimate services can be abused for malicious purposes. Cloud storage services, URL shorteners, and CDNs sometimes host malicious content. In these cases, Maltrail may flag specific URLs or subdomains rather than the entire service. Compromised legitimate websites used for drive-by downloads or phishing may also appear until the compromise is resolved.
How does Maltrail handle indicators that are no longer active threats?
Indicators are reviewed and updated regularly. IPs and domains that are confirmed decommissioned or remediated are eventually removed from the active lists. However, there is typically a retention period because threat actors sometimes reactivate old infrastructure. On robtex.com and rbls.org, we show when data was last updated so you can assess the recency of any flagged indicator.