The Spamhaus Project

Spamhaus strengthens trust and safety for the Internet. Advocating for change through sharing reliable intelligence and expertise. As the authority on IP and domain reputation data, we are trusted across the industry because of our strong ethics, impartiality, and quality of actionable data. This data not only protects but also provides signal and insight across networks and email worldwide. โ€ฉWith over two decades of experience, our researchers and threat hunters focus on exposing malicious activity to make the internet a better place for everyone. A wide range of industries, including leading global technology companies, use Spamhaus' data; currently protecting over 4.5 billion mailboxes worldwide.

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-13

...around 60 SBL listings remain unresolved one month later!

Have we sniffed out additional bulletproof hosting providers?๐Ÿ‘ƒ

Time will reveal all, and we will closely monitor ๐Ÿ‘€ those networks who ignored the Operation Endgame 2.0 SBL listings...

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-13

Through Operation Endgame 2.0, we have created more than 150 Spamhaus Blocklist (SBL) listings to assist with takedown efforts of cybercriminal infrastructure at ISPs that do not cooperate with law enforcement agencies. ๐Ÿš”

Many of these listings involved tier-1 botnet controller infrastructure, which is commonly located at bulletproof hosting providers.๐Ÿ•ต๏ธ

Thanks to these listings, we gained insights into how the involved ISPs react to abuse reports. Most of them responded โœ…

However...โคต๏ธ

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-12

@gzobra thanks for the heads up!

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-11

Big shout out to the latest Threat Intel Community Top10 new entries!! ๐Ÿ“ฃ ๐Ÿคฉ

๐Ÿ“ฉ TF0
๐ŸŒ mugufinder
๐ŸŒ Mir Ali Shahidi
๐ŸŒ Contributor: PG22
๐Ÿ”— Contributor: IM53
๐Ÿ”— EGP Abuse Dept.

A big THANK YOU to all our contributors for your ongoing support & submissions ๐Ÿ™

Contributors PG22, IM53 claim your name!

It only takes a min to review your 'Display Name' and give consent to share it on the leaderboard.

Login here: ๐Ÿ‘‰ auth.spamhaus.org

#ThreatIntel #RawSource #Domains #IPs #URLs

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-11

@gzobra thank you for sharing. You should be able to view the formulas now.

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-10

โ€œ.adโ€ registry (Andorra ๐Ÿ‡ฆ๐Ÿ‡ฉ) has stepped up its game, with malicious domain detections down -84%, dropping to #33 on the list of most abused ccTLDs. Nice work. โœŒ๏ธ

Meanwhile, โ€œ.myโ€ (Malaysia ๐Ÿ‡ฒ๐Ÿ‡พ) โ€” despite its strict registration rules โ€” has seen a +73% spike in abuse, shooting up to #6 with 24,294 detections. Ouch!

๐ŸŒ Full stats over at:
spamhaus.org/reputation-statis

Spamhaus Reputation Statistics: ccTLDs
The Spamhaus Project boosted:
abuse.ch :verified:abuse_ch@ioc.exchange
2025-06-10

๐Ÿ“ข Heads-up! In just 3 WEEKS authentication will be required to access data via API across ALL our platforms. This change will help us manage heavy usage and keep things running smoothly for everyone โžก๏ธ #SteadyPlatform #SteadySignal

Rely on our APIs?

#AuthenticateNow, to avoid any problems and maintain uninterrupted availability - three weeks will fly!

3 weeks remaining before mandatory authentication - starting June 30th.
The Spamhaus Projectspamhaus@infosec.exchange
2025-06-06

โ—Latest Spamhaus DROP listings, from the worst of the worst IP traffic:

๐Ÿ‘‰ SBL680571 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680501 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680499 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL656295 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680556 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680555 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL676677 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680524 check.spamhaus.org/results?que
๐Ÿ‘‰ SBL680504 check.spamhaus.org/results?que

๐Ÿ”ฅ Did you know Spamhaus provides FREE access to this layer of protection?

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-06

Get it here โžก๏ธ spamhaus.org/blocklists/do-not

Remember, this is traffic you do not want to connect with. Not ever. DROP it and move on.

#DROP #IPs #BulletproofHosting #ThreatIntel

The Spamhaus Project boosted:
2025-06-06

PSA: After getting duly sanctioned last month by the EU for being a conduit for Russian disinformation and cyberattacks, the people behind the massive bulletproof hosting service known as Stark Industries Solutions Inc are rebranding.

Stark's two sanctioned owners -- the Neculiti brothers -- have operated Stark via a related business called PQ Hosting, which is now changing its name to the[.]hosting.

"The PQ.Hosting project no longer exists โ€” neither as a legal entity nor as an operational structure. From the moment of transition, full control over all operational and technical activities has passed to new owners with no connection to the previous management or beneficiaries."

Uh huh.

the.hosting/en/news/pqhosting-

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-05

We have identified yet another ongoing IP hijacking operation primarily involving dormant APNIC IPv4 address space. Hanging off unallocated AS146887, previously used by ๐Ÿ‡ฎ๐Ÿ‡ณ NOOB TECHNOLOGIES PRIVATE LIMITED, the operation consists of:

โžก๏ธ AS17994 (๐Ÿ‡ณ๐Ÿ‡ฟ Appserv Limited, merged out of existence in 2017)
โžก๏ธ AS132899 (๐Ÿ‡ญ๐Ÿ‡ฐ/๐Ÿ‡น๐Ÿ‡ผ/๐Ÿ‡ฌ๐Ÿ‡ง URNET SOLUTIONS LTD., their UK-based entity dissolved in 2016)
โžก๏ธ AS328819 (๐Ÿ‡ฟ๐Ÿ‡ฆ Bluecentrix PTY LTD a/k/a Smartswitch, liquidated following a 2024 court order)

As is so often in IP hijacking incidents, their network resources fell through the cracks when the company went out of business.

The miscreants, however, moved swiftly, identifying such orphaned allocations, re-registering involved domains, if necessary, and seeking a means to bring them back online for facilitation of their nefarious purposes, most frequently, snowshoe spamming.

In this case, the re-registered domains appserv[.]co[.]nz and bluecentrix[.]co[.]za even surface on the same Cloudflare nameservers, indicating the same threat actor being responsible for both hijacking incidents.

Uplink of this operation is ๐Ÿ‡ท๐Ÿ‡บ JSC TransTeleCom (AS20485), an ISP with a history of routing rogue ASNs. Spamhaus currently observes St. Petersburg-based TransTeleCom routers providing connectivity to AS146887.

Needless to say, all IP networks and Autonomous Systems are listed in Spamhaus's DROP lists โคต๏ธ
spamhaus.org/blocklists/do-not

If you don't already, start using them!

See spamhaus.org/resource-hub/hija for more insights into IP hijacking and involved TTPs, and keep an eye out for write-ups on the inevitable next IP hijacking incident. ๐Ÿ•ต๏ธ

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-04

๐Ÿ“ข OPERATION ENDGAME 2.0 UPDATE | Following last week's announcement, weโ€™re seeing great progress with remediation efforts...

๐Ÿ“ง 3266 ISPs and hosting companies notified,
โฌ‡ With a 40% download rate of remediation data!

If you've received a notification, and are yet to take action, here's what you need to do:

1. Go to: spamhaus.org/endgame-2
2. Enter the access code provided in the email.
3. Download the list of breached email accounts.
4. Verify each email account, and where necessary, contact the owner and ask them to reset their password (there's an email template on the remediation webpage).

Thank you again to everyone who is part of this important effort ๐Ÿ™

#Trustandsafety #OperationENDGAME2 #Takedown

The Spamhaus Projectspamhaus@infosec.exchange
2025-06-03

Weโ€™re now seeing a twist on the recent toll road phishing scam. Miscreants have evolved their tactics, impersonating the official government website for Department of Motor Vehicles (DMV) - no longer just the toll systems.

Instead of toll providers, these phishing sites are now disguising as trusted government portals to steal credentials and payments.

These phishing campaigns have also been observed in other regions, including the Electronic Toll Collection (ETC) system in Japan.

๐Ÿ” Has anyone else spotted variations of these campaigns in the wild?

#Phishing #CyberSecurity #ThreatIntel

Phishing campaign - DMV portalPhishing campaign - DMV portalPhishing campaign - DMV portal
The Spamhaus Projectspamhaus@infosec.exchange
2025-06-02

This month Spamhaus' Exploits Blocklist reached 5 million IPs listed for use in third-party exploits! ๐ŸŽ‰ For optimum filtering, apply at:

โžก๏ธ Initial connection โ€“ against the connecting IP
โžก๏ธ Once email data accepted โ€“ check IPs in received chain mail headers and IPs hosting resources in the body (e.g. URLs)

Learn more about this data set:
spamhaus.org/blocklists/exploi

#5million #Exploits #Blocklist

The Spamhaus Projectspamhaus@infosec.exchange
2025-05-30

โ—SCAM ALERT | We've identified a scam campaign running on Facebook as sponsored content, utilizing fake links. Here's how it works:

1๏ธโƒฃ The ad features a well-known Italian TV presenter, Paolo Bonolis, and appears to link to a legitimate article on Corriere.it (a trusted news outlet). But clicking it redirects users to a fake article hosted on rapapyte[.]xyz.

2๏ธโƒฃ From there, if you click the link it redirects again to another rapapyte[.]xyz page.

3๏ธโƒฃ After filling in a form, users briefly see a page saying โ€œwait to be contacted by phone by one of our representativesโ€ (we couldnโ€™t grab a screenshot, as it flashed by too fast) before being redirected to fxolympia[.]org.

4๏ธโƒฃ The site doesnโ€™t ask for money upfront, instead it asks you to upload personal documents, we suspect for phishing and identity theft.

We suspect miscreants are hijacking abandoned, unused or poorly protected pages instead of creating dedicated campaigns to run this scam.

โš ๏ธ Meta, this scam is exploiting your Facebook ad platform, and deceiving users - we urge you to:

โžก๏ธ Prevent the use of fake URLs in sponsored content.

โžก๏ธ Verify the domain reputation and age used in sponsored content โ€” especially for new or suspicious domains.

Protect your users, and stop this scam now.

The Spamhaus Projectspamhaus@infosec.exchange
2025-05-29

๐Ÿ“ข Mail relays | Are you forwarding mail without checks, validation, or spam filtering? You could be creating a real mess. ๐Ÿ˜ตโ€๐Ÿ’ซ

Typos, spamtraps, and forged senders can quickly snowball into blocklistings and delivery failures.

In part two of our short series on mail relays, we jump into the chaos careless forwarding can cause, and what you can do to avoid it:

๐Ÿ‘‰ spamhaus.org/resource-hub/deli

#EmailSecurity #Deliverability #EmailFiltering

Mail relays | Problems with forwarded mail?
The Spamhaus Projectspamhaus@infosec.exchange
2025-05-27

OPERATION ENDGAME 2.0 UPDATE | Following on from last week's announcement ๐Ÿ“ข we are now sending notification emails ๐Ÿ“ฉ to ISPs and hosting companies associated with the breached email accounts.

Here's what to do if you receive one:

๐Ÿ‘‰ Go to this remediation webpage: spamhaus.org/endgame-2
๐Ÿ‘‰ Enter the access code included in the email.
๐Ÿ‘‰ Download the list of breached email accounts.
๐Ÿ‘‰ Verify each email account, and where necessary, contact the owner and ask them to reset their password (there's a ready-made email template for you to use on the remediation webpage ๐Ÿ˜€)

Thank you to everyone who is part of this effort. ๐Ÿ™

#Trustandsafety #OperationENDGAME2 #Takedown

The Spamhaus Projectspamhaus@infosec.exchange
2025-05-23

๐Ÿ”ฅ Operation Endgame is BACK! This time targeting #BumbleBee, #Latrodectus, #DanaBot, #WarmCookie, #Qakbot and #Trickbot!

Once again this is a HUGE win, with a truly international effort! ๐Ÿ’ช

As with phase one of #OperationEndgame, Spamhaus are providing remediation support - those affected will be contacted in due course with steps to take.

For more information, read our write-up here:
๐Ÿ‘‰ spamhaus.org/resource-hub/malw

The Spamhaus Projectspamhaus@infosec.exchange
2025-05-21

.top remains firmly in the #2 spot for gTLDs most associated with phishing based on the number of detections weโ€™re seeing ๐Ÿ“ˆ.

Missed our latest blog post on whatโ€™s going on with .๐Ÿ”? And more importantly, what can be done to stop the ongoing proliferation in phishing abuse? โœ‹

Read the Domain Reputation Spotlight here โคต๏ธ
spamhaus.org/resource-hub/serv

#DomainReport #DomainAbuse #DotTop #Phishing

Top 10 gTLDs associated with phishing activities by number of detections

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst