NEW | Hunt across all abuse.ch platforms with one simple query - discover if an IPv4 address, domain, URL or file hash has been identified on any platform from a centralized search tool. Test it out here hunting.abuse.ch - and happy hunting 🔍

Statistics

ThreatFox produces detailed statistics on indicators of compromise shared - find the available statistics below.

You can also access Spamhaus's Malware Digest report, based on ThreatFox data:

The statistics below consider indicators of compromise (IOCs) submitted to ThreatFox within the past 14 days.

Number of IOCs shared


The chart below documents the number of indicators of compromise (IOCs) shared on ThreatFox per day over a period of 30 days.

Top Contributors


Threatfox is "just" a platform for sharing IOCs. It would be worthless without the help of volunteers who contribute their IOCs to the project. The table below shows the top contributors by credits earned for the past 30 days.

RankReporterLast activitySubmissions
1 abuse_ch2025-04-25 06:00:5615'719
2 TheRavenFile2025-04-25 05:23:452'463
3 Gi7w0rm2025-04-21 10:37:041'512
4 juroots2025-04-24 05:45:391'209
5 DonPasci2025-04-25 04:01:571'105
6 dyingbreeds_2025-04-25 05:24:11405
7 RacWatchin88722025-04-23 11:58:17236
8 threatcat_ch2025-04-25 07:02:15150
9 UNP4CK2025-04-25 06:14:46130
10 ttakvam2025-04-25 05:29:0599

Top Malware Families

Top Tags

IOCs by type


IOCs on ThreatFox are categorized so called IOC types. The following table shows the number of IOCs observed on ThreatFox per IOC type (past 14 days).

IOCsIOC TypeIOC description
17'690domainDomain that is used for botnet Command&control (C&C)
2'749ip:portip:port combination that is used for botnet Command&control (C&C)
1'351urlURL that is used for botnet Command&control (C&C)
1'116sha256_hashSHA256 hash of a malware sample (payload)
301domainDomain name that delivers a malware payload
250urlURL that delivers a malware payload
172md5_hashMD5 hash of a malware sample (payload)
6ip:portip:port combination that delivery a malware payload
3domainDomain used for credit card skimming (usually related to Magecart attacks)

The statistics below consider indicators of compromise (IOCs) submitted to ThreatFox since it's launch in March 2021.

Number of IOCs shared


The chart below documents the number of indicators of compromise (IOCs) shared on ThreatFox per day over a period of 12 months.

Top Contributors


Threatfox is "just" a platform for sharing IOCs. It would be worthless without the help of volunteers who contribute their IOCs to the project. The table below shows the top contributors by credits earned.

RankReporterLast activitySubmissions
1 Cryptolaemus12025-04-24679'888
2 abuse_ch2025-04-25154'473
3 drb_ra2025-04-1688'255
4 Gi7w0rm2025-04-2151'781
5 TheRavenFile2025-04-2535'827
6 DonPasci2025-04-2528'323
7 lazyactivist1922025-02-0729'739
8 Grim2024-11-1329'552
9 Virus_Deck2022-09-3029'150
10 thehappydinoa2024-12-0223'615

Top Malware Families

Top Tags

IOCs by type


IOCs on ThreatFox are categorized so called IOC types. The following table shows the number of IOCs observed on ThreatFox per IOC type (overall).

IOCsIOC TypeIOC description
757'657sha256_hashSHA256 hash of a malware sample (payload)
188'321ip:portip:port combination that is used for botnet Command&control (C&C)
183'465urlURL that delivers a malware payload
114'364domainDomain that is used for botnet Command&control (C&C)
96'003urlURL that is used for botnet Command&control (C&C)
31'419domainDomain name that delivers a malware payload
13'859md5_hashMD5 hash of a malware sample (payload)
10'323sha1_hashSHA1 hash of a malware sample (payload)
3'018ip:portip:port combination that delivery a malware payload
468domainDomain used for credit card skimming (usually related to Magecart attacks)
21sha3_384_hashSHA3-384 hash of a malware sample (payload)
1envelope_fromSender email address (envelope from) that is used for payload delivery