{"id":870,"date":"2024-02-01T15:21:40","date_gmt":"2024-02-01T20:21:40","guid":{"rendered":"https:\/\/domainsure.com\/?page_id=870"},"modified":"2024-02-23T11:37:12","modified_gmt":"2024-02-23T16:37:12","slug":"rpz-threat-feeds","status":"publish","type":"page","link":"https:\/\/domainsure.com\/rpz-threat-feeds\/","title":{"rendered":"Domainsure Response Policy Zones (RPZs)"},"content":{"rendered":"

In the course of protecting our client portfolios, we come across hostile domain names that pose a risk to the community at large.<\/p>\n

Domainsure makes these feeds available to other security vendors, DNS resolvers, and service providers as a way to collaborate and share data about harmful and hostile domain names.<\/p>\n

The following threat feeds are available:
\n<\/strong>(as of Feb 1, 2024)<\/p>\n

Domainsure Crypto Defender RPZ<\/h2>\n

Live phishes, clones, malware sites targeting known crypto and Bitcoin exchanges, wallets, DeFi platforms, token projects, DAOs and blockchains.<\/p>\n

Request Access<\/a><\/div>\n

 <\/p>\n

Domainsure Verified Phishing RPZ<\/h2>\n

Live phishing attacks on external entities detected through our network of honeypots and sensors.<\/p>\n

Request Access<\/a><\/div>\n

 <\/p>\n

Domainsure Public Redirects List (DS PURLs RPZ)<\/h2>\n

Here we have collated over 1,200 known public URL redirect and shortner services. These are not malware and should not be summarily blocked.<\/em><\/p>\n

But they\u00a0are <\/em>routinely abused, and we offer the ability to inject “pattern interrupts” into the redirect chain to warn customer service agents, employees and end-users that the link they are following, while purporting to be a conventionally used service they may be familiar with, may in reality be a fake link obfuscated by a public redirect service.<\/p>\n

Request Access<\/a><\/div>\n

 <\/p>\n