Restricted access Services
A tool for network managers to visualize activity on their network while
integrating Team Cymru's unique data regarding malicious activity. Includes
historic analysis and collaborative tools, and is available as an online
secure portal. For more details, check out
the TC Console page.
A set of plug-ins based on an open source framework, designed to help
network managers to visually identify and understand malicious activity down
to the protocol level, in near real-time. The tool also provides alerts of
DDoS attacks, compromised machines and C&Cs as well as trending
information. For more information, check out
the Flow Sonar page.
Team Cymru provides daily lists of compromised or abused devices for the
ASNs and/or netblocks within a Regional and/or National CSIRT's
jurisdiction. The intent is to provide information directly into the hands
of people who can use that insight. For more details, check out the CAP page.
The Botnet Analysis and Tactical Tool for Law Enforcement (BATTLE) displays
IRC and HTTP botnet data on an interactive world map in near real
time. It is intended to provide enough information to enable law enforcement
to identify botnets and attacks that are of interest to them. For more information
and details of how Law Enforcement Officers can request access to to the portal,
check out the BATTLE page.
The BIN (Bank Identification Number) Feed provides vetted global
financial institutions with access to a near-real-time list of potentially
compromised bank and credit card accounts that appear to be their customers
via a secure web portal. This service is provided to verified financial
institutions at no cost to them. For more information, see the BIN Feed details page
Dragon News Bytes is a private and restricted mailing list that distributes
Information Security news articles. These articles may come from newspapers, magazines,
and various online resources. For more information,
check out the Dragon News Bytes information page.