Ransomware Tracker helps you track, mitigate and protect yourself from malware

Ransomware Tracker is an online resource that keeps true to its name. It majorly tracks, mitigates and blocks all the identifiable sources of Ransomware that might be interfering with your work online.


Ransomware Tracker serves the following purposes:

  • Providing an overview of internet infrastructure used by cybercriminals for their Ransomware operations
  • Providing hosting- and internet service providers (ISPs), law enforcement agencies (LEA) and national CERTs/CSIRTs intel on such infrastructure within their constituency
  • Offering blocklists for internet users, enterprises and antivirus vendors and security solution providers
  • Giving internet users and enterprises a brief overview on Ransomware mitigation strategies.

Track Ransomware

Ransomware Tracker regularly tracks and shortlists all the IP addresses and domain names that are linked to ransomware attacks in the past, including all Botnet C&C servers, distribution sites and payment sites. By using the data sourced with Ransomware Tracker, ISPs, hosting providers and other concerned legal authorities or internet agencies can easily keep a track on the various sources of attacks, and block them if needed.

These are the various ransomware sources that Ransomware Tracker currently tracks:

  • CryptoWall
  • TeslaCrypt
  • TorrentLocker
  • PadCrypt
  • Locky
  • CTB-Locker

Mitigate Ransomware attacks

Along with tracking and regularly updating the sources, Ransomware Tracker also helps mitigate awareness of the attacks on both users and enterprises, helping them avoid ransomware threats. The golden rule is performing backup frequently and never paying any ransoms. Paying ransoms will create a never-ending loop wherein more and more ransomware hackers can flourish and possible cause unprecedented damage to your data.

Tips for Users

  • Make sure you have a trusted antivirus on your system. Update it regularly for increased protection.
  • Before clicking on a link, or email attachment, just think about what it is. Check the source and click when you are 100% sure it is safe.
  • Updating your major software files – like Adobe Reader and Photoshop – is key to defend from vulnerabilities in the system.

Tips for Enterprises

  • Block all malicious email attachment with file extensions including .jar, .bat, .exe and more.
  • Use Enhanced Mitigation Experience Toolkit (EMET), which is a tool that helps you safeguard the unpatched files on your Windows system from any kinds of vulnerabilities before it’s too late.
  • Use Windows AppLocker that is a software where you can define which applications should be allowed to run on your machines (Application whitelisting).

Read: How to protect against & prevent Ransomware.

Block Ransomware

Ransomware Tracker isn’t just about listing down threat sources or informing users about the threats; the tool also provides you effective programs to block these activities. This blocking software allows enterprises to block malicious traffic towards their servers by blocking them directly on the Firewall, web proxy or in the local DNS server.

Read: List of Ransomware Decryptor Tools.

The chart below shows the number of malware samples per Ransomware family processed by Ransomware Tracker in the past 90 days.

ransomware tracker

Go browse the website. I am sure you will find many things of interest there.

Posted by on , in Category Security with Tags
Anand Khanse is the Admin of TheWindowsClub.com, a 10-year Microsoft MVP Awardee in Windows (2006-16) & a Windows Insider MVP. Please read the entire post & the comments first, create a System Restore Point before making any changes to your system & be careful about any 3rd-party offers while installing freeware.


  1. Dan

    Thanks; a timely reminder and resource as many prepare for their winter holidays..prime time for all sorts of thieves to steal cash with deceptive means…ransomware likely will be preying big time.

  2. John_Sydney

    As a Win7 Enterprise user, is AppLocker of any real use in preventing a ransomware attack? I guess I’m asking what sort of executables are usually involved, or whether we can identify a folder on my system that’s typically used by an attack file so I can lock that.

Leave a Reply

Your email address will not be published. Required fields are marked *

6 + 5 =