Analyzing Malicious Websites with RIPE Atlas

September 24, 2025

Analyzing Malicious Websites with RIPE Atlas

By Guillermo Pereyra, Security Analyst

Introduction: Why Analyze Malicious Websites?

To take down a malicious website (one that distributes malware or impersonates another), an analysis of the website must first be conducted to properly inform the competent authority for its removal.

This article explores the use of RIPE Atlas, which uses globally distributed probes to assess the persistence and geographic reach of a malicious site.

Key Information for Investigating a Malicious Site

An investigation into a malicious site should collect, at a minimum, the following information:

(Free access, no subscription required)

  • Relevant dates: discovery, creation of the domain, takedown, etc.
  • Domain name(s)
  • URL
  • IP addresses
  • Source code
  • Screenshots or videos of the behavior
  • Contact details: domain registrant, holder of the IP address, CSIRTs/CERTs, etc.

Sometimes, phishing or malicious websites adopt mechanisms that complicate their takedown, such as the use of CDNs or hosting providers with identity protection for the site owner or geo-blocking, where the site is only accessible from specific geographic locations.

When reporting a malicious site, it’s important to include the geographic location from which the malicious content is accessible. This allows those receiving the report to replicate the malicious behavior that is being reported.

There are different methods for determining which locations can access the malicious content. One option would be to use VPN services or proxies, which provide an IP address corresponding to the country where we want to verify the malicious behavior. In this article, however, we’ll explain how to achieve this using RIPE Atlas.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments