Analyzing Malicious Websites with RIPE Atlas

11/06/2025

Analyzing Malicious Websites with RIPE Atlas

By Guillermo Pereyra, Security Analyst

Introduction: Why Analyze Malicious Websites?

To take down a malicious website (one that distributes malware or impersonates another), an analysis of the website must first be conducted to properly inform the competent authority for its removal.

This article explores the use of RIPE Atlas, which uses globally distributed probes to assess the persistence and geographic reach of a malicious site.

Key Information for Investigating a Malicious Site

An investigation into a malicious site should collect, at a minimum, the following information:

  • Relevant dates: discovery, creation of the domain, takedown, etc.
  • Domain name(s)
  • URL
  • IP addresses
  • Source code
  • Screenshots or videos of the behavior
  • Contact details: domain registrant, holder of the IP address, CSIRTs/CERTs, etc.

Sometimes, phishing or malicious websites adopt mechanisms that complicate their takedown, such as the use of CDNs or hosting providers with identity protection for the site owner or geo-blocking, where the site is only accessible from specific geographic locations.

When reporting a malicious site, it’s important to include the geographic location from which the malicious content is accessible. This allows those receiving the report to replicate the malicious behavior that is being reported.

There are different methods for determining which locations can access the malicious content. One option would be to use VPN services or proxies, which provide an IP address corresponding to the country where we want to verify the malicious behavior. In this article, however, we’ll explain how to achieve this using RIPE Atlas.

(Free access, no subscription required)

What Is Ripe Atlas and How It Can Help

RIPE Atlas is a network of globally distributed probes that continuously measure Internet connectivity and performance, providing technical information about its operation. This sensor network allows performing user-defined measurements toward specific destinations. Different kinds of measurements can be performed:

  • PING
  • Traceroute
  • DNS
  • TLS
  • HTTP (only for anchors)
  • NTP

Below we’ll discuss an interesting feature of this project: geographic access of the different probes to the desired target. In other words, by knowing the location from which a measurement was taken, we can determine whether the site is accessible from that part of the world. This feature allows us to determine if a phishing attack is geographically targeted.

Using RIPE Atlas to Analyze Malicious Sites

Malicious websites can be analyzed using four different methods: PING, Traceroute, DNS, and TLS. Each method has advantages and disadvantages.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments