Skip to content
Miroslav Stampar edited this page Mar 8, 2021 · 14 revisions

Maltrail FAQ-list

Q1: What are you, guys, all about?

  • A1: Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists.

Q2: Can I freely use Maltrail in my infrastructure?

  • A2: Certainly. You can freely use Maltrail in your infrastructure. It released under MIT-license.

Q3: How does Maltrail deal with other IDS/IPS solutions, including open-source ones?

  • A3: Deals pretty good. Maltrail does not conflict with any known IDS\IPS solutions, including open-source ones. Maltrail has its own approach to malicious network traffic detection, which can either be used as a dedicated solution and simultaneously as a combo with other IDS/IPS solutions on a target system, complementing each other.

Q4: What OS does Maltrail support?

  • A4: Maltrail is written in Python, so it should be portable to any OS. Nevertheless, Maltrail has been originally written for Linux systems, while recently ported to *BSD systems.

Q5: Can Maltrail be integrated into other solutions?

Yes. An updated list of products, which use Maltrail, can be found on Maltrail Third-party Integrations page.

Contents


Clone this wiki locally