Booters are Websites that publicly offer Distributed Denial of Service (DDoS) attacks as a paid service. Accordingly to the Federal Bureau of Investigation (FBI), Booters usage are considered ‘crime if they are used against a Website without the owner’s permission’. Our intention to generate/share this list is to facilitade the investigation of the entire market/ecosystem. NOTE that the following list includes offline Booters (for historical purposes). For only ONLINE booters, please clone our GitHub repository and re-run the 6th and 7th steps.
If you use, for academic purposes, the Booter (Black)List OR our methodology OR our analyses script, PLEASE don’t forget to cite the publicly available Jair Santanna’s Ph.D. thesis:
@phdthesis{jjsantanna2017thesis,
title = { {DDoS-as-a-Service: Investigating Booter Websites} },
author = {Santanna, José Jair},
year = {2017}
school = {University of Twente},
address = {Enschede, The Netherlands},
type = {Ph.D. thesis},
isbn = {9789036544290},
doi = {10.3990/1.9789036544290}
}
Publications:
Our methodology to generate the Booter (Black)List is documented at:
- J.J. Santanna. DDoS-as-a-Service: Investigating Booter Websites. Chapter 2. Ph.D. Thesis. University of Twente, 2017, ISBN: 978-90-365-4429-0.
- J.J. Santanna, R. de O. Schmidt, D. Tuncer, J. de Vries, L.Z. Granville, and A. Pras. Booter List Generation: The Basis for Investigating DDoS-for-hire Websites. International Journal on Network Management (IJNM), 2017.
- J.J. Santanna, R. de O. Schmidt, D. Tuncer, J. de Vries, L.Z. Granville, and A. Pras. Booter Blacklist: Unveiling DDoS-for-hire Websites. International Conference on Network and Service Management (CNSM). 2016.
- J.J. Chromik, J.J. Santanna, and A. Pras.‘Booter websites characterization: Towards a list of threats’. Brazilian Symposium on Computer Networks and Distributed Systems (SBRC). 2015.
Examples of usage of the Booter (Black)List is documented at:
- J.J. Santanna, R. de O. Schmidt, D. Tuncer, A. Sperotto, L.Z. Granville, A. Pras. Quite Dogs Can Bite: Which Booters Should We Go After? And What Are Our Mitigation Options? IEEE Communication Magazine (ComMag) , 55 (7), pp. 50–56, 2017.
-
GitHub repository that analyses users that were monitored by using the Booter (Black)List