You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Anonymizer | Sites that allow users to surf the Internet anonymously. |
28
-
| Brand Embedding | Sites that imitate a verified brand, for example `facobook.com`. |
29
-
| Command and Control & Botnet | Sites that are queried by compromised devices to exfiltrate information or potentially infect other devices in a network. |
30
-
| Cryptomining | Sites that mine cryptocurrency by taking over the user's computing resources. |
31
-
| DGA Domains | Domains detected as generated by algorithms seen in malware. |
32
-
| DNS Tunneling | Domains with detected DNS tunneling activity. |
33
-
| Malware | Sites hosting malicious content and other compromised websites. |
34
-
| Phishing | Domains that are known for stealing personal information. |
35
-
| Private IP Address | Domains that resolve to private IP Addresses. |
36
-
| Spam | Sites that are known for targeting users with unwanted sweepstakes, surveys, and advertisements. |
37
-
| Spyware | Sites that are known to distribute or contain code that displays unwanted advertisements or that gathers user information without the user's knowledge. |
| Anonymizer | Sites that allow users to surf the Internet anonymously. |
28
+
| Brand Embedding | Sites that imitate a verified brand, for example `facobook.com`. |
29
+
| Command and Control & Botnet | Sites that are queried by compromised devices to exfiltrate information or potentially infect other devices in a network. |
30
+
| Compromised Domain | Sites where a legitimate domain has been compromised or taken over and had malicious content planted or injected. |
31
+
| Cryptomining | Sites that mine cryptocurrency by taking over the user's computing resources. |
32
+
| DGA Domains | Domains detected as generated by algorithms seen in malware. |
33
+
| DNS Tunneling | Domains with detected DNS tunneling activity. |
34
+
| Malware | Sites hosting malicious content and other compromised websites. |
35
+
| Phishing | Domains that are known for stealing personal information. |
36
+
| Potentially Unwanted Software | Domains that distribute software that may come bundled with other less legitimate software or functionality, like toolbars, adware, and grayware. |
37
+
| Private IP Address | Domains that resolve to private IP Addresses. |
38
+
| Spam | Sites that are known for targeting users with unwanted sweepstakes, surveys, and advertisements. |
39
+
| Spyware | Sites that are known to distribute or contain code that displays unwanted advertisements or that gathers user information without the user's knowledge. |
@@ -55,7 +58,7 @@ Subdomains that have not been assigned a category will inherit the category of t
55
58
| Miscellaneous | Sites that are not included in the listed security and content categories. |
56
59
| Questionable Content | Sites hosting content that are related to hacking, piracy, profanity and other questionable activities. |
57
60
| Real Estate | Sites related to real estate. |
58
-
| Religion | Sites hosting content about religion, alternative religion, religious teachings, religious groups and spirituality.|
61
+
| Religion | Sites hosting content about religion, alternative religion, religious teachings, religious groups, and spirituality. |
59
62
| Security Risks | Sites that are [new or misconfigured](#security-risk-subcategories). We recommend that you allow or isolate this content category to avoid accidentally blocking trusted domains. |
60
63
| Shopping & Auctions | Sites that are hosting content related to ecommerce, coupons, shopping, auctions and marketplaces. |
61
64
| Social & Family | Sites related to society and lifestyle. |
@@ -67,6 +70,7 @@ Subdomains that have not been assigned a category will inherit the category of t
0 commit comments