The C2i published in these lists are extracted from the malicious binaries. These executables are the final payloads served by the Emotet malware.
You can use this information to create block-lists. All C2i published here is active at the time of publishing but some of these C2s can go offline at any time after that. All information provided here is free to use.
C2i published on this site could cause some FPs as these IPs/URIs get recycled frequently, you agree to that before using any C2i from this site.
Lists are NOT deduped.