ZOLIM - Zoque Latin American Observatory of Malicious Infrastructure


[Go to ZOLIM]

ZOLIM (Zoque Observatory of Malicious Infrastructure) is a research initiative by ZoqueLabs that documents, analyzes, and publishes periodic snapshots of malicious network infrastructure in Latin America, with a particular focus on command-and-control (C2) systems and related threat frameworks.

ZOLIM is designed as an observational and longitudinal system. It does not monitor networks in real time, nor does it perform active scanning. Instead, it relies on structured snapshots that allow infrastructure to be compared across time.

How ZOLIM works

ZOLIM periodically:

  1. Queries third-party internet intelligence platforms (currently Censys and Shodan),
  2. Filters results by country using a curated regional scope,
  3. Matches exposed services against signature sets of known malicious tooling,
  4. Normalizes and merges results into a single timestamped snapshot,
  5. Generates technical outputs (reports and machine-readable datasets),
  6. Publishes every snapshot publicly for transparency and reuse.

All processing is reproducible, and each snapshot is treated as a self-contained artifact.

What ZOLIM is useful for

ZOLIM is intended to support:

ZOLIM focuses on infrastructure behavior, not attribution.

Outputs and transparency

Every snapshot produced by ZOLIM is published in a public repository:

👉 Public snapshots repository:
https://github.com/ZoqueLabs/olim_datasets

Each snapshot typically includes:

Software used

ZOLIM is powered by an open pipeline called zoque-infra-mapper, which handles:

👉 Software repository:
https://github.com/ZoqueLabs/zoque-infra-mapper

For implementation details, configuration, and limitations, see the README in the repository.

Things to note and be careful about

All outputs should be interpreted with caution and contextualized appropriately.

System overview

---
config:
  theme: dark
---
flowchart TB
    A[Censys] --> B[zoque-infra-mapper]
    C[Shodan] --> B
    D[Country Scope] --> B
    E[Threat Signatures] --> B

    B --> F[Merged Snapshot]
    F --> G[Technical Report]
    F --> H[CSV Dataset]
    F --> I[STIX 2.1 Export]
    F --> J[MISP Event]

    G --> K[Public Snapshots Repository]
    H --> K
    I --> K
    J --> K


[Ir a ZOLIM]