IsThisAScam
হোমBlogমূল্যসম্পর্কেHistoryAPIExtension
Upgrade
BN
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
পণ্য
  • Home
  • Blog
  • Pricing
  • সম্পর্কে
  • History
  • Chrome Extension
Resources
  • Developers
  • API ডকুমেন্টেশন
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
আইনি
  • গোপনীয়তা নীতি
  • সেবার শর্তাবলী
  • product@zeplik.com

© 2026 Zeplik, Inc. সর্বস্বত্ব সংরক্ষিত।

Built for the calm, the cautious, and the careful.

Home/Glossary/Botnet
Glossary · Technical Concept

What Is a Botnet?

A network of compromised computers and devices ("bots" or "zombies") secretly controlled by an attacker, used collectively to perform malicious activities like DDoS attacks, spam campaigns, credential stuffing, and cryptocurrency mining.

Quick Definition

A network of compromised computers and devices ("bots" or "zombies") secretly controlled by an attacker, used collectively to perform malicious activities like DDoS attacks, spam campaigns, credential stuffing, and cryptocurrency mining.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Botnet explained.

A botnet is essentially a cyber army — potentially millions of compromised devices operating under the control of a single attacker or group (the "bot herder"). Each infected device doesn't know it's part of a botnet, and its owner may never notice any signs of compromise.

Botnets are the infrastructure behind many forms of cybercrime. They send the majority of the world's spam email, launch massive DDoS attacks, perform credential stuffing at scale, mine cryptocurrency, and distribute malware. The distributed nature makes them extremely hard to shut down.

The Internet of Things has dramatically expanded the botnet landscape. Smart cameras, routers, DVRs, and other connected devices often have weak default passwords and rarely receive security updates, making them ideal botnet recruits.

02How it works.

01Devices are infected with malware through phishing, exploit kits, or scanning for vulnerable devices
02The malware connects the device to a command-and-control (C2) server controlled by the attacker
03The infected device becomes a "bot" awaiting instructions, usually without the owner's knowledge
04The bot herder sends commands to all bots simultaneously to perform attacks
05The distributed nature makes botnets resilient — taking down one bot has minimal impact

03Real-world example.

The Mirai botnet in 2016 recruited over 600,000 IoT devices (mainly cameras and routers with default passwords) and launched a DDoS attack against DNS provider Dyn that took down Twitter, Netflix, Reddit, CNN, and many other major websites for hours.

04How to protect yourself.

01Change default passwords on all devices, especially routers and IoT devices
02Keep all devices updated with the latest firmware and security patches
03Use a firewall and monitor network traffic for unusual outbound connections
04Install reputable antivirus software that detects botnet malware
05If you suspect your device is part of a botnet, factory reset it and update before reconnecting
Related Terms
MalwareRansomwareCredential Stuffing
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →