Domains that were once live on the Internet and then abandoned are often purchased and reused by criminals in order to avoid immediate detection. Real-time information about domains that are reactivated on the Internet after a period of inactivity can prepare security teams to apply rules to firewalls and mail servers to block inbound and outbound connections to these domains until more information is available about them.