Level 3 Communications reports that America is home to more command servers and botnet control, followed by Ukraine, and Russia in second and third place.
The administration servers and control, are used to manage botnets, and usually manage to operate for an average of about 30 days before being stopped by providers, or local police authorities.
The Level 3 Communications research reports that US servers are used as botnets administration and control servers as they provide reliable network infrastructures.
Let's say that all of these servers are not legal but have been tampered with and used by botnets without their owners knowing it.
"On average, 20 percent of botnets command and control servers are located in North America, while the same percentage come from Ukraine and Russia combined," the study said.PDF].
The United Kingdom is sixth on the list, while the Australia, is not included at all in the global report that tracked 1000 command and control servers in the first quarter of 2015.
It is noteworthy that 600 of the botnets monitored by Level 3 used corporate networks.
"It seems uncontrollable that management and control servers have the potential to disrupt business and destroy vital assets and information."
Level 3 describes in its report some of the latest botnet threats such as bot SSHPsychos that accounted for 35% of total SSH traffic.
This bot has stopped working at Level 3 together with Cisco Talos, which has stopped automated SSH brute-force attacks against Linux servers.