Like fingerprints left at crime scenes, IP addresses are the key piece of information in tracking down cybercrime, such as fraudulent access, account theft, money laundering and credential stuffing. Criminal IP was designed in the concept of “DATA-DRIVEN SECURITY”, which times everything IP addresses do on the Internet, creates criminal records that integrate large amounts of open-source intelligence (OSINT) with AI and machine learning based fraud detection algorithm and network scanning technology with competitive speed.
It takes the form of an intuitive search engine through which it is possible to diagnose malicious IP addresses, domains, phishing sites and easily display the information of all types of assets accessible on the Internet, including banners, certificates, SCADA, IoT, servers and CCTV. , as well as actionable insights based on country and service specific statistics in one place.
Which can people search on Criminal IP?
1. Asset search
Directly search the service name using keywords or search the CVE number to find related IP addresses and query the content below in one page.
- sorting of incoming and outgoing IP risk scores into 5 simple categories (Safe, Low, Moderate, Dangerous, Critical)
- log all information about IP address owner, country, SSL certificate, associated domain through the digest function which returns a compendium of all associated IP addresses
- detection of suspicious VPN IPs, PI TORHosting IP, CDN, IP Scanner
- summary compiling information about running open ports, past abuse history, and vulnerabilities within
2. Domain search
This function analyzes the real-time target domain to provide comprehensive information and a unique risk score, all of which are determined by whether it is used as a phishing domain, incorporates malicious links, or contains valid certificates. People can also check for false SSL diagnosis, abuse record, hidden elements in HTML code, program traps, network redirection and suspicious cookies.
This is the one and only feature to detect malicious links that have only recently emerged and are not yet registered in the existing database. If there is a given domain or URL, a chrome is launched to perform AI-driven analysis and analysis, which allow to instantly diagnose if new URLs that hackers haven’t yet released to the world are malicious and help block spam and malicious links.
3. Search for exploits
People can probe all known vulnerabilities (CVEs) in the world and get the details of the actual exploit code for each service and specific attack patterns by simply searching the CVE information. In addition, people can search by platform to see associated list of exploits at once, and use various filters (e.g. authors, types, years) to filter information from their interest with the latest trends in disclosure.
4. Image search
After running an image search with various sample search terms such as RDP, phishing, webcam, RTSP, people can visualize assets left wide open to cyber threats as images. This feature parallels the way people widely used search for images on Google, but it differs in that only images hinting at cyber threats are retrieved for the reference.
Leverage unparalleled quality and quantity of data for anticipation of operational risks
Criminal IP prides itself on the unprecedented amount of data associated with a single IP address and the freshness of data amounting to 4.2 billion IP addresses and domains that are collected and updated in real time.
It is specially designed to help with various thematic research or risk management using this massive database. To illustrate a few examples, it would be possible to fetch a full database on “finding US-wide IP addresses with RDP vulnerabilities” or “finding IP addresses with specifically named CVEs “.
About AI Spera: AI Spera is a growing cyber threat intelligence company. Based on artificial intelligence and machine learning technologies, it focuses on anomaly detection and data-driven security solutions. As a criminal IP provider, it strengthens various areas where criminal IP defends against ever-evolving cyber threats, covering education and research, corporate security teams, white hackers, agencies national and cybercrime investigative organizations..
SOURCEAI Spera Inc.