Threat InSites

Threat InSitesThreat InSitesThreat InSitesThreat InSites
  • Home
  • Products
  • Contact

Threat InSites

Threat InSitesThreat InSitesThreat InSites
  • Home
  • Products
  • Contact

Threat InSites

Our company was founded in order to provide "best in class" threat intelligence data for use in anti-spam blocklists and beyond.  


We provide "out of the box" data ready to plug in to your systems, or extended data for those users that need deeper insights or context.


Please contact sales@ThreatInSites.com for further information and pricing

Find out more

IP Address Data for Anti-Spam Protection

Threat InSites - Spam and Messaging Abuse IPs

IP address ranges used for sending unsolicited bulk emails, or facilitate abuse through selling bulk email lists, providing spam tracking services, hiring spammers to advertise, enabling other types of messaging abuse such as SMS or telemarketing

Spam Sending IPs

Commonly known as Unsolicited Commercial Email, bulk emails that are sent without the consent of the recipient

Email List Sellers / Verifiers

IPs associated with companies that enable spam abuse by selling bulk email lists or providing verification services to spam lists

Spam Tracking Services

IPs used for tracking spam, acting as a "broker" between the spammer and their customers

Spam Advertisers

IPs associated with companies who hire spammers to send advertisements

Messaging Abuse

IPs used to facilitate abuse of SMS or other messaging systems, including telemarketing and robocalls

General Abuse IPs

IP addresses used for general abuse such as carding, hacking, cyber scams, crypto scams, and other types of scams targeting Internet users

Fresh Sending IPs

IP addresses suddenly sending email before establishing a sending reputation (either good or bad)


Threat InSites - Malware and Botnet IPs

IP addresses infected with malware, and used for malicious purposes such as spam botnets, ransomware, scanning, hacking, etc

Botnets

Infected machines used to send spam or for other malicious purposes

Vulnerability Scanners

IP addresses being used to scan for vulnerabilities such as AUTH or SSH

Command & Control

IPs used as command and control systems for botnets


Misconfigurations

Misconfigured machines showing possible signs of malicious activity




Threat InSites - Dynamic IP Space

IP addresses with a low email reputation due to dynamically assigned users

Bogons

Bogons are IP addresses that are not assigned to any user and therefore should not be sending email or any other type of traffic

Dynamic User IPs

Mobile IPs, Cable Modem IPs, any IP ranges where the users should only send email through their ISP's mailserver

Proxies

TOR or other VPNs that disguise the true origin of the user


Threat InSites - Autonomous System Number Data

Stop malicious actors at the route level

ASNs

ASNs or Autonomous System Numbers are used to route Internet traffic, unfortunately sometimes they are owned by bad actors.  Block these ASNs or anything routed by them from reaching your systems.


Threat InSites - Categorization APIs

Not necessarily associated with any malicious activity, but used to check out information about any given IP or Domain. This provides access to some of the building blocks of our anti-abuse data.

IP Categories

What is the IP being used for, who owns it, where is it located?

Domain Categories

Domain categories for various Internet activities

Copyright © 2023 Threat InSites - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept