Our company was founded in order to provide "best in class" threat intelligence data for use in anti-spam blocklists and beyond.
We provide "out of the box" data ready to plug in to your systems, or extended data for those users that need deeper insights or context.
Please contact sales@ThreatInSites.com for further information and pricing
IP address ranges used for sending unsolicited bulk emails, or facilitate abuse through selling bulk email lists, providing spam tracking services, hiring spammers to advertise, enabling other types of messaging abuse such as SMS or telemarketing
Commonly known as Unsolicited Commercial Email, bulk emails that are sent without the consent of the recipient
IPs associated with companies that enable spam abuse by selling bulk email lists or providing verification services to spam lists
IPs used for tracking spam, acting as a "broker" between the spammer and their customers
IPs associated with companies who hire spammers to send advertisements
IPs used to facilitate abuse of SMS or other messaging systems, including telemarketing and robocalls
IP addresses used for general abuse such as carding, hacking, cyber scams, crypto scams, and other types of scams targeting Internet users
IP addresses suddenly sending email before establishing a sending reputation (either good or bad)
IP addresses infected with malware, and used for malicious purposes such as spam botnets, ransomware, scanning, hacking, etc
Infected machines used to send spam or for other malicious purposes
IP addresses being used to scan for vulnerabilities such as AUTH or SSH
IPs used as command and control systems for botnets
Misconfigured machines showing possible signs of malicious activity
IP addresses with a low email reputation due to dynamically assigned users
Bogons are IP addresses that are not assigned to any user and therefore should not be sending email or any other type of traffic
Mobile IPs, Cable Modem IPs, any IP ranges where the users should only send email through their ISP's mailserver
TOR or other VPNs that disguise the true origin of the user
Stop malicious actors at the route level
ASNs or Autonomous System Numbers are used to route Internet traffic, unfortunately sometimes they are owned by bad actors. Block these ASNs or anything routed by them from reaching your systems.
Not necessarily associated with any malicious activity, but used to check out information about any given IP or Domain. This provides access to some of the building blocks of our anti-abuse data.
What is the IP being used for, who owns it, where is it located?
Domain categories for various Internet activities
Copyright © 2023 Threat InSites - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.