Criminal IP Description

Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc.
Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.

Pricing

Free Version:
Yes
Free Trial:
Yes

Integrations

API:
Yes, Criminal IP has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
AI Spera
Year Founded:
2017
Headquarters:
South Korea
Website:
aispera.com/en
Update This Listing

Media

Criminal IP Main Page

Criminal IP Main Page

Recommended Products
CDPs: Build, Buy.. or Both? Icon
CDPs: Build, Buy.. or Both?

Collect, Unify & Connect Data Real-Time, Real Fast

Explore how a customer data platform can help to enhance your engineering team's efficiency and supercharge application performance.

Product Details

Platforms
SaaS
Type of Training
Documentation
Videos
Customer Support
Online

Criminal IP Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting