As a leading provider of fraud detection and prevention solutions, is dedicated to equipping our customers with actionable insights to fortify their cybersecurity defenses. In this blog post, we delve into two pivotal components of our threat assessment framework: precise threat classifications and comprehensive risk levels. By grasping these aspects, our customers can make informed decisions to fortify their cybersecurity posture and effectively mitigate potential risks.

Threat Classifications: meticulously categorizes threats based on the activities associated with specific IP addresses. These classifications offer invaluable insights into the nature of potential threats, empowering proactive threat mitigation strategies. Here are the exact threat classifications available in our system:

anonymous_tracker: Denotes IP addresses linked to anonymous activities, such as anonymization networks or services. These addresses harbor potential risks due to their anonymity, making them potential sources of malicious activities.

botnet_tracker: Indicates IP addresses integrated into botnets, which are networks of compromised computers controlled by malevolent actors. These IP addresses often partake in coordinated attacks, malware dissemination, or other malicious operations.

honeypot_tracker: Identifies IP addresses detected by honeypots deployed by Honeypots are decoy systems engineered to allure and scrutinize malicious activities, furnishing invaluable insights into emerging threats.

abuse_tracker: Signifies IP addresses implicated in abusive behavior, such as spamming, phishing, or other forms of online misconduct. These addresses pose security risks and may necessitate close monitoring or blocking to thwart further harm.

spam_tracker: Highlights IP addresses associated with spamming activities. These addresses might be leveraged to dispatch unsolicited emails or engage in other spam-related endeavors, posing a threat to email security and reputation.

IP addresses not aligning with the above categories or those with undetermined classifications are labeled as unknown, indicating an absence of specific threat classification.

Risk Levels:

In addition to precise threat classifications, assigns risk levels to IP addresses, indicating the severity of potential threats they pose. Risk levels span from 1 to 5, each representing varying degrees of risk:

Level 1 (Low Risk): IP addresses bearing a risk level of 1 pose minimal or negligible immediate threats. These addresses typically maintain a clean reputation and are unlikely to be involved in malicious activities.

Level 2: Denotes IP addresses with a risk level of 2, which may exhibit some indicators of suspicious behavior but are not deemed highly perilous. Organizations may need to monitor these addresses for any anomalous activities.

Level 3: IP addresses categorized as level 3 pose a moderate risk and may demonstrate suspicious or potentially harmful behaviors. Organizations should exercise caution when handling these addresses and implement suitable security measures.

Level 4: Indicates IP addresses posing a significant risk, with a risk level of 4. These addresses are likely involved in malicious activities, warranting careful consideration, and potential restrictions to mitigate looming threats.

Level 5 (High Risk): Represents IP addresses carrying the highest level of risk, with a risk level of 5. These addresses are deemed extremely perilous, with strong indications of malicious activities. Organizations should promptly block or closely monitor these addresses to forestall security breaches.

At, we are steadfast in delivering comprehensive threat intelligence to enable our customers to fortify their cybersecurity defenses effectively. By grasping the intricacies of threat classifications and risk levels, our customers can make well-informed decisions to safeguard their systems and data from potential threats. With our robust threat assessment framework, customers can proactively detect, prevent, and respond to emerging threats, ensuring a resilient and secure cybersecurity posture.