As a leading provider of fraud detection and prevention solutions, FraudGuard.io is dedicated to equipping our customers with actionable insights to fortify their cybersecurity defenses. In this blog post, we delve into two pivotal components of our threat assessment framework: precise threat classifications and comprehensive risk levels. By grasping these aspects, our customers can make informed decisions to fortify their cybersecurity posture and effectively mitigate potential risks.


Threat Classifications:

FraudGuard.io meticulously categorizes threats based on the activities associated with specific IP addresses. These classifications offer invaluable insights into the nature of potential threats, empowering proactive threat mitigation strategies. Here are the exact threat classifications available in our system:

anonymous_tracker: Denotes IP addresses associated with anonymization services, such as Tor networks, public proxies, and similar tools designed to obscure user identities. While not always malicious, these addresses are often used to bypass security measures or conceal illicit activities, making them a potential risk factor. Businesses can use this classification to monitor or restrict access based on their security requirements.

botnet_tracker: Identifies IP addresses that are part of botnets—networks of compromised devices under the control of malicious actors. These addresses are frequently involved in coordinated attacks, malware propagation, and other harmful activities. Monitoring this classification helps businesses defend against distributed threats and preempt potential attacks. Traffic from these IPs represents a high risk and should be blocked immediately to prevent potential exploitation and ensure the safety of your systems.

honeypot_tracker: Flags IP addresses detected interacting with FraudGuard.io’s honeypots, which are decoy systems designed to attract and analyze malicious activities. This classification provides critical insights into emerging threats, enabling businesses to strengthen their defenses and stay ahead of evolving attack methods. Traffic from these IPs represents a high risk and should be blocked immediately to prevent potential exploitation and ensure the safety of your systems.

abuse_tracker: Highlights IP addresses engaged in abusive behaviors, such as phishing, credential stuffing, brute force attacks, and other forms of malicious activity aimed at exploiting systems and user accounts. These addresses pose significant security risks and necessitate close monitoring or blocking to safeguard digital assets and maintain operational integrity.

spam_tracker: Represents IP addresses actively involved in spamming operations, such as distributing unsolicited emails or engaging in mass messaging campaigns. These activities can compromise email security, damage sender reputations, and disrupt normal operations. This classification helps businesses identify and mitigate spam-related risks effectively. Businesses can use this classification to monitor or restrict access based on their security requirements.

vpn_tracker: Represents IP addresses associated with VPN servers, used primarily for anonymizing user traffic. While these addresses are not inherently malicious, their association with anonymization services can mask user identities and obscure intent. Businesses can leverage this classification to implement tailored security measures, such as additional verification or restricted access, to mitigate potential risks without disrupting legitimate usage.

IP addresses not aligning with the above categories or those with undetermined classifications are labeled as unknown, indicating an absence of specific threat classification.


Risk Levels:

In addition to precise threat classifications, FraudGuard.io assigns risk levels to IP addresses, indicating the severity of potential threats they pose. Risk levels span from 1 to 5, each representing varying degrees of risk:

Level 1 (Minimal Risk): IP addresses with a risk level of 1 pose no immediate or identifiable threat and are not tracked in (ACE) Attack Correlation Engine database. These addresses maintain a clean reputation with no record of malicious or suspicious activity. They are considered safe for normal operations and require no additional scrutiny.

Level 2 (Low Risk): Risk level 2 indicates IP addresses that show minor or isolated indicators of potentially suspicious behavior, such as unusual traffic patterns or association with anonymization networks like VPNs or proxies. While these addresses are not inherently malicious, they warrant monitoring as their behavior evolves. Over time, these IPs may either clear their reputation or escalate in risk based on subsequent activity. To mitigate potential risks, organizations should enforce stronger verification measures, such as two-factor authentication (2FA) or user identity confirmation, to safeguard systems from potential threats.

Level 3 (Moderate Risk): IP addresses with a risk level of 3 present moderate risks and often exhibit behavior consistent with potential threats, such as failed login attempts, credential stuffing, or probing activity. These addresses typically have a history of questionable actions and require additional scrutiny. As more data is analyzed within the ACE database, these risk levels may adjust downward if harmful activity ceases or escalate if further evidence of malicious behavior emerges. At this level, organizations should enforce stronger verification measures, such as two-factor authentication (2FA) or user identity confirmation, to safeguard systems from potential threats.

Level 4 (High Risk): Risk level 4 is assigned to IP addresses with significant evidence of malicious activity, including active participation in phishing campaigns, brute force attacks, or botnet operations. These addresses are considered dangerous and pose an immediate threat to security. Organizations should strongly consider restricting or blocking traffic from these IPs. Over time, these addresses may de-escalate if they cease malicious behavior or retain their high-risk status if they persist in threatening activities.

Level 5 (Severe Risk): IP addresses categorized as risk level 5 are associated with the most dangerous and persistent threats, including command-and-control servers, distributed denial-of-service (DDoS) attacks, and malware dissemination. These addresses exhibit strong and repeated indications of malicious intent. Immediate blocking is strongly recommended to avoid critical security incidents. However, ACE continuously reevaluates these IPs over time, allowing their risk level to decline if no further malicious activity is detected.

At FraudGuard.io, we are steadfast in delivering comprehensive threat intelligence to enable our customers to fortify their cybersecurity defenses effectively. By grasping the intricacies of threat classifications and risk levels, our customers can make well-informed decisions to safeguard their systems and data from potential threats. With our robust threat assessment framework, customers can proactively detect, prevent, and respond to emerging threats, ensuring a resilient and secure cybersecurity posture.


How Risk Levels Evolve Over Time

The dynamic nature of the ACE database means that risk levels are not static; they are reassessed as new data becomes available. This ensures organizations always have the most accurate and up-to-date information to make informed decisions about how to handle IP traffic.


How ACE Correlates Multiple Attack Vectors

FraudGuard.io’s Attack Correlation Engine (ACE) excels at analyzing and integrating data from diverse threat vectors to provide a comprehensive risk assessment. When an IP address exhibits behavior across multiple classifications, such as being flagged by the abuse_tracker for phishing or credential stuffing while simultaneously identified as an open public proxy by the anonymous_tracker, its risk level is elevated—often to a high/severe risk. This is because multiple vectors indicate a coordinated or persistent threat, significantly increasing the likelihood of malicious intent.

ACE also accounts for repeat offenders. If an IP address demonstrates suspicious activity over time, even within a single vector, its accumulated history contributes to a higher risk score. Additionally, IPs interacting with multiple honeypots deployed across our network are flagged as particularly dangerous. These actors actively probe multiple systems, signaling intent to exploit vulnerabilities at scale, which necessitates swift action to mitigate potential breaches.

By dynamically correlating such patterns, ACE ensures that high-risk IPs are accurately identified, enabling businesses to act decisively to protect their assets. This multi-dimensional approach reduces false positives while offering unparalleled insight into evolving threats.


Ready to learn more? Reach out to us or explore our documentation. Ready to level up? Check out our plans and pricing today!*