Criminal IP is a Cyber Threat Intelligence (CTI) search engine with an innovative IP-based search system and tracking technology. It offers a search experience akin to web browsing but uses IP intelligence to track internet-connected assets and their usage records.
Criminal IP performs daily scans of open ports on IP addresses worldwide to discover all devices connected to the internet and their underlying threat components, each classified by its level of danger. It uses AI-based technology to provide a comprehensive 5-level risk assessment on malicious IP addresses and domains.
The data is then indexed with various filters and tags by its meticulously structured category system, allowing for effective searches. Users can easily locate specific information, such as exposed webcams, IoT devices, Whois details, and phishing domains, thanks to Criminal IP's user-friendly filters.
Criminal IP features API integration as well, allowing security professionals to block potential intruders and monitor assets that might be inadvertently exposed on the attack surface. For example, cybersecurity experts can view abuse records of IP addresses that attempt access to IT assets and can also track whether these assets are attempting to infiltrate assets with a VPN.
Criminal IP offers a holistic view of IT assets, including malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, CCTVs, and so on. Its intuitive interface ensures seamless navigation, connecting functions and results organically to facilitate in-depth investigation of targeted IT assets.
Features
-
Asset Search: Provides risk scoring, linked asset information, abuse history, and associated vulnerability information to determine the threat of a searched IP address. Alternatively, you can search directly for the service name with a keyword, or search for CVE number to find the associated IP address.
-
Domain Search: Scans domain information in real-time to provide information on whether it is a phishing link, presence of malicious link, and SSL certificate validity, along with risk scoring.
-
Image Search: Provides image information for assets vulnerable to cyber threats when searched under various conditions such as RDP, Phishing, Webcam, VNC, and RTSP.
-
Exploit Search: Analyzes common vulnerabilities and exposures (CVE) through exploit DB intelligence and provides detailed information, including actual hijacking codes, per service.
-
API: Criminal IP allows you to search or inquire via an API threat intelligence on all devices, servers, and domains connected to the internet. It can be used for cyber security, attack surface management, penetration testing, vulnerability and malware analysis, as well as for investigation and research. Please refer to our Best Practice page to check more examples on how to use Criminal IP.
Criminal IP Plan Comparison Table
Criminal IP offers three subscription plans—Lite, Medium, and Pro—available for online purchase. Each plan is tailored to different needs, based on credit usage and available features. Users, including vulnerability analysts, ethical hackers, security professionals, businesses, and organizations, can select the plan that best fits their specific requirements.
Plan |
Banner Information & IP Address Lookups |
URL Lookups & Scans |
Threat Scores |
Services Provided |
Special Features |
Historical Data |
Data Download |
Real IP Detection |
Lite |
1 million & 100,000 per month |
100,000 URL lookups & 10,000 URL scans per month |
IP address and domain threat scores |
Complete Search and Intelligence services |
View Hacking Group Summary Card |
12 months |
No |
No |
Medium |
20 million & 1 million per month |
600,000 URL lookups & 30,000 URL scans per month |
IP address and domain threat scores |
Complete Search and Intelligence services |
View Hacking Group Summary Card, Domain Private Full Scan |
12 months |
Yes |
No |
Pro |
Unlimited |
2 million URL lookups & 80,000 URL scans per month |
IP address and domain threat scores |
Complete Search and Intelligence services |
View Hacking Group Summary Card, Attacker Analysis Report, Domain Private Full Scan, All web filters provided |
All time period |
Yes |
Yes |