Sold by: MEGAZONE CLOUD Corporation
Criminal IP is an all-in-one threat intelligence search engine platform that detects vulnerabilities related to individuals' or businesses' cyber assets in real-time and enables proactive responses.
Overview

Product video
Criminal IP is the industry's most comprehensive IP address intelligence tool, powered by AI and Machine learning to grant you visibility into the risks associated with internet-connected devices. This threat intelligence tool is ideal for fraud detection, attack surface management, and threat hunting.
- Asset Search - Offers risk scoring, linked asset info, abuse history, and vulnerabilities for IP addresses with many filters and tags for extended threat comprehension.
- Domain Search - Conducts real-time scans for domain data, including phishing/malicious links, certificate validity, and risk scoring.
- Exploit Search - Analyzes global CVEs, providing detailed information, including hijacking codes for each service.
- Image Search - Provides image data for cyber-threat-vulnerable assets, including RDP, Phishing, Webcam, VNC, RTSP.
- Criminal IP API - Facilitates easy integration of all Criminal IP threat intelligence data into existing services/security systems such as SOAR and SIEM.
- Hacking Group - Identifies hacking groups affiliated with a specfic IP address. Users can access a comprehensive analytics report containing IOCs, IOAs, and TTP information for the identified hacking groups.
- Diverse CTI data: Provides risk classification, host/cloud stats, asset geography, vulnerable asset graphs, C2 data, AS Name/Software/Port stats, recent risks, new assets, and more.
If you have any questions, please do not hesitate to contact us at support@aispera.com .
Highlights
- Criminal IP facilitates the identification of malicious IPs, phishing sites, and the status of malicious domains, offering in-depth security insights with detailed information, including threat banners and historical malicious activity data.
- Corporate and institutional security practitioners harness the power of Criminal IP API to safeguard corporate assets and proactively manage vulnerabilities in their attack surface.
- Through the Hacking Group feature, security teams can utilize real-time collected Indicators of Compromise (IOC), Indicators of Attack (IOA), Tactics, Techniques, and Procedures (TTP), software information, and the hacking group's activity history to respond to attacks.
Details
New
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
Pricing
Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator