Anomali IP Rep Feed
Along with every Command and Control IP address (C2) for botnets we track, the feed contains IP addresses that have communicated with a C2, a honeypot, or sinkhole we operate. Other example categories of malicious behavior include darknet scans, abused proxies, openresolvers, and IPs hosting phishing sites. Using our global network of darknets, sensors, and sinkholes we formed the most comprehensive feed we have ever produced.
The IP Reputation Feed is updated hourly and contains an aggregate of the last 24 hours of activity.
​Every IP in the feed receives an individual reputation score using several different categories of patterns observed over the past 30 days. The key used to calculate the score is included in the feed and can be used to reconstruct the behavior patterns observed for each individual IP in the feed.
​IP Reputation Scoring Categories
Number of days in feed
Number of active detections
Number of passive detections
Detection type
Controller behavior:​
Non-standard port
# controllers on same IP
# unique domains on same IP
Instructions decoded
SSL usage
Malicious IPs in /24