top of page
3d-render-network-communications-background-with-flowing-cyber-dots.jpg

Anomali IP Rep Feed




Along with every Command and Control IP address (C2) for botnets we track, the feed contains IP addresses that have communicated with a C2, a honeypot, or sinkhole we operate. Other example categories of malicious behavior include darknet scans, abused proxies, openresolvers, and IPs hosting phishing sites. Using our global network of darknets, sensors, and sinkholes we formed the most comprehensive feed we have ever produced.


The IP Reputation Feed is updated hourly and contains an aggregate of the last 24 hours of activity.


​Every IP in the feed receives an individual reputation score using several different categories of patterns observed over the past 30 days. The key used to calculate the score is included in the feed and can be used to reconstruct the behavior patterns observed for each individual IP in the feed.


​IP Reputation Scoring Categories


  • Number of days in feed

  • Number of active detections

  • Number of passive detections

  • Detection type

  • Controller behavior:​

  • Non-standard port

    • # controllers on same IP

    • # unique domains on same IP

    • Instructions decoded

    • SSL usage

    • Malicious IPs in /24



bottom of page