Criminal IP

Search for information on
connected to the public Internet.

AssetDomainImageCertificateExploit
Create a Free Account

Best Practices

API Integration

We provide straightforward, easy-to-use APIs that are designed to block risk-scored IPs or malicious domain links. Use Criminal IP code samples to seamlessly integrate all other functions and the database in your organization's infrastructure.

  • Identification of VPN/hosting/Tor of the accessed IP
  • Detection of malicious domain links
  • Management of attack surface vulnerabilities within an organization infrastructure
root@criminalip ~ % |

{
"ip": "5.5.5.5",
"score": { "inbound": 0, "outbound": 0 },
"country": "de",
"country_code": "de",
"isp": "O2 Deutschland",
"status": 200
}


root@criminalip ~ % |

How API works

Criminal IP’s API integration will detect and block potential malicious users accessing login services in real time.

developer reference

FAQMost frequently asked questions about Criminal IP

Criminal IP Fundamentals
What is Criminal IP?

Criminal IP is a specialized Cyber Threat Intelligence (CTI) search engine that allows users to search for various security-related information such as malicious IP addresses, domains, banners, etc. It can be widely integrated with other security systems through consumer-grade web UI and API interface to search for malicious IP addresses, specific IP address history with risk-based scoring based on AI Spera's proprietary algorithm. Fast display of search results and optimized system communications satisfy the needs of end users accessing the Live Service and Integration.

What are some features of Criminal IP?

Search for all your digital assets and vulnerabilities connected to the internet, such as IPs, domains, IoTs, and ICS.

What can the Criminal IP search engine be used for?

Criminal IP search engine provides comprehensive information on IT asset exposure, risk, vulnerabilities, and history of malicious IPs from the outside, all of which enable you to make better data-informed decisions against cyberthreats. For more details, please see the Developer > Best Practices page.

How frequently does Criminal IP update data?

Criminal IP constantly collects and updates data in real time.

Which internet browsers can be used for Criminal IP?

All web browsers accessible via computers, mobile devices, and tablets are available, but it has been especially optimized for Chrome browser.

Do I need a separate installation?

Criminal IP does not require the installation of separate programs. Since it is provided as a simple cloud SaaS service, you can use it through the web, tablets, or mobile devices, practically any place where the internet is available.

Do you have any sample code for Criminal IP?

Criminal IP provides API and sample code for each Search and Intelligence feature. For more detailed information, see Developer > Sample Code.

How do I create a Criminal IP account?

Click "Register" at the top right to create a new account using your email or a Google or Twitter account.

I want to change my account email.

Click the My page icon in the upper right corner and jump to the My Information page where you can edit through the E-mail Edit button.

I'd like to get the latest news on Criminal IP.

Follow Criminal IP's official Twitter and AI Spera's LinkedIn to receive the latest updates on Criminal IP. You can also receive Criminal IP newsletter via the email you entered during sign-up.

Criminal IP Search Quick Guide
What is "Asset Search?"

This is a search feature that provides 5-level risk scores combined with a comprehensive set of information including domains, open ports, vulnerabilities, Whois, and screenshots. Please see the Asset Search page for more details.

What is "Domain Search?"

This is a search feature that provides comprehensive data on IP, subdomains and network logs that are associated with domain risks. Please see the Domain Search page for more details.

What is "Image Search?"

This is a search feature that provides images of externally exposed devices, website information, and enterprise and personal information. Please see the Image Search page for more details.

What is "Exploit Search?"

This is a search feature that provides a full list of exploitable vulnerabilities mapped in real time through searches for CVE ID, vulnerability type, and platforms. Please see the Exploit Search page for more details.

What is "Banner Explorer?"

This is an intelligence feature that provides threat-related information categorized by products and services such as cryptocurrency, database, and IoT. For more details, please see the Banner Explorer page.

What is "Vulnerability?"

This is an intelligence feature that provides information on attack surface exposure and vulnerability of assets via classification by CVE ID and product name, which helps proactively monitor vulnerabilities of the applications in use. Please see the Vulnerability page for more details.

What is "Statistics?"

This is an intelligence feature that identifies malicious IP and domain information as well as VPN. It also provides a 10-day statistical graph in the form of a dashboard. Please see the Statistics page for more details.

What is "Element Analysis?"

This is an intelligence feature that generates filter-specific results based on an analysis of assets and vulnerabilities. Please see the Element Analysis page for more details.

What is "Maps?"

This is an intelligence feature that visually represents IP geolocation information and provides statistics on AS name, product, and country. Please see the Maps page for more details.

Which filters are available for "Asset Search?"

Asset Search provides filters that boost search accuracy and simplicity. Please see the Developer > Filters page.

Which filters are available for "Image Search?"

Image Search provides filters that boost search accuracy and simplicity. Please see the Developer > Filters page.

Which filters are available for "Exploit Search?"

Exploit Search provides filters that boost search accuracy and simplicity. Please see the Developer > Filters page.

Which tags can I use for "Asset Search?"

Asset Search provides tags that boost search accuracy and simplicity. Please see the Developer > Filters page.

Which tags can I use for "Image Search?"

Image Search provides tags that boost search accuracy and simplicity. Please see the Developer > Filters page.

Which categories are searchable through "Banner Explorer?"

Banner Explorer provides category-specific searches for cryptocurrencies, databases, industrial control systems, IoT, network infrastructure, and video games. For more details, please see the Banner Explorer page.

Which products are searchable through "Vulnerability?"

Vulnerability provides various major product categories such as MySQL, Linux, WebLogic Server, and HTTP server that help you easily search for vulnerabilities within a specific product. Please see our Vulnerability page for more product categories.

What can I search for on the "Element Analysis" page?

Search for all the assets and vulnerabilities collected through Criminal IP and sorted by country, service, ASN, product, and port number. Please see the Element Analysis page for more details.

API Integration
Where can I get an API key?

Copy the API key by clicking the My page icon in the upper right corner and jump to the My Information page.

Where can I get the API code?

Feature-specific API codes are available on the Developer > API page.

Do I need to use separate software for the API?

No separate software is required.

How do I make API calls?

After copying the API key, call the API using the API code listed on the Developer > API page, and then check the results presented in JSON response value.

Is there a limit on the number of API calls?

The number of API calls varies by license, and the Enterprise license supports unlimited API calls. Please see the Beta Service page for more details.

What is the API call speed?

The speed of API calls varies by each license, and Enterprise license supports an API call speed of less than 1 second. Please see the Beta Service page for more details.

Which data can be provided by the API?

Integrate Criminal IP API with the user dataset log and identify VPN IP, Hosting IP, Blacklist IP, Tor IP, Proxy IP, Foreign IP with a risk score.

How can the Criminal IP API be utilized?

Criminal IP API can be simply integrated with your existing database and security systems. Identify malicious IP, domains, and vulnerabilities in real time, enabling you to preempt attempts of account takeover, credential stuffing, and malicious access and protect customers as well as assets. For more details, please see the Developer > Best Practice page.

About Membership
Is the beta service free?

Criminal IP beta service will be provided free of charge, and the Enterprise License for customized service is available for a fee. For more information, please see the Beta Service page.

Do I need to sign up for a paid service to use the same features after the beta service period is over?

After the beta service period ends, the same features will be available for a fee. Those who have submitted feedback about the beta service can use the free service for an additional month.

Do you have any other plans?

At the current stage, there are only three plans available for the beta version. Various plans will soon be added, right after the official launch. For more information, please see the Beta Service page.

What if the existing plans don't meet my needs?

We highly recommend choosing our unlimited custom Enterprise subscription plan. It's the most flexible plan that is currently available, and we are always open to address your data needs. For more information, please see the Beta Service page.

Is it possible to get unlimited access to the database?

Yes, Enterprise licenses allow unlimited use of services and functions. For more information, please see the Beta Service page.

How can I check my payment information?

Click the My page icon in the upper right corner and jump to the My Information page to check your current membership and payment history.

What if I want to change my license?

Click the My page icon in the upper right corner and contact us through the Support Ticket page.

Which payment methods are accepted?

We support all major credit/debit cards and Stripe payment systems. Please note that the current Beta version is provided free of charge, with the exception of the Enterprise plan, which is only available through consultation. For more information, please see the Beta Service page.

I want to cancel my license.

Click the My page icon in the upper right corner and contact us through the Support Ticket page.

I have a question about Enterprise License.

Please contact us through the About > Contact Us page.

More questions?
What if I have other questions?

If you already have a Criminal IP account, click the My page icon in the upper right corner and contact us through the Support Ticket page. If you do not have an account or if you have any inquiries regarding Enterprise membership, please contact us through the About > Contact Us page.

Share your feedback with us and get a one-month license for free

We are thrilled to have you on board for our first beta trial. Your genuine feedback will be greatly appreciated since it drives us to build a top-notch customer experience. Please take a moment to fill out the survey. Upon completion, all participants will be entitled to a one-month complimentary “early bird package” subscription.

Tell us what you think