Contact US
Blog

Event-Driven Threat Validation and Automated Blocking: An IP Risk Verification Pipeline Using Criminal IP Data

In security operations environments, many security alerts are not the beginning of an attack but rather the result of activity that has already occurred. For example, consider the following scenarios: When such events occur, it often implies that the system has already communicated with external infrastructure. Therefore, security analysis should not stop at confirming the event itself. It […]

In security operations environments, many security alerts are not the beginning of an attack but rather the result of activity that has already occurred. For example, consider the following scenarios:

  • Malware detection by an EDR
  • Detection of a phishing site connection through URL filtering
  • An administrator account login event

When such events occur, it often implies that the system has already communicated with external infrastructure. Therefore, security analysis should not stop at confirming the event itself. It is equally important to rapidly verify the external infrastructure associated with the event.

One approach to achieving this is an Event-Driven Threat Validation Pipeline. This method begins with a security event, analyzes related network logs, evaluates the risk of associated external IP infrastructure, and, if necessary, performs automated response actions such as blocking malicious IP addresses.

Event-Driven Threat Validation Pipeline

This pipeline operates by using a security event as the starting point, analyzing network logs, evaluating the risk of external IP infrastructure, and triggering automated blocking if required.

The overall process is illustrated below.

Architecture of the Event-Driven Threat Validation and Automated Response Pipeline

This architecture analyzes post-event network activity, quickly identifies external infrastructure associated with the attack, and enables coordinated response through existing security infrastructure within the operational environment.

Validation Model: Event-Driven + Timeline-Based Analysis

The pipeline operates based on three key analytical principles.

Event-Driven

Instead of continuously analyzing all network traffic, the analysis is triggered at the time of a detected security event. This approach reduces unnecessary processing while focusing on high-relevance events.

Timeline-Based Analysis

The system analyzes a specific time window prior to the security event. For example:

Event time: 10:00
Analysis window: 09:55 ~ 10:00

This timeline-based approach helps identify network activity that may have directly contributed to the security event.

Selective Threat Validation

Not all network traffic is analyzed. Only traffic meeting specific conditions is evaluated, such as:

  • Network connections immediately before the event
  • Connections to external public IP addresses
  • Non-standard port traffic
  • Traffic occurring outside business hours

By focusing on these indicators, the pipeline reduces unnecessary analysis while improving detection accuracy.

Infrastructure Verification Using Criminal IP

To evaluate the risk of external infrastructure, the pipeline utilizes the Criminal IP API. Verification is performed through the following endpoint:

https://search.criminalip.io/developer/api/get-asset-ip-report

This API provides infrastructure-level intelligence, not just simple IP reputation data. Key security indicators include:

  • IP Risk Score (Inbound / Outbound)
  • Exposed services and open ports
  • Detection of proxy or VPN infrastructure
  • Cryptocurrency mining infrastructure indicators
  • Presence of vulnerable services
  • SSL certificate status

These indicators are combined to perform Infrastructure Risk Evaluation, enabling deeper analysis of potentially malicious infrastructure.

Multi-Factor Risk Evaluation Criteria

The Criminal IP threat validation pipeline determines risk levels using multiple infrastructure indicators, rather than relying on reputation alone. Key evaluation factors include:

IndicatorRisk Criteria
Reputation ScoreDangerous or Critical
SSL Certificate IssuesSelf-signed or expired certificates
Directory Listing ExposurePublic directory listing on web servers
Mining InfrastructureDetection of crypto-mining activity
Anonymous InfrastructureVPN, Tor, or Proxy usage
SSH Service ExposurePort 22 or OpenSSH detected

This multi-factor analysis model enables a more reliable infrastructure-level risk evaluation.

Example of Infrastructure Risk Evaluation Results

The risk evaluation engine analyzes infrastructure risk based on Criminal IP API data. For example, the system may produce output such as the following:

Example CLI output when querying an arbitrary IP address in Python

If an IP address receives a Dangerous risk score or exposes services such as SSH, the infrastructure may be flagged as suspicious. These evaluation results can then be used by the automated response pipeline to determine whether blocking actions should be executed.

Query result for the same IP in Criminal IP Asset Search

The same infrastructure data can also be verified directly through the Criminal IP platform. This demonstrates that the CLI output is based on the same real infrastructure intelligence provided by Criminal IP.

Threat Validation Pipeline Execution Example

An example implementation of this architecture can be found in the following GitHub repository:

https://github.com/criminalip/threat-validation-pipeline

This repository contains IP validation scripts using the Criminal IP API, allowing users to test risk analysis for individual IP addresses.

Step 1. Clone the Repository

!git clone https://github.com/criminalip/threat-validation-pipeline.git
%cd threat-validation-pipeline
!pip install requests

Step 2. Configure the API Key

Your API key can be found by: Logging in to criminalip.io → My Page → API Key

How to locate the Criminal IP API key

Step 3. Run a Single IP Validation Test

The following command retrieves risk information for a specific IP address:

!python cip_ip_report_check.py --ip 23.XXX.XXX.XX --pretty

This command calls the Criminal IP API and outputs the IP risk score and exposed services.

You can also analyze specific ports:

!python cip_ip_report_check.py --ip 23.XXX.XXX.XX --port 22 --pretty

To view the raw API response in JSON format:

!python cip_ip_report_check.py --ip 23.XXX.XXX.XX --dump-json

The JSON response may include associated domain information, which can help identify additional services or infrastructure hosted on the same server.

This example demonstrates how the validation engine functions within the pipeline. In real operational environments, IP addresses are automatically extracted from network logs and validated. Automated blocking actions require integration with firewalls, SOAR platforms, or other security infrastructure.

Operational Use Cases

This pipeline can be applied in various real-world security scenarios.

Malware Infection

When malware is detected by an EDR:

Network logs before the event are analyzed
External IPs are extracted → validated with Criminal IP → malicious infrastructure is blocked

Phishing Site Access

When a user clicks a phishing link:

Related network connections are analyzed
Additional attack infrastructure is discovered → malicious infrastructure blocking can be triggered

Administrator System Login

When an administrator login event occurs:

Network activity prior to login is analyzed
External infrastructure risk is validated

Abnormal Network Traffic

Examples include:

  • Non-standard port connections
  • Late-night network activity
  • Suspicious outbound communications from internal systems

Conclusion

In modern attack environments, it is difficult to understand the full attack flow based on a single security event. Therefore, it is important to track network activity following a security event and quickly verify the risk level of the related external infrastructure. The event-driven threat validation pipeline using Criminal IP data automates this analysis process, identifies risky infrastructure, and provides an effective security operations model that can be integrated with automated response systems within each operational environment. This approach can be effectively utilized in SOC operations, threat hunting, MSSP automation, and automated response environments within security infrastructure.

The full code and architecture documentation can be found in the following GitHub repository.

http://github.com/criminalip/threat-validation-pipeline