Threat Jammer's risk of your IP address is HIGH

Risk assessment for your peace of mind

Trust on Threat Jammer's risk assessment service, and you will get results faster and more accurately

Search
Threat Jammer logo

What is Threat Jammer?

Threat Jammer.com is a Data Enrichment API for developers, security engineers, and IT professionals to access high-quality threat intel data within their applications to detect and block malicious activity. Thanks to its community approach, users can enrich the platform with their data and take the quality of the data to the next level.

Learn by practice and get an account now!

High-quality data at your fingertips

From Big data to Good data. We take care of crunching data for you

Risk Score

We calculate and keep an up-to-date risk score for each resource. You just have to decide what to do, defining your custom threshold

Learn More

Machine Learning

Our models use large historical datasets to calculate the most accurate risk scores. Multiple factors determine the highest confidence score

Learn More

Crowdsourcing

Our users can build their denylists connecting their honeypots, access control tools, proxies, and CDNs. If they want to share their datasets with other Threat Jammer users, they can do it!

Learn More

Data Enrichment API

Superpower your applications and services using our REST APIs. The backend services can support heavy loads with sub 100 milliseconds response times

Learn More

Private Datasets

Create, update and delete elements instantly in your private deny and allow lists. You can also upload and download them locally to import them into your IPS, Firewall, or WAF

Learn More

CSINT Datasets

We create custom datasets from Anonymous VPN and Proxy providers, Deep Web, and Hacker Forums. Don't deep dive into dangerous places to assemble quality intel feeds!

Learn More

Our data at a glance

From Big data to Good data. All engines working 24/7 to extract, analyze, and cherry-pick the data you need

3B

Resources analyzed daily

9M

Active resources

339

Sources analyzed

1

Years of historical data

Integrate with your favorite tools

Learn about the growing set of third-party tools and services
How to detect if a user comes from a Datacenter

Signup to start using Threat Jammer for free!

A sample of the IP addresses found last hour

Click on any of the IP addresses and see how Threat Jammer works

Community

Multiple sources

More frequent

Latest blog posts

Keep up to date with the latest news and articles about Threat Jammer

Frequenly Asked Questions

Any question? Can't find the answer? Contact us or visit the community