Threat Jammer's risk of your IP address is
Risk assessment for your peace of mind
Trust on Threat Jammer's risk assessment service, and you will get results faster and more accurately
What is Threat Jammer?
Threat Jammer.com is a Data Enrichment API for developers, security engineers, and IT professionals to access high-quality threat intel data within their applications to detect and block malicious activity. Thanks to its community approach, users can enrich the platform with their data and take the quality of the data to the next level.
Learn by practice and get an account now!
High-quality data at your fingertips
From Big data to Good data. We take care of crunching data for you
Risk Score
We calculate and keep an up-to-date risk score for each resource. You just have to decide what to do, defining your custom threshold
Learn MoreOSINT lists
Open Source Intelligence is a crucial ingredient of any threat intel strategy. We gather all sources into a single point of contact to categorize and rank them to obtain a risk score obtained using different techniques and algorithms.
Learn MoreCrowdsourcing
Our users can build their denylists connecting their honeypots, access control tools, proxies, and CDNs. If they want to share their datasets with other Threat Jammer users, they can do it!
Learn MoreData Enrichment API
Superpower your applications and services using our REST APIs. The backend services can support heavy loads with sub 100 milliseconds response times
Learn MorePrivate Datasets
Create, update and delete elements instantly in your private deny and allow lists. You can also upload and download them locally to import them into your IPS, Firewall, or WAF
Learn MoreCSINT Datasets
We create custom datasets from Anonymous VPN and Proxy providers, Deep Web, and Hacker Forums. Don't deep dive into dangerous places to assemble quality intel feeds!
Learn MoreOur data at a glance
From Big data to Good data. All engines working 24/7 to extract, analyze, and cherry-pick the data you need
3B
Resources analyzed daily
9M
Active resources
339
Sources analyzed
1
Years of historical data
Integrate with your favorite tools
Learn about the growing set of third-party tools and servicesSignup to start using Threat Jammer for free!
A sample of the IP addresses found last hour
Click on any of the IP addresses and see how Threat Jammer works
Community
Multiple sources
More frequent
Latest blog posts and tutorials
Keep up to date with the latest news and articles about Threat Jammer
Frequenly Asked Questions
Any question? Can't find the answer? Contact us or visit the community