Threat Jammer's risk of your IP address is LOW
Risk assessment for your peace of mind
Trust on Threat Jammer's risk assessment service, and you will get results faster and more accurately
What is Threat Jammer?
Threat Jammer.com is a Data Enrichment API for developers, security engineers, and IT professionals to access high-quality threat intel data within their applications to detect and block malicious activity. Thanks to its community approach, users can enrich the platform with their data and take the quality of the data to the next level.
Learn by practice and get an account now!
High-quality data at your fingertips
From Big data to Good data. We take care of crunching data for you
We calculate and keep an up-to-date risk score for each resource. You just have to decide what to do, defining your custom thresholdLearn More
Open Source Intelligence is a crucial ingredient of any threat intel strategy. We gather all sources into a single point of contact to categorize and rank them to obtain a risk score obtained using different techniques and algorithms.Learn More
Our users can build their denylists connecting their honeypots, access control tools, proxies, and CDNs. If they want to share their datasets with other Threat Jammer users, they can do it!Learn More
Data Enrichment API
Superpower your applications and services using our REST APIs. The backend services can support heavy loads with sub 100 milliseconds response timesLearn More
Create, update and delete elements instantly in your private deny and allow lists. You can also upload and download them locally to import them into your IPS, Firewall, or WAFLearn More
We create custom datasets from Anonymous VPN and Proxy providers, Deep Web, and Hacker Forums. Don't deep dive into dangerous places to assemble quality intel feeds!Learn More
Our data at a glance
From Big data to Good data. All engines working 24/7 to extract, analyze, and cherry-pick the data you need
Resources analyzed daily
Years of historical data
Integrate with your favorite toolsLearn about the growing set of third-party tools and services
Signup to start using Threat Jammer for free!
A sample of the IP addresses found last hour
Click on any of the IP addresses and see how Threat Jammer works
Latest blog posts and tutorials
Keep up to date with the latest news and articles about Threat Jammer
Frequenly Asked Questions
Any question? Can't find the answer? Contact us or visit the community