Criminal IP is an investigative software used to trace IP addresses and gather intelligence on cybercriminals. It provides location data, ISP information, and tools to uncover online aliases.
Criminal IP: Investigative Software for Tracing IPs and Cybercrime Intelligence
Criminal IP is an investigative software used to trace IP addresses and gather intelligence on cybercriminals. It provides location data, ISP information, and tools to uncover online aliases.
What is Criminal IP?
Criminal IP is an investigative software designed specifically for cybersecurity professionals and law enforcement agencies to trace IP addresses and gather actionable intelligence on cybercriminals. It integrates seamlessly with other security solutions to accelerate investigations.
Key features of Criminal IP include:
IP address tracking - Identify location, ISP, hosting provider, and other metadata linked to an IP address.
Threat intelligence - Access current and historical internet traffic data to establish patterns of behavior and ownership.
Online aliases - Uncover connections between IP addresses and online personas used by threat actors across surface, deep and dark web.
Reporting - Generate detailed reports to capture evidence and investigation summaries.
Global coverage - Our datasets span IPs and internet traffic data across North America, Europe, and Asia Pacific regions.
With an intuitive user interface and integration capabilities with leading security platforms, Criminal IP enhances monitoring, enriches threat intelligence, and reduces investigation time for infosec and law enforcement teams worldwide.
Shodan is a search engine for finding Internet-connected devices and services. Unlike traditional search engines that index the content of web pages, Shodan specifically targets hardware and software that is connected to the Internet, ranging from home routers and webcams to industrial control systems and SCADA devices.Some key features and...
Censys is an internet search engine designed specifically for information on Internet-connected servers, websites, and devices. It allows cybersecurity researchers, businesses, and other users to view real-time data on the networks and systems that are exposed to the public internet.Some of the information Censys provides includes:Open ports and services running...
FOFA is a powerful cyber threat intelligence search engine developed by Bit4WOOD in China. It allows users to search for a wide range of internet assets including websites, IP addresses, domains, network infrastructure, open ports, certificates, and data leaks.Some key features of FOFA include:Comprehensive coverage of internet assets across the...
LeakIX is an open-source web application security scanner designed to help developers and security professionals identify vulnerabilities in their web apps. It can automatically crawl web applications and APIs to detect common security issues like:SQL injectionCross-site scripting (XSS)Insecure cookiesCommand injectionPath traversalInsecure headersAnd moreSome key features of LeakIX include:Automatic crawling and...
ZoomEye is a search engine and data mining tool for cyberspace that facilitates the discovery and analysis of devices exposed to the public internet. It functions like a search engine for cyberspace, allowing users to easily search for information on IPs, websites, and other devices.Some key features of ZoomEye include:Search...
Reposify is an open source management platform designed to help organizations gain visibility and control over the open source components used in their software applications. It acts as a central inventory that automatically tracks open source usage across an organization's entire codebase, including public and private repositories.Key features of Reposify...
Websecurify is a powerful website security and malware detection tool. It provides automated vulnerability scanning and malware detection for websites. Key features include:Automatic discovery and scanning of entire website assets including pages, scripts, images, etc.Detection of common vulnerabilities like SQL injection, XSS, weak passwords, etc.Detection of malware, viruses, trojans, backdoors,...
Netlas.io is a visual analytics platform designed to help businesses monitor, analyze, and optimize their website performance and user experience. It provides an easy-to-use interface to track and visualize website traffic, user behavior flows, conversion funnels, and other key web metrics.Some of the key features of Netlas.io include:Interactive flow maps...
Arachni is an feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. It is smart, optimized, stable, and portable making it a reliable tool for web application security assessments.Some key features of Arachni include:High performance web crawling capable of analyzing hundreds...
Intruder is a comprehensive web application security testing tool used to identify vulnerabilities in web apps. It is designed to automate vulnerability scanning and penetration testing to help developers build more secure software.Key features of Intruder include:Automated vulnerability scanning - Intruder can crawl web applications and automatically scan for security...
Wapiti is an open-source web application vulnerability scanner that is designed to audit the security of web applications and web services. It works by crawling a target website and scanning for vulnerabilities such as XSS, SQL injection, file inclusion, command execution, CRLF injection, and more.Some key features of Wapiti include:Detects...
HTTPCS Security is an open-source web application firewall (WAF) designed to protect websites and web applications from common exploits and vulnerabilities. It works by filtering, monitoring, and blocking potentially malicious HTTP traffic before it reaches the web application.Some key features of HTTPCS Security include:Protection against SQL injection, cross-site scripting (XSS),...