Attack Surface Management: Monitoring Unknown Assets and Vulnerabilities

It is well-known that most companies utilize various network equipment, databases, applications, and domains and that these IT properties often operate under a myriad of IP addresses and ports. Hackers with malicious intent, with this knowledge, begin their methods of infiltration by searching for open ports and targeting servers with severe security vulnerabilities. This has made Attack [...]

By |2022-08-16T17:13:28+09:00August 16th, 2022|Tags: , , |2 Comments

Open Port Vulnerability Detection: the More Open Ports You Have, the More Cyber Threats Exist

Global IP address data collected by Criminal IP (https://www.criminalip.io) includes synthetic CTI intelligence which is including connected domains and Whois information, location information, vulnerabilities and port information. Port is primarily used in software as a unit to distinguish between network services and processes, and can be distinguished by port numbers from 0 to 65535. In particular, ports 0 to [...]

By |2022-09-27T18:01:57+09:00August 4th, 2022|1 Comment

VPN Detection: Finding Unwelcomed Guests to Your Network

One of the most powerful features of Criminal IP API, the VPN Detection API, is used to identify anonymous intruders using VPNs regardless of their intentions. With Criminal IP (https://www.criminalip.io)'s API capability, you can apply our entire data, including but not limited to VPN IP addresses, across corporate and institutional security teams, as well as the cybersecurity industry. [...]

By |2022-09-27T18:31:51+09:00July 20th, 2022|1 Comment

Find Your Company IP

With the acceleration of digital transformation and the growing number of companies extending their businesses to the cloud, many unmonitored external attack surfaces (VPNs, RDPs, SMBs, certificates, mobile devices, etc.) are giving rise to frequent attacks by threat actors. To successfully protect external attack surface, IT assets must be identified with pinpoint precision and real-time [...]

By |2022-08-04T16:27:46+09:00March 10th, 2022|Tags: , , , |1 Comment

Detection of Vulnerability Through Asset Search

Developer organizations heavily rely on numerous tools to facilitate communication, collaboration, and productivity, and more and more companies are markedly turning to application packaging tools such as Docker and Kubernetes. Because Docker containers allow you to visualize applications, configurations, libraries , distribute them, and install in one go without the need to work on private [...]

Domain Search: Checking Suspicious Domains Using CIP Domain Search

From the past, attackers have long been employing malicious methods to set up phishing sites disguising as famous sites and steal personal financial information via emails, SMS and online community boards. According to Verizon's '21 Data Breach Investigation Report’, it was found that 36% of breaches were associated with phishing, which is an indicator of [...]

By |2022-08-04T16:22:18+09:00March 4th, 2022|Tags: , , |0 Comments

Searching for VPN IP Exposure Through Criminal IP and Recommendations for Protective Measures

With remote work being on the rise due to COVID-19, more and more companies are using VPN, which in turn is leading to a spike in attacks that exploit the vulnerabilities found in VPN. Some classic examples include the Korea Atomic Energy Research Institute and the Korea Aerospace Industry in Korea where attackers were all [...]

By |2022-08-04T16:21:42+09:00February 25th, 2022|Tags: , , , , |0 Comments
Go to Top