Curious to know more about the specific types of data we collect and the reporting we do? You can learn more below.


We can aggregate our reports by ASN, pointing our spotlight at all the malicious activity we’ve detected on a particular network.


Bots are zombie computers controlled by cyber criminals. We find them using honeypots, honey clients, sinkholes, and tracking. Then we expose their activity in our reports.


Botnets are multiple bots working together. Thanks to the scale of our infrastructure, we provide our partners with the resources to take them down.


We use sinkholes to detect DDoS (distributed denial of service) attacks and bring them to our partners’ attention for remediation.

Geo Locations

We can precisely filter the activity in our reports by longitude and latitude, giving national governments the information they need to protect their region.


We have a massive, constantly growing repository of malware samples. We never throw anything away, so we can easily revisit historical data to catch anything we might have missed.


Shadowserver scans the entire IPv4 Internet 42 times every day. Then we package the data we collect in our reports, which are aggregated per subscriber on a need-to-know basis.


We collect potentially infected URLs from attacks, honeypots, sandbox runs, and spam, helping us trace malicious activity to its source.

40 billion

SSL certificates, indexed
 & searchable in our data & analysis clusters


Class C networks hosting honeypots & spampots


National CSIRTs depending
on our free daily reports, covering 175 countries and territories