Statistics

Curious to know more about the specific types of data we collect and the reporting we do? You can learn more below.

ASN

We can aggregate our reports by ASN, pointing our spotlight at all the malicious activity we’ve detected on a particular network.

Bots

Bots are zombie computers controlled by cyber criminals. We find them using honeypots, honey clients, sinkholes, and tracking. Then we expose their activity in our reports.

Botnets

Botnets are multiple bots working together. Thanks to the scale of our infrastructure, we provide our partners with the resources to take them down.

DDoS

We use sinkholes to detect DDoS (distributed denial of service) attacks and bring them to our partners’ attention for remediation.

Geo Locations

We can precisely filter the activity in our reports by longitude and latitude, giving national governments the information they need to protect their region.

Malware

We have a massive, constantly growing repository of malware samples. We never throw anything away, so we can easily revisit historical data to catch anything we might have missed.

Scans

Shadowserver scans the entire IPv4 Internet 42 times every day. Then we package the data we collect in our reports, which are aggregated per subscriber on a need-to-know basis.

URLs

We collect potentially infected URLs from attacks, honeypots, sandbox runs, and spam, helping us trace malicious activity to its source.

103

National CSIRTs depending
on our free daily reports, covering 124 countries

2,750

Class C networks hosting honeypots & spampots

268,000

unique malware samples ingested & analyzed every day by our sandboxes