Curious to know more about the specific types of data we collect and the reporting we do? You can learn more below.


We can aggregate our reports by ASN, pointing our spotlight at all the malicious activity we’ve detected on a particular network.


Bots are zombie computers controlled by cyber criminals. We find them using honeypots, honey clients, sinkholes, and tracking. Then we expose their activity in our reports.


Botnets are multiple bots working together. Thanks to the scale of our infrastructure, we provide our partners with the resources to take them down.


We use sinkholes to detect DDoS (distributed denial of service) attacks and bring them to our partners’ attention for remediation.

Geo Locations

We can precisely filter the activity in our reports by longitude and latitude, giving national governments the information they need to protect their region.


We have a massive, constantly growing repository of malware samples. We never throw anything away, so we can easily revisit historical data to catch anything we might have missed.


Shadowserver scans the entire IPv4 Internet 42 times every day. Then we package the data we collect in our reports, which are aggregated per subscriber on a need-to-know basis.


We collect potentially infected URLs from attacks, honeypots, sandbox runs, and spam, helping us trace malicious activity to its source.

152 billion

scan probes sent every day


different data sets generated through full daily Internet-wide IPv4 scanning

1.5 billion+

malware samples in our malware repository