INTERNET REPUTATION SYSTEM – Features
Identifying the source of threat
ThreatBite identifies potential sources of fraud by comparing user identification data to over 500 databases of bad internet actors.
Account creation protection
ThreatBite protects against automatic account creation and user account hijacking.Read more
ThreatBite Identifies potential sources of spammers.Read more
TOR network users detection
ThreatBite recognizes addresses belonging to the Tor network.Read more
ThreatBite detects addresses used as proxies or VPNs. So you can block them in case your web services are gographically restricted.Read more
ThreatBite detects addresses belonging to private networks.Read more
ThreatBite recognizes captured IP addresses.Read more
How does it work?
ThreatBite analyses incoming internet users (takes into account IP, Header, Email, etc) and reports back a standardized score to a SIEM or directly to an application. The score represents user trustworthiness. ThreatBite uses independent databases that collect up-to-date information about bad internet actors. Because it is an API service, it works in real-time, allowing you to act fast and block or keep an eye on suspicious user behavior.
Available on GitHub:
For Business / Enterprise version please contact our consultant