Can you explain how Hazard Reports are prepared?

Last Updated: March 8, 2023

Our Hazard Report is an innovative cybersecurity metrics set that provides businesses with both reactive and proactive approaches to combat cyber threats. 

The reactive approach involves monitoring IP addresses against trusted blacklist sites such as blocklist.de, uceprotect.net, and Spamhaus, as well as using advanced algorithms and third-party sources to identify anonymisers like VPNs and proxies. However, while this approach is effective, it is limited to only identifying services listed on these websites and may not detect newly established malicious services in a timely manner, leaving businesses vulnerable to high-risk attacks.

The majority of cyber-attacks originate from hosting environments, as attackers often avoid risking their own networks. As a result, it is crucial to exercise caution when engaging in activities that involve data centres or hosting IP addresses, such as making e-commerce purchases or leaving comments on blogs. This is where our proactive approach shines.

Our innovative technology examines every global IP address to determine the likelihood of it being assigned to a hosting environment. We provide the outcome of this assessment in the 'hostingLikelihood' data field, which is assigned a value ranging from 0 to 10. In addition, we offer a metric that detects whether the Autonomous System announcing the network is likely to be a hosting provider or not.

By using our Hazard Report, businesses can take proactive steps to mitigate potential threats, protecting themselves and their customers from the devastating effects of cyber attacks.