703961

Malicious Domains Reported

1226931

Malicious IP's Reported

32

Feed Vendors

1102-gemini.com

Recent Malicious Reported


Enter Target IP to Test



Threat Detection Confidence Calculation

This formula represents the likelihood of a IP being suspicious based on the time it was reported as malicious. At Awasaf, we believe that URLs reported as malicious a long time ago are less likely to still be suspicious. This is because older reports often indicate resolved or inactive threats.

Calculation Criteria:

Time Since Reported Visibility Percentage
Reported within the last 6 months 100%
Reported between 6 months and 1 year 80%
Reported between 1 year and 2 years 60%
Reported between 2 years and 3 years 40%
Reported more than 3 years ago 20%

For example, if a IP was reported as malicious on , and today's date is , its visibility percentage is calculated as follows:

Calculation: The difference in days between the report date and today determines the visibility percentage based on the above criteria.

Conclusion:

This formula helps prioritize monitoring of recently reported malicious IPs over older reports. By doing so, we focus on the most relevant threats, enhancing security and efficiency.

Vendor Agreement Formula

This formula calculates the likelihood of a IP being suspicious based on the number of feed vendors reporting it as malicious. At Awasaf, we use vendor agreement to assess the credibility of the malicious report. A higher number of reporting vendors indicates a higher likelihood of malicious intent.

Calculation Criteria:

Number of Vendors Reporting Agreement Percentage
1 Vendor 20%
2 Vendors 40%
3 Vendors 60%
4 Vendors 80%
5 or more Vendors 100%

For example, if vendors report a IP as malicious, the agreement percentage is based on the above criteria.

Calculation: The number of vendors determines the visibility percentage directly, as shown in the table.

Conclusion:

This formula emphasizes the reliability of feed vendors in flagging suspicious IPs. A higher vendor agreement score implies a stronger consensus and greater credibility in identifying malicious URLs.

Other Tools

Web Scanners

Security Headers Test

Web Scanners

Reconnaissance

Web Scanners

SSL Security Test

Web Scanners

Website Security Test

Web Scanners

Wordpress Test

Web Scanners

Malicious URL Test