{"id":72871,"date":"2024-09-13T18:00:38","date_gmt":"2024-09-13T10:00:38","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=72871"},"modified":"2024-09-12T20:49:34","modified_gmt":"2024-09-12T12:49:34","slug":"criminal-ip-osint-cybersecurity-threat-detection","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/","title":{"rendered":"Utilizing Criminal IP for Cyber Threat Hunting"},"content":{"rendered":"<p>Are you ready to protect your digital world from the growing dangers online? With <strong>cyber threats becoming more sophisticated<\/strong> every day, keeping your data safe has never been more important.<\/p>\n<p>In this article, we\u2019re going to explore how <strong>Criminal IP<\/strong>, an <a href=\"#osint_se\">OSINT search engine<\/a>, can help you stay one step ahead of cybercriminals. We\u2019ll explain <a href=\"#criminalip\">what Criminal IP is<\/a>, <a href=\"#what_criminalip_do\">how it works<\/a>, and why using open-source intelligence (OSINT) is a game-changer for spotting and stopping threats.<\/p>\n<p>Whether you\u2019re deep into cybersecurity or just want to make sure your online presence is secure, understanding how to use tools like Criminal IP could make all the difference.<\/p>\n<div class=\"su-box su-box-style-default su-box-v7\" id=\"\" style=\"border-color:#000000;border-radius:3px\">\n<div class=\"su-box-title\" style=\"background-color:#333333;color:#FFFFFF;border-top-left-radius:1px;border-top-right-radius:1px\">Table of Content<\/div>\n<div class=\"su-box-content su-u-clearfix su-u-trim\" style=\"border-bottom-left-radius:1px;border-bottom-right-radius:1px\">\n<ul>\n<li><a href=\"#criminalip\">Getting to Know Criminal IP<\/a><\/li>\n<li><a href=\"#osint_se\">Understanding OSINT Search Engines<\/a><\/li>\n<li><a href=\"#what_criminalip_do\">What Criminal IP Can Do?<\/a> <\/li>\n<li><a href=\"#real-world\">Using Criminal IP in Real-World Scenarios<\/a><\/li>\n<li><a href=\"#api\">How the API Works<\/a><\/li>\n<li><a href=\"#pricing\">Criminal IP\u2019s Pricing<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<hr>\n<h2 id=\"criminalip\">Getting to Know Criminal IP<\/h2>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.criminalip.io\/\">Criminal IP<\/a> is an OSINT search engine designed for cybersecurity tasks, such as assessing attack surfaces and identifying potential threats.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg\" alt=\"Criminal IP homepage interface showing data on IP risks\" width=\"2380\" height=\"1336\"><\/figure>\n<div class=\"sue-icon-text su-image-caption\" data-url=\"\" data-target=\"self\" style=\"min-height:34px;padding-left:36px;color:#333333\">\n<div class=\"sue-icon-text-icon\" style=\"color:#333333;font-size:24px;width:24px;height:24px\"><i class=\"sui sui-photo\" style=\"font-size:24px;color:#333333\"><\/i><\/div>\n<div class=\"sue-icon-text-content su-u-trim\" style=\"color:#333333\">Criminal IP\u2019s homepage<\/div>\n<div style=\"clear:both;height:0\"><\/div>\n<\/div>\n<p>It continuously gathers and updates data in real-time, using AI technology to <strong>pinpoint dangerous IP addresses and domains<\/strong>. The risk is then rated on a 5-level scale. The data is organized with filters and tags to make searching easy. Additionally, it can be integrated with other tools and systems (e.g., Cisco, AWS Marketplace, WordPress, Zabbix) using an API for seamless integration.<\/p>\n<hr>\n<h2 id=\"osint_se\">Understanding OSINT Search Engines<\/h2>\n<p>To truly understand what <strong>Criminal IP<\/strong> can do, one must first know what an OSINT search engine is.<\/p>\n<p>OSINT stands for <strong>Open Source Intelligence<\/strong>, which involves gathering and analyzing data from open sources like the internet, social media, and public records.<\/p>\n<p>An OSINT search engine is a tool specifically designed to help users find and analyze information that is <strong>publicly available<\/strong> across various online sources.<\/p>\n<p>These search engines are commonly used by cybersecurity experts, investigators, journalists, and researchers to uncover crucial information, identify potential threats, or reveal hidden details.<\/p>\n<p>They often come with advanced features that allow users to search multiple platforms at once, apply specific filters, and even keep track of ongoing activities.<\/p>\n<hr>\n<h2>10 Reasons Why OSINT Matters in Cybersecurity<\/h2>\n<p>The importance of <strong>Open Source Intelligence (OSINT)<\/strong> in cybersecurity cannot be overstated, as it plays a vital role in helping organizations and professionals identify and manage threats, improve situational awareness, and make informed decisions.<\/p>\n<p>Here\u2019s why it is so crucial\u2026<\/p>\n<h3>1. Identifying and Monitoring Threats<\/h3>\n<p>By monitoring <strong>publicly available data<\/strong>-such as social media, forums, and websites-cybersecurity teams can spot <strong>early signs of potential attacks<\/strong>, such as discussions about vulnerabilities or planned actions. This allows them to take <strong>proactive defensive measures<\/strong>.<\/p>\n<h3>2. Assessing Vulnerabilities<\/h3>\n<p>Tools that analyze open-source information are key in <strong>uncovering weaknesses<\/strong> in an organization\u2019s digital infrastructure. This includes finding exposed servers, unsecured databases, and misconfigured systems that could be exploited by attackers. <strong>Addressing these issues promptly<\/strong> can prevent breaches.<\/p>\n<h3>3. Responding to Incidents<\/h3>\n<p>In the event of a cybersecurity incident, gathering intelligence from publicly available sources helps <strong>understand the attacker\u2019s methods, tools, and motivations<\/strong>. This information is crucial for <strong>assessing the attack\u2019s scope<\/strong>, identifying compromised systems, and crafting an effective response strategy.<\/p>\n<h3>4. Supporting Penetration Testing<\/h3>\n<p>During the reconnaissance phase of penetration testing, gathering <strong>open-source data<\/strong> about a target helps simulate real-world attacks. This allows penetration testers to identify <strong>potential weaknesses in defenses<\/strong> and suggest improvements.<\/p>\n<h3>5. Managing Brand and Reputation<\/h3>\n<p>Monitoring public mentions of a brand, products, or employees can alert organizations to potential threats like phishing sites, fake social media profiles, or leaked data. This early warning helps <strong>protect and manage the organization\u2019s reputation<\/strong>.<\/p>\n<h3>6. Ensuring Compliance and Due Diligence<\/h3>\n<p><strong>Open-source intelligence<\/strong> is also valuable for ensuring <strong>regulatory compliance<\/strong>. Monitoring for data leaks, unauthorized disclosures, or any public information that might indicate non-compliance is essential. It is equally useful in <strong>due diligence<\/strong> during mergers, acquisitions, or partnerships, providing insight into the cybersecurity posture of potential partners.<\/p>\n<h3>7. Enhancing Situational Awareness<\/h3>\n<p>By collecting and analyzing data from various sources, organizations gain a <strong>broader view of the cybersecurity landscape<\/strong>. This improved situational awareness helps them stay ahead of <strong>emerging threats<\/strong>, industry trends, and cybercriminal activities.<\/p>\n<h3>8. Gathering Intelligence Cost-Effectively<\/h3>\n<p>Since the information comes from public sources, it is often more <strong>cost-effective<\/strong> than other intelligence methods. Organizations can gather valuable insights without needing <strong>expensive resources<\/strong> or access to restricted data.<\/p>\n<h3>9. Supporting Law Enforcement and Investigations<\/h3>\n<p><strong>Publicly available intelligence<\/strong> is widely used by law enforcement agencies to <strong>gather evidence and track criminal activities<\/strong>. In cybersecurity, it helps trace attack origins, identify perpetrators, and support legal actions against cybercriminals.<\/p>\n<h3>10. Managing Supply Chain Risks<\/h3>\n<p>Monitoring the supply chain for vulnerabilities or threats is another critical application. <strong>Identifying risks associated with third-party vendors or partners<\/strong> helps protect the organization from potential exploits.<\/p>\n<hr>\n<h2 id=\"what_criminalip_do\">What Criminal IP Can Do?<\/h2>\n<p>Now, back to <strong>Criminal IP<\/strong>, the OSINT search engine. Criminal IP offers powerful tools for exploring vulnerabilities and tracking all types of devices connected to the internet, including IP addresses, domains, IoT devices, and industrial control systems (ICS).<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/asset-search.jpg\" alt=\"Criminal IP Asset Search results displaying security scores and vulnerabilities\"><\/figure>\n<div class=\"sue-icon-text su-image-caption\" data-url=\"\" data-target=\"self\" style=\"min-height:34px;padding-left:36px;color:#333333\">\n<div class=\"sue-icon-text-icon\" style=\"color:#333333;font-size:24px;width:24px;height:24px\"><i class=\"sui sui-photo\" style=\"font-size:24px;color:#333333\"><\/i><\/div>\n<div class=\"sue-icon-text-content su-u-trim\" style=\"color:#333333\">Recent scan results from Criminal IP\u2019s Asset Search function highlight security scores, vulnerabilities, and related issues for various IP addresses, along with their countries.<\/div>\n<div style=\"clear:both;height:0\"><\/div>\n<\/div>\n<p>Here\u2019s a quick look at what they all do:<\/p>\n<h3>Search Functions:<\/h3>\n<table>\n<tr>\n<td width=\"15%\"><strong>Asset Search<\/strong><\/td>\n<td>Provides risk scoring, linked asset information, abuse history, and associated vulnerability information to determine the threat of a searched IP address. Alternatively, you can search directly for the service name with a keyword, or search for the CVE number to find the associated IP address.<\/td>\n<\/tr>\n<tr>\n<td><strong>Domain Search<\/strong><\/td>\n<td>Scans domain information in real-time to provide information, including whether it is a phishing link, malicious link, and certificate validity, along with risk scoring.<\/td>\n<\/tr>\n<tr>\n<td><strong>Image Search<\/strong><\/td>\n<td>Provides image information for assets vulnerable to cyber threats when searched under various conditions such as RDP, Phishing, Webcam, VNC, and RTSP.<\/td>\n<\/tr>\n<tr>\n<td><strong>Exploit Search<\/strong><\/td>\n<td>Analyzes common vulnerabilities and exposures (CVE) and provides detailed information, including actual hijacking codes, per service.<\/td>\n<\/tr>\n<\/table>\n<h3>Intelligence Features:<\/h3>\n<table>\n<tr>\n<td width=\"15%\"><strong>Banner Explorer<\/strong><\/td>\n<td>Provides categorized threat intelligence on products and services such as cryptocurrency, databases, and IoT devices.<\/td>\n<\/tr>\n<tr>\n<td><strong>Vulnerability Intelligence<\/strong><\/td>\n<td>Offers details on exposed vulnerabilities, categorized by CVE ID and product name, aiding in proactive monitoring and management.<\/td>\n<\/tr>\n<tr>\n<td><strong>Statistics<\/strong><\/td>\n<td>Provides statistical graphs of VPN, Proxy, Tor, scanner, and malicious IPs over the past 7 days, visualizing the status of suspicious anonymous IPs and offering sample data.<\/td>\n<\/tr>\n<tr>\n<td><strong>Element Analysis<\/strong><\/td>\n<td>When performing a keyword search, filters can be applied for country, service, ASN, product name, port number, and favicon hash, allowing you to view statistics for each category.<\/td>\n<\/tr>\n<tr>\n<td><strong>Maps<\/strong><\/td>\n<td>Visualizes data geographically, showing the locations of IPs, domains, or assets, helping to assess the scope of potential attacks.<\/td>\n<\/tr>\n<\/table>\n<hr>\n<h2>Using Criminal IP in Real-World Scenarios<\/h2>\n<p>Criminal IP is a tool that you can access <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.criminalip.io\/developer\/api\/post-user-me\">through its API<\/a> to gather <strong>threat intelligence<\/strong> on any device, server, or domain connected to the internet. It is useful in various areas of cybersecurity, such as managing attack surfaces, penetration testing, vulnerability and malware analysis, as well as investigation and research.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-API.jpg\" alt=\"Criminal IP API displaying data in JSON format\"><\/figure>\n<div class=\"sue-icon-text su-image-caption\" data-url=\"\" data-target=\"self\" style=\"min-height:34px;padding-left:36px;color:#333333\">\n<div class=\"sue-icon-text-icon\" style=\"color:#333333;font-size:24px;width:24px;height:24px\"><i class=\"sui sui-photo\" style=\"font-size:24px;color:#333333\"><\/i><\/div>\n<div class=\"sue-icon-text-content su-u-trim\" style=\"color:#333333\">The GET request pulls IP details from Criminal IP\u2019s API, displaying its risk score, geolocation, and ISP in a JSON format.<\/div>\n<div style=\"clear:both;height:0\"><\/div>\n<\/div>\n<p>For example, when a new vulnerability or ransomware is discovered, <strong>Criminal IP helps you determine how many PCs or servers are at risk or already infected<\/strong>. You can also check if the IP addresses or domains you are using are vulnerable.<\/p>\n<p>Additionally, Criminal IP scans for <strong>malicious and phishing URLs<\/strong> generated by hackers in real time, allowing you to analyze threats without needing to interact with them directly.<\/p>\n<h3>How the API Works<\/h3>\n<p>The Criminal IP API makes it easy to integrate these capabilities into your own systems. By using an API key for authentication, you can access various endpoints to analyze IP addresses, domains, and URLs for potential threats. These endpoints provide key information like risk scores, geolocation, and a history of malicious activities, all returned in JSON format for smooth integration.<\/p>\n<p>The API uses simple HTTP requests and allows you to automate threat detection, helping you stay on top of cybersecurity risks.<\/p>\n<p>To learn more about integrating Criminal IP\u2019s API, check out their <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.criminalip.io\/developer\/github-reference\">GitHub Reference page<\/a> or their <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.criminalip.io\/developer\/best-practice\">Best Practice page<\/a>.<\/p>\n<hr>\n<h2>Criminal IP\u2019s Pricing<\/h2>\n<p>Last but not least, let\u2019s take a look at the plans Criminal IP offers and how much they cost:<\/p>\n<ul>\n<li><strong>Free:<\/strong> Get up to 50 IP lookups and 100 search query results per month.<\/li>\n<li><strong>Lite:<\/strong> S$85\/month, offering 100,000 IP lookups and 1,000,000 search query results.<\/li>\n<li><strong>Medium:<\/strong> S$454\/month, providing 1,000,000 IP lookups and 20,000,000 search query results.<\/li>\n<li><strong>Pro:<\/strong> S$1,416\/month, with unlimited IP lookups and search query results, plus premium support.<\/li>\n<\/ul>\n<p>For more details, check out <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.criminalip.io\/pricing\">the pricing page<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data safe has never been more important. In this article, we\u2019re going to explore how Criminal IP, an OSINT search engine, can help you stay one step ahead of cybercriminals. We\u2019ll explain&hellip;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398],"tags":[4105,4605],"topic":[],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Utilizing Criminal IP for Cyber Threat Hunting - Hongkiat<\/title>\n<meta name=\"description\" content=\"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utilizing Criminal IP for Cyber Threat Hunting\" \/>\n<meta property=\"og:description\" content=\"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-13T10:00:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg\" \/>\n<meta name=\"author\" content=\"Hongkiat.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hongkiat.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/\"},\"author\":{\"name\":\"Hongkiat.com\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\"},\"headline\":\"Utilizing Criminal IP for Cyber Threat Hunting\",\"datePublished\":\"2024-09-13T10:00:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/\"},\"wordCount\":1455,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/criminal-ip-homepage.jpg\",\"keywords\":[\"bc\",\"Internet Security and Privacy\"],\"articleSection\":[\"Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/\",\"name\":\"Utilizing Criminal IP for Cyber Threat Hunting - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/criminal-ip-homepage.jpg\",\"datePublished\":\"2024-09-13T10:00:38+00:00\",\"description\":\"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/criminal-ip-homepage.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/criminal-ip-homepage.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/criminal-ip-osint-cybersecurity-threat-detection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Utilizing Criminal IP for Cyber Threat Hunting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/7cc686597d92f9086729e4bcc1577ba3\",\"name\":\"Hongkiat.com\",\"description\":\"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).\",\"sameAs\":[\"https:\\\/\\\/www.hongkiat.com\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Utilizing Criminal IP for Cyber Threat Hunting - Hongkiat","description":"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/","og_locale":"en_US","og_type":"article","og_title":"Utilizing Criminal IP for Cyber Threat Hunting","og_description":"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data","og_url":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2024-09-13T10:00:38+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg","type":"","width":"","height":""}],"author":"Hongkiat.com","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Hongkiat.com","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/"},"author":{"name":"Hongkiat.com","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3"},"headline":"Utilizing Criminal IP for Cyber Threat Hunting","datePublished":"2024-09-13T10:00:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/"},"wordCount":1455,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg","keywords":["bc","Internet Security and Privacy"],"articleSection":["Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/","url":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/","name":"Utilizing Criminal IP for Cyber Threat Hunting - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg","datePublished":"2024-09-13T10:00:38+00:00","description":"Are you ready to protect your digital world from the growing dangers online? With cyber threats becoming more sophisticated every day, keeping your data","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/criminal-ip-osint-cybersecurity-threat-detection\/criminal-ip-homepage.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/criminal-ip-osint-cybersecurity-threat-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Utilizing Criminal IP for Cyber Threat Hunting"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/7cc686597d92f9086729e4bcc1577ba3","name":"Hongkiat.com","description":"This post is published by an HKDC (hongkiat.com) staff. (I.e., intern, staff writer, or editor).","sameAs":["https:\/\/www.hongkiat.com"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/com\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-iXl","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/72871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=72871"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/72871\/revisions"}],"predecessor-version":[{"id":72875,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/72871\/revisions\/72875"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=72871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=72871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=72871"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=72871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}