| Repository | Description |
|---|---|
| asset-exposure-scanner | Extract identifiers from Asset Search results and analyze exposure using confirmed port records |
| threat-validation-pipeline | Validate suspicious IP activity and automate firewall or SOAR response workflows |
To use Criminal IP APIs, you need to create an account and get an API key.
- Sign up / Log in to Criminal IP
- Get your personal API key
- Run the examples provided in this GitHub
- Most examples in this GitHub are designed to work with a Free / Starter plan. Usage limits apply.
👉 You can get your own Criminal IP API key here:
https://search.criminalip.io/mypage/information
- Try Criminal IP APIs through practical, runnable examples
- Analyze IPs and domains using real-world internet data
- Understand how Criminal IP data is used in actual security investigations
- Explore workflows and integration examples based on real use cases
