🍬 CandycornDB

A comprehensive IP intelligence database providing detailed fraud scores, network analysis, and threat intelligence for high-risk IP addresses.

Explore Features

Threat Intelligence

Access data on high-risk IP addresses from known malicious sources and bulletproof hosting providers.

Tor Exit Nodes

Identify and monitor Tor exit nodes to help protect your network from anonymous traffic.

Fraud Scoring

Advanced fraud score calculation based on multiple risk factors including network behavior and hosting patterns.

Network Analysis

Identify related IPs and network clusters to detect coordinated malicious activities.

Advanced Fraud Scoring System

Our sophisticated fraud scoring system analyzes multiple risk factors to provide accurate threat assessment.

High Risk (70-100)

IPs with high fraud scores are likely to be associated with malicious activities such as Tor exit nodes, known proxy services, or bulletproof hosting providers.

Medium Risk (30-69)

IPs with medium fraud scores may be associated with VPNs, cloud services, or hosting providers with mixed reputations.

Low Risk (0-29)

IPs with low fraud scores are typically legitimate residential or business connections with no known malicious activity.

Our fraud scoring considers factors such as ASN reputation, country risk, network behavior, port scanning results, and hostname analysis.

Network Relationship Analysis

Identify related IPs and network clusters to detect coordinated malicious activities.

Network Analysis Features

  • Subnet Analysis: Identify IPs operating in the same network ranges
  • ASN Clustering: Group IPs by their Autonomous System Numbers
  • Behavioral Patterns: Detect IPs showing similar suspicious activities
  • Risk Propagation: Assess risk based on network relationships

Our system analyzes relationships between IPs based on subnet, ASN, and behavioral patterns to identify malicious networks.

Our Data Sources

CandycornDB collects IP intelligence from multiple high-quality sources to provide comprehensive threat data.

Tor Exit Nodes

We continuously monitor and collect all active Tor exit nodes to help you identify anonymous traffic that might be attempting to access your services.

High-Risk ASNs

Our database includes IP addresses from known high-risk Autonomous System Numbers (ASNs) associated with bulletproof hosting and malicious activities.

Geographic Hotspots

We track IP addresses from geographic regions known for hosting malicious infrastructure and cyber threats.

Proxy & VPN Detection

We identify and track IP addresses associated with proxy services, VPNs, and anonymizing networks that may be used to hide malicious activity.

Powerful API Access

Access our comprehensive IP intelligence database through our easy-to-use API.

curl -X GET 'https://candycorndb.com/api/public/data?page=1&limit=10' \
  -H 'X-API-Key: your_api_key_here'

Need to check an IP's fraud score and network relationships?

curl -X GET 'https://candycorndb.com/api/public/data/network/1.2.3.4' \
  -H 'X-API-Key: your_api_key_here'

Need to integrate CandycornDB into your application?

View API Documentation