Ratings and Reviews 1 Rating
Ratings and Reviews 12 Ratings
What is ZoomEye?
ZoomEye emerges as a key player in the landscape of global cyberspace mapping, recognized as China's first internationally acknowledged cyberspace search engine, engineered by the 404 Laboratory of Knownsec. This esteemed search engine leverages a vast array of global surveying and mapping nodes to perpetually scan the IPv4 and IPv6 address databases, as well as website domain names, enabling it to effectively identify an array of service ports and protocols on a continuous basis, thereby generating detailed maps of both expansive and targeted cyberspaces. Over time, through relentless innovation, ZoomEye has developed a distinct core search engine that not only excels in cyberspace surveying and mapping but also accumulates valuable data for trend analysis, all while dynamically visualizing cyberspace across different temporal and spatial dimensions. Our unwavering dedication to preserving ZoomEye's reputation as a top-tier search engine in this domain compels us to pursue ongoing innovation and enhancement of our capabilities, underscoring our commitment to leading the way in this essential sector. As we progress, we look forward to discovering new opportunities that will further expand and enrich our offerings to users. The future holds promising potential for advancing our technology and services even further.
What is Criminal IP?
Criminal IP functions as a cyber threat intelligence search engine designed to identify real-time vulnerabilities in both personal and corporate digital assets, enabling users to engage in proactive measures. The concept behind this platform is that by acquiring insights into potentially harmful IP addresses beforehand, individuals and organizations can significantly enhance their cybersecurity posture. With a vast database exceeding 4.2 billion IP addresses, Criminal IP offers crucial information related to malicious entities, including harmful IP addresses, phishing sites, malicious links, certificates, industrial control systems, IoT devices, servers, and CCTVs. Through its four primary features—Asset Search, Domain Search, Exploit Search, and Image Search—users can effectively assess risk scores and vulnerabilities linked to specific IP addresses and domains, analyze weaknesses for various services, and identify assets vulnerable to cyber threats in visual formats. By utilizing these tools, organizations can better understand their exposure to cyber risks and take necessary actions to safeguard their information.
Integrations Supported
Android
Chrome OS
Elasticsearch
FortiSOAR
Google Cloud Platform
Hybrid Analysis
Jira
Kibana
Logstash
Maltego
Integrations Supported
Android
Chrome OS
Elasticsearch
FortiSOAR
Google Cloud Platform
Hybrid Analysis
Jira
Kibana
Logstash
Maltego
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$0/month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
ZoomEye
Company Website
www.zoomeye.org
Company Facts
Organization Name
AI SPERA
Date Founded
2017
Company Location
South Korea
Company Website
criminalip.io
Categories and Features
IoT
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
Categories and Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting