See it in action
Try ipdex with real threat intelligence data — no setup needed.
Getting Started
ipdex requires a free CrowdSec API key to run lookups. Get yours here →
Paste IPs
Type or paste a list of IPs directly — one per line or extracted from any text. Up to 100,000 IPs per run.
Upload a Log File
Drop any log file directly — ipdex extracts all IPs automatically. Supports auth.log, nginx, apache, syslog, and more.
Batch Mode
Faster parallel processing for large IP lists. Built for high-volume workflows. Requires an Enterprise API key.
Upgrade →Reading Your Report
After running a lookup, the report gives you a global view of all your IPs before you drill into individual results.
Reputation Breakdown
Every IP is assigned one of six reputation values. The breakdown bar at the top of your report shows the distribution at a glance.
Insights Panel
Six counters that let you triage at scale before looking at individual IPs.
The Map
Geographic distribution of your IPs plotted on a world map, colored by reputation. Clustering indicates regional activity patterns, but geography alone is a weak signal — always look at behaviors and classifications before drawing conclusions.
Background Noise
Not all malicious IPs carry the same operational weight. Background noise tells you whether the activity is targeted or automated mass-scanning.
Mass automated scanner hitting thousands of random targets per day. Block at the firewall — low investigation priority.
Targeted, deliberate behavior. This IP is choosing its targets. Act immediately and investigate the full profile.
Filtering & Export
Filter results by reputation pill or search by IP to narrow down large reports. You can also click on any badge in the results — blocklists, CVEs, classifications, behaviors, AS, or country — to instantly filter the table to IPs sharing that value.
Export your full results as CSV, JSON, PDF, or HTML for sharing or integration with your SIEM or incident management workflow.
Investigating One IP
Click any IP in the results table to open its full intelligence profile. Here’s what each field means.
Reputation & Confidence
The reputation value is paired with a confidence level that reflects how reliable the underlying data is.
Scores
Four dimensions scored from 0 to 5, each measured across four time windows: Overall, Last Month, Last Week, and Last Day.
History
First Seen and Last Seen timestamps from the CrowdSec network.
Behaviors
Attack types observed from this IP. Multiple behaviors on the same IP indicate coordinated, automated tooling.
Classifications
Classifications describe what is known about the entity behind the IP — its role, infrastructure type, or known identity. An IP can carry multiple classifications at once. There are two categories: classifications and false positives (safe classifications).
Classifications open_in_newfull taxonomy
Describe the nature, behavior, or infrastructure profile of the IP.
False Positives (Safe Classifications) open_in_newfull taxonomy
IPs that triggered community detections but are verified as legitimate entities. These should not be blocked.
CVEs
A list of CVE identifiers this IP has been observed exploiting or actively scanning for.
Blocklists
The CrowdSec Blocklists this IP appears on. Each blocklist targets a specific threat category — botnets, bruteforcers, HTTP attackers, and more. An IP can appear on multiple lists when different detection scenarios independently flag the same behavior. Note that blocklist data is not real-time; entries reflect confirmed activity at the time of ingestion.
open_in_newExplore CrowdSec BlocklistsTarget Countries
The top countries this IP has been seen attacking, with percentage breakdowns. A high percentage targeting your country increases the relevance of this IP to your organization and warrants closer investigation.
MITRE Techniques
ATT&CK technique identifiers mapped to the observed behavior. Use these to pivot into your SIEM or threat hunting workflow by correlating technique IDs across your alerts.
open_in_newNot familiar with MITRE ATT&CK? Read the framework →Taking Action
Translating ipdex signals into operational decisions.