Home FS TI

FS TI

IP Anonymization Feed

FS TI is a unique software product that contains a feed of anonymized IP addresses in the TOR, PROXY & VPN categories, that were sold in the public space or DarkNet. FS TI allows you to identify anomalies in network traffic, application traffic and can be used in various ways.

The product consists of selected streams of IP addresses data:

  • Anonymized  IP addresses (collected data from VPNs, Proxy servers and TORs);
  • ASN hosting data that is used frequently.

FS TI can be integrated into a cybersecurity intrusion detection and prevention system. The product allows you to identify anomalies in network traffic and application traffic. FS TI can be used as a stand-alone solution, as well as integrated into SIEM/SOAR and into other information security solutions.

Cybercriminals often hide their IP addresses in an attempt to circumvent network traffic monitoring systems. In order to commit fraudulent and hacking activities, they use virtual private networks (VPNs) or Internet proxies and use public VPNs and proxy services, as well as services with limited access to DarkNet. Traffic analysis of TOR and other services will assist in identifying criminals.

FS TI contains information about VPNs, proxy services, hosting services where you can place any content (shockproof), IP addresses that are used to:

  • anonymization in fraudulent financial transactions with accounts;
  • ART attacks on corporate networks;
  • fraudulent login attempts through compromised accounts;
  • other cyberattacks that bypass the traffic monitoring system.
Want to know more?

Get a consultation
Why do companies choose FS TI

The implementation of FS TI in SIEM/Firewall enables corporate networks to monitor traffic and decide whether to block or mark incoming and outgoing connections to IP addresses. This avoids cyber incidents and assesses the risks of unauthorized connections by people who use such IP addresses.

Why does FS TI prevail over analogues
Topicality
Topicality

The product database lists not only IOCs, i.e. IP addresses from which cyberattacks have already been carried out, but also IP addresses with a dubious reputation that could potentially be used for criminal activities. Daily issuance of more than 300,000 active IPs with a high probability of attacks, while the rest of the companies such information appears in 2-6 weeks.

Proactivity
Proactivity

FS TI allows users to perform in-depth traffic analysis, make decisions based on the data obtained, and prevent possible incidents.

Integration
Integration

Users can download reports from FS TI in TXT, JSON formats. The product is integrated into SIEM, SOAR, Firewall systems, as well as into other security systems.

Related products and services
FS PHISHING

FS PHISHING includes:

• Integration within the corporate network.
FS PHISHING provides large companies that don’t want to transfer employee information to cloud solutions with full operational autonomy. 
• Customized development of phishing pages according to your requirements.
Flexible configuration of the system to the company's resources to make phishing attacks more realistic.
• Development of writing texts based on the clients’ needs.
The product allows users to create universal phishing emails according to their requirements. The system does not limit the type of letters.
• Configuring the system for your mail server.
We integrate the product and set up the interaction with the corporate mail servers for maximum efficiency of the system.

More
FS OSINT LAB

WEB-solution that helps to verify employees and contractors on data from open and closed sources, as well as with Big Data FS Group

You get access to unique data, make it easier for employees of different departments, for example:

• Procurement specialists
• HR specialists
• Compliance specialists
• Lawyers
• Financiers

In addition, the advantage of OSINT LAB is a user-friendly interface that centrally collects and displays all requested data.

More
FS IRT

Package of services for investigation, analysis, and investigation of information security incidents

The basic package includes:
• consulting with experts
• investigation of the IS incident
• comprehensive forensic examination of digital evidence
• reports on individuals / legal entities from open and closed sources
• a monthly newsletter with information about vulnerabilities actively used by hackers and recommendations for increasing the level of protection
• penetration testing
• scanning web applications and resources

More
FS MNG

Software product for detecting compromised accounts of the organization in open and closed sources

Thanks to FS MNG you can:

• identify compromised accounts, including when compromising third party resources
• prevent data leakage
• protect against the use of compromised passwords
• be informed about the leaks before it is widely covered in the media

More

Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.