Home FS TI


IP Anonymization Feed

FS TI — a software product that contains a list of IP addresses for monitoring incoming or outgoing traffic on the network

It consists of separate streams of IP data:

  • Anonymous IP addresses (data collected from VPNs, Proxy servers and TORs)
  • Data from frequently used hosting ASNs

FS TI is used to detect and prevent intrusions. The product allows you to identify anomalies in network traffic and application traffic. It can be used as a stand-alone solution or be integrated into SIEM / SOAR and other integrated information security solutions


In an attempt to circumvent network traffic monitoring systems, cybercriminals often hide their IP addresses when committing fraudulent and hacking activities, using virtual private networks (VPNs) and Internet proxies. Attackers use both public VPN and proxy services, and restricted services in the so-called DarkNet. Traffic analysis of TOR and other services will help identify criminals

FS TI contains information about VPN, proxy services, shock-resistant hosting, IP-addresses that are used for:

  • anonymization in fraudulent financial transactions with accounts
  • APT attacks on corporate networks
  • fraudulent login attempts on compromised accounts
  • other cyberattacks that bypass the intrusion detection system

Want to know more?

Get a consultation


The implementation of FS TI in SIEM / Firewall enables corporate networks to monitor traffic and decide whether to block or mark incoming and outgoing connections to IP addresses. This makes it possible to avoid and assess the risk of transactions made by customers who connect from these IP addresses




More than 30 million IP addresses are monitored, daily issuance of more than 300,000 active IPs with a high probability of attacks. Information is updated daily, while in the cyber community it appears in 2-6 weeks



An additional proactive tool for in-depth traffic analysis, data based decision making and incident prevention



FS TI data is available via feed in TXT, STIX, JSON formats, which can be downloaded via the API. Assistance in integration into SIEM, SOAR, Firewall systems, as well as other security systems

Related products and services


Simulator of sending phishing emails in order to understand the probability of a successful phishing attack on the company and plan activities to increase the level of education of employees to counter phishing attacks

• Integration within the corporate network
• Development of phishing pages for your requirements
• User texts in emails
• Setting up the system for a mail server



WEB-solution that helps to verify employees and contractors on data from open and closed sources, as well as with Big Data FS Group

You get access to unique data, make it easier for employees of different departments, for example:

• purchasers
• HR
• compliance officers
• lawyers
• financiers

and among other things - you get a centralization and a single point of entry of data, which can work with different departments of the organization



Package of services for investigation, analysis and investigation of information security incidents

The minimum package includes:
• consulting with experts
• investigation of the IS incident
• comprehensive forensic examination of digital evidence
• reports on individuals / legal entities from open and closed sources
• a monthly newsletter with information about vulnerabilities actively used by hackers and recommendations for increasing the level of protection
• penetration testing
• scanning web applications and resources



Software product for detecting compromised accounts of the organization in open and closed sources

Thanks to FS MNG you can:

• identify compromised accounts, including when compromising third party resources
• prevent data leakage
• protect against the use of compromised passwords
• be informed about the leaks before it is widely covered in the media


Like many other companies, FSG uses cookie technology on its websites to improve your user experience, as well as for the correct operation of the website.

If you agree to the use of all cookies on this site, click the Ok button. To learn more about cookie technology, its benefits and how FSG uses it, check out our Privacy Policy.