About the research
Where does the data come from?
We hand-pick the best security researchers, threat hunters and developers from across the globe. This team analyzes huge volumes of data that are shared with us by organizations who want to contribute to making the internet a safer place. Through sensors on their networks, data that doesn't contain personally identifiable information, is collected and shared with our research team.
Types of data sharing organizations:
Independent Threat Hunters
Hosting Providers
Email Service Providers
Law Enforcement
In-house Spamtraps
Enterprise Businesses
How do we analyze the data?
Machine Learning
Heuristics
Manual Investigation
Spamhaus data principles
Reliable
Robust data collection and rigorous expert analysis.
Actionable
Data and signal for investigation, detection and protection.
Timely
Real-time investigation and threat detection 24/7.
How much data do we analyze in 24 hours?
280,000,000Track 280 million domains
22,000Process 22,000 malware samples
7,500,000,000Analyze 7.5 billion SMTP connections
650,000New detections relating to exploited IPs
4,500,000,000Protect 4.5 billion mailboxes
Want to share data with Spamhaus?
Organizations who want to share large volumes of data, contact our data sharing team.
Contact UsWant to share threat intelligence with Spamhaus?
Small organizations and individuals who want to share suspicious or malicious activity, visit the Threat Intel Community.
Share Now