Blog

Why and How to Leverage ASN data?

Why and How to Leverage ASN data?

An Autonomous Systems Number (ASN) is a unique number assigned to an Autonomous System (AS). ASN data is stored by Regional Internet Registries (RIRs). Usually, this data is used to look up where to route traffic to the correct network, for instance with the BGP protocol. However, ASN data also provides valuable information that is used to identify the organization controlling a set of IP addresses…

Read More

How to Detect Tor Users with Ease?

How to Detect Tor Users with Ease?

The Onion Routing (Tor) is an open-source solution to enable anonymous communications. For instance, you can use it to anonymize your Internet traffic. Many journalists and political activists use Tor to avoid being prosecuted. Unfortunately, anonymity also means Tor is used for illicit activities. Here we discuss how the Tor network behaves, how Tor users can be detected, and when it makes sense to filter Tor activities…

Read More

How to Prevent Carding Attacks?

How to Prevent Carding Attacks?

According to The Nilson Report, the total global card loss will exceed $35 billion by the end of the year. As the number of cardholders increases, so does the amount lost to fraudulent transactions. In 2019, for every $100 sale, almost $7 was lost to fraud. The losses stemmed from different card-related frauds including counterfeiting, Card-Not-Present (CNP) transactions, but also lost or stolen cards…

Read More