Skip to content
bs-bd-intro
Real-Time Statistics

Phishing Insights Center

At Bolster, we leverage data from our CheckPhish phishing community of security researchers worldwide to provide valuable insights into the ever-evolving threat landscape of phishing and scam attacks. By analyzing billions of data points collected from thousands of active security researchers, we equip organizations with knowledge to understand the state of phishing.

Phishing Insights Center
Crowdsourced Intelligence

Daily Phishing Highlights

We collect a vast amount of data, including the total number of scans conducted daily, the number of total users, and the active organizations within our research community. These statistics help us gauge the scale and impact of phishing attacks worldwide and how the security community is responding.

Search

Total Scans Daily

3491864
User

Total CheckPhish Users

36319
People

Total CheckPhish Organizations

6097
Last scan updated on 2025/02/19 17:00:00
Uncover Phishing Campaigns

In-Depth Phishing and Scam Analysis

In addition to the phishing highlights, our analysis dives deeper into the specific characteristics of these scans of phishing attacks. We review and report on various aspects, including :

Count

Total Phishing and Scam Counts

Quantifying the number of detected phishing attempts and scams provides a clear picture of the prevalent threats faced by businesses and individuals.

Phish

808698

Scam

167325

Total Count

976023
Last scan updated on 2025/02/16 23:59:59
Cloud
Top Hosting Providers

Identifying hosting providers that unknowingly host phishing websites aids in collaboration between security teams and hosting providers to combat malicious activities.

Clipboard
Top Registrars

Tracking the registrars associated with phishing attacks aids in detecting and shutting down illicit domains more effectively.

Route
Top Countries of Origin

Understanding the countries where phishing campaigns originate provides vital insight into the geographic distribution of threats.

Global
Top-Level Domains (TLDs) Used

Recognizing the TLDs that are frequently abused by phishers helps identify potential sources of fraudulent activity.

Global
Categories

Identifying the top categories that attacker leverage for phishing and scam campaigns can help organizations be more alert about the risk to their industry.

1.
streaming
363513
2.
gambling
140501
3.
tech_support
36451
4.
online_store
30219
5.
sensitive_data
21592
6.
captcha
17391
7.
error_page
15900
8.
crypto
11787
9.
banking
4706
10.
app_store
4440
11.
domain_parking
2344
12.
adult
737
13.
gift_card
672
14.
promo_code
476
15.
drug
402
16.
domain_purchase
241
17.
directory_listing
150
18.
url_shortener
134
19.
crypto_giveaway
64
20.
paste_site
39
21.
social_media
10
Top IP Addresses

Analyzing IP addresses associated with phishing attacks assists in identifying potential sources of malicious activity and blocking them proactively.

185.199.111.153
97714
185.199.110.153
97344
185.199.108.153
97228
185.199.109.153
97213
172.64.151.8
17366
104.18.36.248
17334
52.127.34.96
11882
172.93.121.126
9488
199.36.158.100
9110
45.67.214.6
8979
104.21.112.1
8055
104.21.48.1
8045
104.21.96.1
8036
104.21.64.1
8022
104.21.32.1
7969
104.21.16.1
7965
104.21.80.1
7913
91.224.59.25
7838
104.26.3.211
6700
172.67.71.226
6678
104.26.2.211
6610
185.221.216.102
6531
91.224.59.26
6438
40.70.147.4
5787
213.165.250.72
4543
45.67.214.8
3687
13.68.101.62
3451
172.93.120.103
2544
162.159.140.237
2436
172.67.7.136
2363
104.22.13.84
2357
104.22.12.84
2354
172.66.0.235
2256
13.107.253.70
1962
104.26.8.50
1905
172.67.74.207
1874
103.42.58.102
1836
104.26.9.50
1823
92.204.134.202
1590
172.67.75.205
1531
104.26.5.241
1510
104.26.4.241
1501
23.194.185.37
1424
64.29.17.65
1411
64.29.17.129
1389
216.198.79.193
1387
64.29.17.193
1370
216.198.79.65
1370
216.198.79.1
1364
216.198.79.129
1350
64.29.17.1
1338
172.67.199.250
1297
Toolkit Analysis

Phishing Kit Metrics

In our continuous efforts to combat phishing, we closely monitor and assess phishing kits that are part of these phishing campaigns. These numbers provide important insights into the tools and techniques employed by hackers. Our analysis covers factors such as:

Search

Total Phishing Kits

Quantifying the number of phishing kits discovered allows us to gauge the proliferation of these malicious resources.

Email

Unique Drop Emails

Identifying the unique drop email addresses used for phishing attacks helps in tracking the infrastructure utilized by bad actors. A “drop email” refers to the email address that is used to collect users’ secret credentials from phishing websites.

Global Search

Domains with Victim Emails

Recognizing the domains where victim emails are being sent aids in the identification and mitigation of ongoing campaigns.

Protect Your Organization

Stop Phishing Campaigns From Targeting You

By comprehensively analyzing these scans of phishing campaigns, we gain a deeper understanding of the latest techniques and trends of hackers. This knowledge enables us to develop effective risk mitigation and phishing countermeasures to help organizations protect themselves from the growing threat of phishing and scam attacks.

Need to take down phishing and scam sites and contents?
AI Security for Email One-Pager
AI Security for Email One-Pager

Bolster’s AI Security for Email: The Protection Your Need in One Page

bs-2024-election-report
2024 Presidential Election Report

Discover the latest phishing and online scams threatening the democratic process

2024 Mid-Year Phishing Report

Protect Your Business from Evolving Phishing and Election Scams

bs-stop-the-steal
Master BEC Defense

Protect Your Business from BEC Scams with Our Latest Whitepaper

Dark Web for Dummies E-Book

Unlock the Secrets of the Dark Web with Our Latest E-book

Domain Risk Report

Want Visibility into Your Domain Threats? Get Your Free Domain Risk Report Now!