Skip to content
bs-bd-intro
Real-Time Statistics

Phishing Insights Center

At Bolster, we leverage data from our CheckPhish phishing community of security researchers worldwide to provide valuable insights into the ever-evolving threat landscape of phishing and scam attacks. By analyzing billions of data points collected from thousands of active security researchers, we equip organizations with knowledge to understand the state of phishing.

Phishing Insights Center
Crowdsourced Intelligence

Daily Phishing Highlights

We collect a vast amount of data, including the total number of scans conducted daily, the number of total users, and the active organizations within our research community. These statistics help us gauge the scale and impact of phishing attacks worldwide and how the security community is responding.

Search

Total Scans Daily

2974297
User

Total CheckPhish Users

29489
People

Total CheckPhish Organizations

5145
Last scan updated on 2024/06/15 09:00:00
Uncover Phishing Campaigns

In-Depth Phishing and Scam Analysis

In addition to the phishing highlights, our analysis dives deeper into the specific characteristics of these scans of phishing attacks. We review and report on various aspects, including :

Count

Total Phishing and Scam Counts

Quantifying the number of detected phishing attempts and scams provides a clear picture of the prevalent threats faced by businesses and individuals.

Phish

135967

Scam

37822

Total Count

173789
Last scan updated on 2024/06/09 23:59:59
Cloud
Top Hosting Providers

Identifying hosting providers that unknowingly host phishing websites aids in collaboration between security teams and hosting providers to combat malicious activities.

Clipboard
Top Registrars

Tracking the registrars associated with phishing attacks aids in detecting and shutting down illicit domains more effectively.

Route
Top Countries of Origin

Understanding the countries where phishing campaigns originate provides vital insight into the geographic distribution of threats.

Global
Top-Level Domains (TLDs) Used

Recognizing the TLDs that are frequently abused by phishers helps identify potential sources of fraudulent activity.

Global
Categories

Identifying the top categories that attacker leverage for phishing and scam campaigns can help organizations be more alert about the risk to their industry.

1.
sensitive_data
53851
2.
streaming
7241
3.
gambling
6708
4.
app_store
6197
5.
online_store
2315
6.
crypto
1959
7.
banking
1350
8.
gift_card
723
9.
tech_support
575
10.
error_page
301
11.
url_shortener
179
12.
crypto_giveaway
117
13.
adult
54
14.
bec
36
15.
directory_listing
23
16.
domain_parking
20
17.
social_media
19
18.
gaming
17
19.
warning
5
20.
promo_code
1
Top IP Addresses

Analyzing IP addresses associated with phishing attacks assists in identifying potential sources of malicious activity and blocking them proactively.

62.204.41.204
35365
172.93.120.138
3957
74.115.51.8
3276
74.115.51.9
3266
172.93.120.161
2940
172.67.152.32
2711
104.21.64.150
2683
172.64.147.209
2637
104.18.40.47
2561
185.178.208.188
2197
185.199.108.153
1943
185.199.109.153
1925
104.17.64.14
1921
185.199.111.153
1915
185.199.110.153
1889
104.17.96.13
1879
104.18.2.35
1775
104.18.3.35
1715
209.94.90.1
1700
172.93.120.11
1686
172.93.121.7
1577
103.161.132.8
1401
104.21.47.234
1108
13.107.246.70
1104
172.67.174.122
1035
199.36.158.100
1012
172.93.120.13
881
185.178.208.137
804
52.9.166.110
712
185.178.208.187
711
50.18.142.31
680
13.57.148.141
673
185.215.113.14
666
50.18.215.94
665
103.83.194.14
623
192.185.166.201
578
76.76.21.61
564
76.76.21.142
556
76.76.21.241
554
76.76.21.164
528
76.76.21.93
525
76.76.21.9
525
76.76.21.22
521
76.76.21.123
519
76.76.21.98
483
192.185.198.44
472
209.94.90.2
471
209.94.90.3
439
104.21.84.94
409
13.107.253.70
405
172.67.190.231
401
142.251.33.97
364
Toolkit Analysis

Phishing Kit Metrics

In our continuous efforts to combat phishing, we closely monitor and assess phishing kits that are part of these phishing campaigns. These numbers provide important insights into the tools and techniques employed by hackers. Our analysis covers factors such as:

Search

Total Phishing Kits

Quantifying the number of phishing kits discovered allows us to gauge the proliferation of these malicious resources.

Email

Unique Drop Emails

Identifying the unique drop email addresses used for phishing attacks helps in tracking the infrastructure utilized by bad actors. A “drop email” refers to the email address that is used to collect users’ secret credentials from phishing websites.

Global Search

Domains with Victim Emails

Recognizing the domains where victim emails are being sent aids in the identification and mitigation of ongoing campaigns.

Protect Your Organization

Stop Phishing Campaigns From Targeting You

By comprehensively analyzing these scans of phishing campaigns, we gain a deeper understanding of the latest techniques and trends of hackers. This knowledge enables us to develop effective risk mitigation and phishing countermeasures to help organizations protect themselves from the growing threat of phishing and scam attacks.

Need to take down phishing and scam sites and contents?
Dark Web for Dummies E-Book

Unlock the Secrets of the Dark Web with Our Latest E-book

LLMs Whitepaper
New Whitepaper

Protect Your Business From Multi-Channel Attacks Using AI Technology

Upcoming Webinar

Learn How to Identify Executive Impersonation Scams Early and Quickly Take them Down

Domain Risk Report

Want Visibility into Your Domain Threats? Get Your Free Domain Risk Report Now!