Skip to content
bs-bd-intro
Real-Time Statistics

Phishing Insights Center

At Bolster, we leverage data from our CheckPhish phishing community of security researchers worldwide to provide valuable insights into the ever-evolving threat landscape of phishing and scam attacks. By analyzing billions of data points collected from thousands of active security researchers, we equip organizations with knowledge to understand the state of phishing.

Phishing Insights Center
Crowdsourced Intelligence

Daily Phishing Highlights

We collect a vast amount of data, including the total number of scans conducted daily, the number of total users, and the active organizations within our research community. These statistics help us gauge the scale and impact of phishing attacks worldwide and how the security community is responding.

Search

Total Scans Daily

3118761
User

Total CheckPhish Users

26588
People

Total CheckPhish Organizations

4703
Last scan updated on 2024/03/04 00:00:00
Uncover Phishing Campaigns

In-Depth Phishing and Scam Analysis

In addition to the phishing highlights, our analysis dives deeper into the specific characteristics of these scans of phishing attacks. We review and report on various aspects, including :

Count

Total Phishing and Scam Counts

Quantifying the number of detected phishing attempts and scams provides a clear picture of the prevalent threats faced by businesses and individuals.

Phish

141646

Scam

27237

Total Count

168883
Last scan updated on 2024/03/03 23:59:59
Cloud
Top Hosting Providers

Identifying hosting providers that unknowingly host phishing websites aids in collaboration between security teams and hosting providers to combat malicious activities.

Clipboard
Top Registrars

Tracking the registrars associated with phishing attacks aids in detecting and shutting down illicit domains more effectively.

Route
Top Countries of Origin

Understanding the countries where phishing campaigns originate provides vital insight into the geographic distribution of threats.

Global
Top-Level Domains (TLDs) Used

Recognizing the TLDs that are frequently abused by phishers helps identify potential sources of fraudulent activity.

Global
Categories

Identifying the top categories that attacker leverage for phishing and scam campaigns can help organizations be more alert about the risk to their industry.

1.
streaming
38304
2.
sensitive_data
28488
3.
gambling
9594
4.
online_store
2452
5.
error_page
1580
6.
crypto
662
7.
banking
639
8.
tech_support
591
9.
gift_card
492
10.
app_store
324
11.
crypto_giveaway
69
12.
url_shortener
62
13.
adult
54
14.
domain_parking
52
15.
gaming
15
16.
directory_listing
10
17.
warning
8
18.
social_media
7
19.
bec
6
20.
survey
5
21.
domain_purchase
3
22.
captcha
3
Top IP Addresses

Analyzing IP addresses associated with phishing attacks assists in identifying potential sources of malicious activity and blocking them proactively.

62.204.41.204
12610
185.199.111.153
11824
185.199.108.153
11780
185.199.109.153
11742
185.199.110.153
11558
13.107.246.70
2400
13.107.213.70
2377
185.178.208.188
2114
104.18.2.35
1717
104.18.3.35
1692
45.128.232.89
1469
45.89.245.28
1061
68.66.228.99
1029
198.44.168.63
899
104.17.64.14
824
66.96.134.29
804
104.17.96.13
794
142.251.211.225
780
69.49.245.198
667
142.250.217.97
637
45.141.156.107
618
172.67.151.195
591
172.217.14.193
586
104.21.88.183
584
199.36.158.100
572
185.178.208.187
558
142.251.33.65
555
172.67.152.163
541
142.250.217.65
534
142.250.69.193
531
52.9.43.57
526
157.230.40.10
517
172.66.44.229
502
142.251.215.225
491
172.66.47.27
490
104.21.88.202
484
172.64.147.209
465
104.18.40.47
452
104.21.73.121
439
162.159.140.60
431
172.67.162.73
424
185.178.208.173
407
76.76.21.142
406
76.76.21.22
405
76.76.21.9
400
76.76.21.164
398
172.66.0.60
397
76.76.21.98
390
76.76.21.123
379
13.107.226.70
364
185.66.140.187
361
76.76.21.93
360
Toolkit Analysis

Phishing Kit Metrics

In our continuous efforts to combat phishing, we closely monitor and assess phishing kits that are part of these phishing campaigns. These numbers provide important insights into the tools and techniques employed by hackers. Our analysis covers factors such as:

Search

Total Phishing Kits

Quantifying the number of phishing kits discovered allows us to gauge the proliferation of these malicious resources.

Email

Unique Drop Emails

Identifying the unique drop email addresses used for phishing attacks helps in tracking the infrastructure utilized by bad actors. A “drop email” refers to the email address that is used to collect users’ secret credentials from phishing websites.

Global Search

Domains with Victim Emails

Recognizing the domains where victim emails are being sent aids in the identification and mitigation of ongoing campaigns.

Protect Your Organization

Stop Phishing Campaigns From Targeting You

By comprehensively analyzing these scans of phishing campaigns, we gain a deeper understanding of the latest techniques and trends of hackers. This knowledge enables us to develop effective risk mitigation and phishing countermeasures to help organizations protect themselves from the growing threat of phishing and scam attacks.

Need to take down phishing and scam sites and contents?