Skip to content
bs-bd-intro
Real-Time Statistics

Phishing Insights Center

At Bolster, we leverage data from our CheckPhish phishing community of security researchers worldwide to provide valuable insights into the ever-evolving threat landscape of phishing and scam attacks. By analyzing billions of data points collected from thousands of active security researchers, we equip organizations with knowledge to understand the state of phishing.

Phishing Insights Center
Crowdsourced Intelligence

Daily Phishing Highlights

We collect a vast amount of data, including the total number of scans conducted daily, the number of total users, and the active organizations within our research community. These statistics help us gauge the scale and impact of phishing attacks worldwide and how the security community is responding.

Search

Total Scans Daily

2990466
User

Total CheckPhish Users

33536
People

Total CheckPhish Organizations

5774
Last scan updated on 2024/11/28 07:00:00
Uncover Phishing Campaigns

In-Depth Phishing and Scam Analysis

In addition to the phishing highlights, our analysis dives deeper into the specific characteristics of these scans of phishing attacks. We review and report on various aspects, including :

Count

Total Phishing and Scam Counts

Quantifying the number of detected phishing attempts and scams provides a clear picture of the prevalent threats faced by businesses and individuals.

Phish

479628

Scam

159306

Total Count

638934
Last scan updated on 2024/11/24 23:59:59
Cloud
Top Hosting Providers

Identifying hosting providers that unknowingly host phishing websites aids in collaboration between security teams and hosting providers to combat malicious activities.

Clipboard
Top Registrars

Tracking the registrars associated with phishing attacks aids in detecting and shutting down illicit domains more effectively.

Route
Top Countries of Origin

Understanding the countries where phishing campaigns originate provides vital insight into the geographic distribution of threats.

Global
Top-Level Domains (TLDs) Used

Recognizing the TLDs that are frequently abused by phishers helps identify potential sources of fraudulent activity.

Global
Categories

Identifying the top categories that attacker leverage for phishing and scam campaigns can help organizations be more alert about the risk to their industry.

1.
gambling
135058
2.
online_store
71283
3.
streaming
52283
4.
sensitive_data
22839
5.
tech_support
15208
6.
captcha
7551
7.
domain_parking
4472
8.
crypto
3635
9.
error_page
3401
10.
promo_code
3252
11.
banking
2098
12.
app_store
1616
13.
warning
825
14.
gift_card
762
15.
directory_listing
426
16.
paste_site
399
17.
adult
391
18.
url_shortener
208
19.
drug
174
20.
crypto_giveaway
34
21.
domain_purchase
7
Top IP Addresses

Analyzing IP addresses associated with phishing attacks assists in identifying potential sources of malicious activity and blocking them proactively.

185.221.216.102
26367
172.93.120.138
19808
185.199.108.153
13555
185.199.110.153
13461
185.199.111.153
13451
185.199.109.153
13346
172.93.120.11
11541
172.93.120.13
10407
199.36.158.100
8540
45.67.214.8
7942
185.159.247.105
7666
104.26.3.211
6948
104.26.2.211
6927
172.67.71.226
6926
52.127.34.96
6523
172.67.7.136
6273
104.22.12.84
6170
104.22.13.84
6147
185.208.159.131
5704
76.76.21.142
3488
76.76.21.123
3488
76.76.21.61
3451
76.76.21.22
3425
77.75.48.72
3407
76.76.21.241
3391
185.159.247.121
3385
76.76.21.98
3372
76.76.21.93
3350
76.76.21.164
3337
154.216.18.158
2861
172.66.47.141
2505
172.67.74.75
2442
104.26.8.137
2428
172.66.44.115
2378
185.159.247.254
2373
104.26.9.137
2372
104.26.15.193
2141
104.26.14.193
2105
172.67.69.213
2057
45.10.243.9
1932
91.224.59.26
1856
185.159.247.103
1809
172.67.149.31
1791
104.21.39.221
1786
45.139.104.34
1697
172.67.68.42
1598
212.83.161.211
1594
104.26.13.63
1547
104.26.12.63
1508
104.26.4.241
1423
104.26.5.241
1415
76.76.21.9
1392
Toolkit Analysis

Phishing Kit Metrics

In our continuous efforts to combat phishing, we closely monitor and assess phishing kits that are part of these phishing campaigns. These numbers provide important insights into the tools and techniques employed by hackers. Our analysis covers factors such as:

Search

Total Phishing Kits

Quantifying the number of phishing kits discovered allows us to gauge the proliferation of these malicious resources.

Email

Unique Drop Emails

Identifying the unique drop email addresses used for phishing attacks helps in tracking the infrastructure utilized by bad actors. A “drop email” refers to the email address that is used to collect users’ secret credentials from phishing websites.

Global Search

Domains with Victim Emails

Recognizing the domains where victim emails are being sent aids in the identification and mitigation of ongoing campaigns.

Protect Your Organization

Stop Phishing Campaigns From Targeting You

By comprehensively analyzing these scans of phishing campaigns, we gain a deeper understanding of the latest techniques and trends of hackers. This knowledge enables us to develop effective risk mitigation and phishing countermeasures to help organizations protect themselves from the growing threat of phishing and scam attacks.

Need to take down phishing and scam sites and contents?
bs-2024-election-report
2024 Presidential Election Report

Discover the latest phishing and online scams threatening the democratic process

2024 Mid-Year Phishing Report

Protect Your Business from Evolving Phishing and Election Scams

bs-stop-the-steal
Master BEC Defense

Protect Your Business from BEC Scams with Our Latest Whitepaper

Dark Web for Dummies E-Book

Unlock the Secrets of the Dark Web with Our Latest E-book

llms-whitepaper
New Whitepaper

Protect Your Business From Multi-Channel Attacks Using AI Technology

Domain Risk Report

Want Visibility into Your Domain Threats? Get Your Free Domain Risk Report Now!