IP reputation

How to keep a good reputation by keeping bad IPs out

One of the most powerful tools in a robust cyberdefense is a carrier grade IP reputation service, one that stays minute-to-minute alert of the next malicious IP address that threatens your network security. There are four billion IP addresses with most 12 million of them being a known repository of malicious malware and viruses. With Clavister’s IP reputation service, powered by Webroot®, a recognized leader in the field, the service promises to give users a number of significant benefits and threat preventions.


“Approximately 12 million IPs at any given time are catalogued with the BrightCloud IP Reputation Service enabling real-time IP reputation data to be utilized by the Clavister NGFW environment.”

What You Get

Threat visibility

IP reputation is one of the data sources computed by Webroot’s User Reputation Scoring engine in order to analyze user behavior and assess user intent, a powerful weapon to see and action incoming threats

Contextual correlation

Predictive Threat Intelligence helps protect against unknown attacks by correlating actors (URLs, IPs, files, and mobile apps) with others in a ‘guilt by association’ model.

Performance optimization

Eliminate filtering requests originating from IP addresses known to be ‘bad’ allowing the network flow to be optimized and robust.

Keeping malicious IPs out means a healthy network.


Provide unmatched worldwide visibility and intevention by utilizing a wide range of high-quality input sources, and continuously scanning the entire internet and incorporating data from millions of real-world endpoints.


Predict the expected behavior of each observed object (executable file, mobile application, URL, IP address, etc.) at impressive speed and with high accuracy by using patented contextual analysis methods and other proprietary adaptive machine learning techniques.


The BrightCloud Real-Time Anti-Phishing Service detects phishing sites by automatically scanning and verifying sites in milliseconds to ensure they are genuine and safe at the moment of the request. The majority of phishing sites’ lifespans range from 15 minutes to under 15 hours, but static phishing lists are generally a minimum of three to five days old, rendering them virtually useless. This service provides drastically more effective protection against zero-hour phishing threats.

Get in touch! It will only take a minute