171 private links
LookingGlass delivers the most comprehensive threat intelligence-driven solutions in the market enabling security teams to efficiently and effectively address threats throughout the cyber threat lifecycle.
With a scalable solutions portfolio of threat data feeds, a threat intelligence management platform, threat mitigation solutions, and threat intelligence services, LookingGlass enables security teams to prevent, detect, understand, and respond to analyzed, prioritized, relevant threats.Additionally, with a deep knowledge of the global Internet topology and near real time activity, LookingGlass helps organizations understand threats inside and outside their perimeter - including threats that may be impacting third party trusted partners, other organizations in their industry, and the latest threat trends impacting the global Internet at large.
Data To Fish was born in an effort to facilitate the application of data science using various tools such as Python, R, Julia and SQL.
We are passionate about data, and strive to provide you the most up-to-date and accurate information about common data-related problems.
The content provided on this website is constantly reviewed. Yet, if you do come across any errors in the content, please feel free to reach us at datatofish@gmail.com. Please note that due to the high volume of requests, we can no longer accommodate personal requests of code reviews. Please also refrain from including any email attachments.
A big part of machine learning is classification — we want to know what class (a.k.a. group) an observation belongs to. The ability to precisely classify observations is extremely valuable for various business applications like predicting whether a particular user will buy a product or forecasting whether a given loan will default or not.
IPv6 Uptake
IPv6 Users per AS
IPv6 Relative Performance
DNSSEC RSA Validation
DNS Resolver use
Users per AS
Etalab accompagne l’ouverture des données publiques de l’État et des administrations. À ce titre, Etalab développe et anime la plateforme ouverte des données publiques data.gouv.fr, plateforme qui héberge les jeux de données et recense leurs réutilisations.
Since 2013, Backblaze has published statistics and insights based on the hard drives in our data center. You'll find links to those reports below. We also publish the data underlying these reports, so that anyone can reproduce them. You'll find an overview of this data and the download links further down this page.
Picard est un marqueur de fichiers audio multi-plateformes écrit en Python. Recherche acoustID et gestion d'audiothèque.
Robtex uses various sources to gather public information about IP numbers, domain names, host names, Autonomous systems, routes etc. It then indexes the data in a big database and provide free access to the data.
We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet.
Our database now contains billions of documents of internet data collected over more than a decade.
Nous partageons les données qui révèlent comment les règles et les actions des autorités administratives et des entreprises affectent la confidentialité, la sécurité et l'accès aux informations.
Wikiscan is an independent statistics site on Wikipedia and other wikis hosted by the Wikimedia Foundation. The site was created in 2011. The Wikimedia France association supports server hosting.
Wikiscan use public data published by the Wikimedia Foundation : replicas of Wikimedia databases on Tool Labs, pageview dataset, Mediawiki API.
Search the block chain : Find info that other block explorers don't have.
Using an address, transaction hash, block hash, block number, or wallet name.
Founded in 2013, Bitmain Technologies, now among the world's most recognizable Bitcoin companies, was established to develop and sell the world’s leading bitcoin miners using Bitmain's ASIC chip technology. Starting with the Antminer S1, our task continuously became more difficult as bitcoin’s “difficulty level” kept rising. We followed Moore’s Law in this emerging field of ASIC chip design and pioneered it, time and again. In May of 2016 we released the Antminer S9, the world’s first consumer-grade bitcoin miner based on a 16nm process ASIC chip. This is also the world’s most power-efficient bitcoin miner, taking that title away from its predecessor, the Antminer S7.
New To Digital Currencies?
Like paper money and gold before it, bitcoin and ether allow parties to exchange value. Unlike their predecessors, they are digital and decentralized. For the first time in history, people can exchange value without intermediaries which translates to greater control of funds and lower fees.
For many years, DomainTools has served the domain professional community with Whois and domain name research tools to drive your investments, research buyers, find new domains and manage existing portfolios.
I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.
How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
GOOGLE BIGQUERY
Entrepôt de données rapide, économique et intégralement géré, destiné à l'analyse de données à grande échelle dans les entreprises
HashKiller's purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the Internet by demonstrating the weakness of using hash based storage / authentication.
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
Learn about the latest online threats.
Share and collaborate in developing threat intelligence.
Protect yourself and the community against today’s latest threats.
At the heart of Open Threat Exchange is the pulse, an investigation of an online threat. Pulses describe any type of online threat including malware, fraud campaigns, and even state sponsored hacking.
Pulses are comprised of indicators of compromise (or IoCs), which describe the infrastructure of that threat – including IPs, file hashes, e-mail addresses affiliated with the threat, etc.