Classification Criteria
Malicious
An IP address earns a malicious classification based on its assigned tags, which reflect observed behaviors detected by Abusix. These tags capture real-world activity, highlighting whether an IP has engaged in suspicious or harmful actions. Certain Abusix tags indicate “malicious” intent, flagging behaviors linked to cyber threats. If an IP address isn’t classified as benign and carries at least one malicious tag, it is officially categorized as malicious, ensuring proactive threat detection and network security.Suspicious
Traffic flagged as suspicious by Abusix falls in the gray area between benign and outright malicious activity. Unlike random internet background noise, this type of traffic involves systematic probing, scanning, or enumeration, signaling potential reconnaissance efforts. While not an immediate threat, this classification provides valuable contextual intelligence, helping security teams stay ahead of emerging risks without triggering unnecessary alarms.Characteristics of Suspicious Traffic
Suspicious traffic indicates reconnaissance activity that may precede an attack. Common behaviors include:- Targeted scanning for vulnerabilities without active exploitation, such as port scans
- Unsolicited connection attempts from unidentified sources
- Service enumeration using debug parameters
- Attempts to discover remote access points
- Traffic from unknown IPs not associated with legitimate scanning services
Abusix Additionally Scrutinize These Behaviors
- The abuse contact associated with the IP is not valid/usable
- A couple of misconfigurations that signal potential for spam (newly observed IPs, invalid return-path, hitting “recycled” spamtraps)