
Featured
Tuesday, October 21, 2025
The Stealer Log Ecosystem: Processing Millions of Credentials a Day
In early November of last year Synthient would take on a research project to map out the cybercrime ecosystem. In that effort we would go on to ingest several billion credentials from combolists, stealer logs and database dumps.


Announcing the Synthient IP Risk Database
Residential proxies pose numerous challenges to online platforms. Static indicators fall short, with residential proxy providers using sketchy mobile SDKs or free VPN apps to build large pools of IP addresses. Attackers can use these IP addresses to conceal their attacks making it appear as if each request is coming from a legitimate device. This latest release of Synthient V3 aims to improve the identification of leased IP addresses and the detection of active proxies...