Tempico IP & Hash Reputation API

Real-time answers for real-world threats.

Instantly reveal a metadata for any IP or file hash: accurate, agent-free, and ready for automation.

Give it a try:

Upload
WHAT WE HAVE MASTERED

How it works?

Tempico gathers, analyzes, and structures large volumes of raw security telemetry to surface malicious intent worldwide. Our Reputation API components query the Threat Intelligence Data Lake to deliver real-time threat insights. The current release supports IP and hash lookups, but customers who need richer context can upgrade to the Tempico Unified Operations Center — Innovator plan or higher.

IP address intelligence

We track the behavior of more than 800 million IP addresses around the world. Since many IPs change owners every day, the system applies weighted analysis, banner grabbing, and other expert techniques, resulting in a trusted reputation score with very few false positives.

Threat detection

Network monitoring flags IPs tied to malware, DDoS, spam, and brute-force attacks.

Open port visibility

Check which network services and ports, like SSH or HTTP, are open on any public host.

Network & Location context

Access ASN, net range, organization, country and city to profile each IP’s origin and risk.

Continuous monitoring

In 2024, Tempico flagged 32,297,537 unique IPs with a reputation warning. Each notice let our customers to proactively block a malicious actor or make an informed decision — ultimately reducing the risk of cyber threats across their networks.

800

Unique IPs

99.99

SLA availability

Pricing

Simply add a credit card in the customer portal and enable automatic top-ups. The usage-based plan has no monthly fees and no minimum commitment — your prepaid balance stays available as long as you need it. The Tempico Reputation API is free for small projects and educational non-commercial use. 

Free

0€

100 requests per 24h

Features

Core

0.27€

per 1000 requests

Features

SIEM

0.75€

0.65€

per 1000 requests

Features

File threat recognition

With almost two billion file hashes on record, Tempico offers deep threat insight. This data, available through a developer-friendly, easy-to-use API, lets you block harmful code before it runs on your network.

Hash-based detection

Identify whether a file has known malware associations across global threat feeds, in less than a second.

File scanning

Upload suspicious files for a detailed verdict in minutes. Decide whether to share samples with partners or keep them private.

Designed for enterprise

Maintain a unified hash repository with hundreds of millions of entries, ensuring consistent threat intelligence across teams.

Updated hash database

Our hash database updates continuously to ensure you’re protected from both classic and emerging threats. It contains a balanced ratio of clean and malicious hashes to ensure a reasonable detectability from both worlds.

Hash Bar
Clean 50%
Processing 10%
Malicious 40%
Clean
Processing
Malicious

Updated at: September 2025

Pricing

Simply add a credit card in the customer portal and enable automatic top-ups. The usage-based plan has no monthly fees and no minimum commitment — your prepaid balance stays available as long as you need it. The Tempico Reputation API is free for small projects and educational use.

Free

for 100 requests

0€

Features

Core

for 1000 requests

0.27€

Features

Enterprise add-on

From

2690€

Features

High-volume bundles start at 1 million requests, stay active for one year. They can be procured from Customer Portal or through your Account Manager.

IP address intelligence

We track the behavior of more than 800 million IP addresses around the world. Since many IPs change owners every day, the system applies weighted analysis, banner grabbing, and other expert techniques, resulting in a trusted reputation score with very few false positives.

Threat detection

Network monitoring flags IPs tied to malware, DDoS, spam, and brute-force attacks.

Open port visibility

Check which network services and ports, like SSH or HTTP, are open on any public host.

Network & location context

Access ASN, net range, organization, country and city to profile each IP’s origin and risk.

Continuous monitoring

In 2024, Tempico flagged 32,297,537 unique IPs with a reputation warning. Each notice let our customers to proactively block a malicious actor or make an informed decision — ultimately reducing the risk of cyber threats across their networks.

800

Unique IPs

99.99

SLA availability

Pricing

Simply add a credit card in the customer portal and enable automatic top-ups. The usage-based plan has no monthly fees and no minimum commitment — your prepaid balance stays available as long as you need it. The Tempico Reputation API is free for small projects and educational non-commercial use. 

File threat recognition

With almost two billion file hashes on record, Tempico offers deep threat insight. This data, available through a developer-friendly, easy-to-use API, lets you block harmful code before it runs on your network.

Hash-based detection

Identify whether a file has known malware associations across global threat feeds, in less than a second.

File scanning

Upload suspicious files for a detailed verdict in minutes. Decide whether to share samples with partners or keep them private.

Designed for enterprise

Maintain a unified hash repository with hundreds of millions of entries, ensuring consistent threat intelligence across teams.

Updated hash database

Our hash database updates continuously to ensure you’re protected from both classic and emerging threats. It contains a balanced ratio of clean and malicious hashes to ensure a reasonable detectability from both worlds.

Clean 50%
Processing 10%
Malicious 40%
Clean
Processing
Malicious

Updated at: September 2025

Pricing

Simply add a credit card in the customer portal and enable automatic top-ups. The usage-based plan has no monthly fees and no minimum commitment — your prepaid balance stays available as long as you need it. The Tempico Reputation API is free for small projects and educational non-commercial use. 

High-volume bundles start at 1 million requests, stay active for one year. They can be procured from Customer Portal or through your Account Manager.

Why consider Tempico Reputation API?

Trusted platform

The platform was originally developed to power premium security services for TUOC. Its design has been kept faster and smarter, while benefits stay focused on real use. Through solid threat intelligence and reliable defense, organizations receive needed protection without inflated fees.

Integration & Use cases

FAQ

Frequently Asked Questions

Can we get access to your malware samples?

Yes. The samples sensitive data-free samples, or samples which were allowed to be shared with community can be downloaded through our API, given that the account has a respective download permission.

Can we dump lists of malicious IPs for "offline" use?

Indeed. Sometimes security appliances are not able to preform online IP lookups, or generate too heavy traffic doing so. For such cases we provide an API endpoint to fetch blocklists as per categories selected. The database is available in the MMDB and plain text formats.

What happens if an IP or file is wrongly classified?

We continuously refine our detection models and encourage users to report misclassifications. Our analysts promptly review flagged entries to maintain data integrity and reduce false positives or false negatives.

Is IP lookup IPv6-ready?

Yes. Our platform fully supports IPv6 addresses, ensuring you don’t miss potential threats in dual-stack or newer network environments.

Do you provide interactive dashboards to visualize threats?

Custom visualizations are not available out-of-the-box, as our customers often have very different requirements in this area. However, performance and automation are consistently high priorities, which is why our primary focus is on the data layer. In most cases, your data can still be visualized using external tools that can integrate with our platform. If you require assistance with this, please submit a request to our Unified Operations Center.

What about large-scale lookups or file scans?

Our APIs are designed to support batch processing and job scheduling, enabling reliable, high-throughput automated workflows. The pricing model scales with request volume, offering flexibility for larger deployments. For exceptionally large-scale setups, alternative connectors may offer greater efficiency than traditional REST APIs.

What is SOAR / SIEM?

What is SIEM?
SIEM (Security Information and Event Management) is a solution that collects and centralizes logs and security data from across your environment — including endpoints, servers, cloud services, and network devices. It analyzes this data in real time to detect suspicious activity, generate alerts, support compliance reporting, and provide visibility into your overall security posture.

What is SOAR?
SOAR (Security Orchestration, Automation, and Response) is a system designed to help security teams streamline and automate their incident response processes. It connects to various tools in your environment, ingests alerts (often from a SIEM), enriches them with context, and runs automated playbooks to investigate or contain threats — reducing response time and improving consistency in how incidents are handled.

A random malicious sample is not being detected by Hash Database, why?

The global volume of known malicious files is massive — and many of them are outdated, polymorphic, or unlikely to be seen in real-world environments today. To keep our Hash Database lean and responsive, we routinely archive older or low-relevance entries, removing them from active (public) querying.

However, when a user queries a hash that’s been archived and it results in a miss, our system automatically rehydrates the relevant information within minutes. The hash then becomes available again for a limited time. This approach ensures both high performance and the ability to respond to rare or long-tail queries without bloating the live dataset.

Pricing and Feature Availability

DATACENTER
LM1
Estonia
DE3

Germany

SG1

Singapore

USW2

USA

Infrastructure Units size

CPU

72 MHz

48 MHz

48 MHz

32 MHz

RAM

48 MB

48 MB

48 MB

48 MB

Storage size

576 MB

480 MB

576 MB

480 MB

IOPS

12 IOPS

12 IOPS

12 IOPS

12 IOPS

Infrastructure Unit​ price

0.00074 €/h

0.00067 €/h

0.00241 €/h

0.0033 €/h

PaaS ADD-ONS

Dedicated NAT gateway

0.03014 €/h

0.03014 €/h

0.0399 €/h

0.0433 €/h

GPU RTX 5000 Ada

0.78 €/h

GPU RTX PRO 6000 Blackwell

1.31 €/h

Paid TLS certificate

From 16.50 €/year

Dedicated IPv4

7.23 €/month

7.23 €/month

4 €/month​

3.83 €/month​

Dedicated IPv6

Free

Free

Varies

Varies

Dedicated IPv4 subnet​

Varies

Dedicated IPv6 subnet

Varies

CI/CD Add-ons

CI/CD runner

0.01628 €/h

0.01628 €/h

Varies

Varies

Environment-dependent features

Stateful Firewall
TLS with Let's Encrypt
Web Application Firewall
Platform built-in logging
ARM CPUs
Anti-DDoS

Add-on

Add-on

Cloud-native services

Add-on

GPU-accelerated computing

Add-on

Custom PCI passtrough
Log storage

0.1 GB/month free,
2 €/GB/month optional expansion,
60 days max

Log ingestion

First 10 GB/month free,
then 0.06 €/GB/Month

Log Retrieval

1.50 €/GB/month