.png)
Every enterprise firewall processes traffic from residential IP space. Traditional reputation feeds fail to flag IPs that rotate before they can be cataloged. GreyNoise analyzed 4 billion sessions over 90 days and found that 39% of unique IPs targeting the edge come from home internet connections β and 78% vanish before any reputation system can flag them.
To a reputation feed, the source IP is indistinguishable from a legitimate user's connection β the same ISPs, the same address ranges. Attackers route malicious traffic through ordinary home broadband, mobile data, and small-business connections β the same IP address ranges used by employees, customers, and partners. This report quantifies the residential proxy threat at internet scale and identifies what defenders can do about it.
Every enterprise firewall processes traffic from residential IP space. Traditional reputation feeds fail to flag IPs that rotate before they can be cataloged. GreyNoise analyzed 4 billion sessions over 90 days and found that 39% of unique IPs targeting the edge come from home internet connections β and 78% vanish before any reputation system can flag them.
To a reputation feed, the source IP is indistinguishable from a legitimate user's connection β the same ISPs, the same address ranges. Attackers route malicious traffic through ordinary home broadband, mobile data, and small-business connections β the same IP address ranges used by employees, customers, and partners. This report quantifies the residential proxy threat at internet scale and identifies what defenders can do about it.