Reports & transparency

Open data about how we defend

Platform statistics, threat reports, transparency disclosures, and compliance documentation. The numbers behind the platform - published, explained, and updated regularly.

Four report families

What you can see

We publish four families of reports so you can evaluate Panthero on the data, not on the marketing. Each one answers a different question.

Platform Statistics

Live counts of everything that matters: threat records tracked, public sources monitored, requests scored, threats blocked, sensor catches per day. Updated continuously so you can see the platform breathing in real time.

  • Live threat record count
  • Source ingestion status
  • Requests scored per day
  • Sensor catch rate

Threat Reports

Annual summaries of what we are seeing in the wild. Trending attack categories, geographic distribution, new campaigns, and the behavioral shifts our ML profiling picks up before they hit the headlines.

  • Annual threat summaries
  • Attack category trends
  • Geographic heatmaps
  • Emerging campaign alerts
Read the annual reports

Transparency Reports

Where our intelligence comes from and what we do with your data. Source provenance categories, data retention policies, legal-request handling, and the audit trail that makes GDPR not scary.

  • Data source categories
  • Retention & deletion policy
  • Legal request statistics
  • DPO contact & response times

Compliance Reports

Customer-facing documentation you can hand to your own auditors. SLA attainment, uptime history, security incident disclosure, and the paper trail your risk team needs to sign off on Panthero as a vendor.

  • SLA attainment history
  • Uptime & incident timeline
  • Security posture summary
  • Vendor assessment pack

Published reports

The timeline, in full

Every data report we have published. Open any one of them to see the aggregated statistics, category breakdowns, and attack-vector charts for that period.

Reports are being prepared

The first published data reports will appear here as soon as the generation pipeline completes a full period.

Community reporting

Report a malicious IP

Panthero's intelligence is stronger because security teams, sysadmins, and researchers around the world contribute what they see on their own infrastructure. If you caught an attacker, tell us - the next person they target will thank you.

How reporting works

  • Submit the IP address and pick a threat category
  • Twenty-four attack categories to choose from
  • Your name and email are never shown publicly
  • Verified reports feed our behavioral models
  • Every customer benefits from your contribution
Report an IP

Where our reports come from

Top community reporters

#1
The Netherlands
#2
United States

Reporters in dozens of other countries contribute daily.

Why we publish this

Trust is verifiable, or it isn't trust

Security vendors love the word "trust". We think trust is something you earn by letting the customer check your work.

Every number we cite in a sales conversation lives on this page with the methodology behind it. Every capability we promise maps to a report you can audit. If a fact about Panthero matters to you, it should be reachable from here - and if it's not, tell us and we will publish it.

Our transparency commitments

  • Publish platform statistics continuously
  • Publish threat reports on a regular cadence
  • Disclose all security incidents within 72 hours
  • Document every data-retention policy in plain language
  • Respond to transparency requests in writing

Have a question we should answer here?

If a fact about Panthero matters to you and it isn't on this page, tell us. We will publish it, or explain why we can't.