Reports & transparency
Open data about how we defend
Platform statistics, threat reports, transparency disclosures, and compliance documentation. The numbers behind the platform - published, explained, and updated regularly.
Four report families
What you can see
We publish four families of reports so you can evaluate Panthero on the data, not on the marketing. Each one answers a different question.
Platform Statistics
Live counts of everything that matters: threat records tracked, public sources monitored, requests scored, threats blocked, sensor catches per day. Updated continuously so you can see the platform breathing in real time.
- Live threat record count
- Source ingestion status
- Requests scored per day
- Sensor catch rate
Threat Reports
Annual summaries of what we are seeing in the wild. Trending attack categories, geographic distribution, new campaigns, and the behavioral shifts our ML profiling picks up before they hit the headlines.
- Annual threat summaries
- Attack category trends
- Geographic heatmaps
- Emerging campaign alerts
Transparency Reports
Where our intelligence comes from and what we do with your data. Source provenance categories, data retention policies, legal-request handling, and the audit trail that makes GDPR not scary.
- Data source categories
- Retention & deletion policy
- Legal request statistics
- DPO contact & response times
Compliance Reports
Customer-facing documentation you can hand to your own auditors. SLA attainment, uptime history, security incident disclosure, and the paper trail your risk team needs to sign off on Panthero as a vendor.
- SLA attainment history
- Uptime & incident timeline
- Security posture summary
- Vendor assessment pack
Published reports
The timeline, in full
Every data report we have published. Open any one of them to see the aggregated statistics, category breakdowns, and attack-vector charts for that period.
Reports are being prepared
The first published data reports will appear here as soon as the generation pipeline completes a full period.
Community reporting
Report a malicious IP
Panthero's intelligence is stronger because security teams, sysadmins, and researchers around the world contribute what they see on their own infrastructure. If you caught an attacker, tell us - the next person they target will thank you.
How reporting works
- Submit the IP address and pick a threat category
- Twenty-four attack categories to choose from
- Your name and email are never shown publicly
- Verified reports feed our behavioral models
- Every customer benefits from your contribution
Where our reports come from
Top community reporters
Reporters in dozens of other countries contribute daily.
Why we publish this
Trust is verifiable, or it isn't trust
Security vendors love the word "trust". We think trust is something you earn by letting the customer check your work.
Every number we cite in a sales conversation lives on this page with the methodology behind it. Every capability we promise maps to a report you can audit. If a fact about Panthero matters to you, it should be reachable from here - and if it's not, tell us and we will publish it.
Our transparency commitments
- Publish platform statistics continuously
- Publish threat reports on a regular cadence
- Disclose all security incidents within 72 hours
- Document every data-retention policy in plain language
- Respond to transparency requests in writing
Have a question we should answer here?
If a fact about Panthero matters to you and it isn't on this page, tell us. We will publish it, or explain why we can't.