← Back to Dashboard

Most Abused Cloud Providers — Hosting Networks Used for Cyber Attacks

Which cloud and hosting providers have the most malicious IP addresses in our threat intelligence database

Cloud providers and hosting companies appear frequently in threat intelligence data — not because they are malicious, but because attackers exploit their infrastructure. Low-cost virtual machines, API-driven provisioning, and clean IP reputation make cloud platforms attractive to threat actors who spin up attack infrastructure, launch campaigns, and abandon instances before abuse reports are processed.

The table below ranks cloud and hosting providers by the number of unique malicious IP addresses observed in our threat intelligence network. This data is derived from multiple sources including community reports, automated detection systems, and curated blocklists.

# Provider / Network ASN Malicious IPs Total Reports Countries
1 Amazon.com, Inc. AS16509 281,547 427,763 40
2 DigitalOcean, LLC AS14061 253,394 1,316,414 8
3 DIGITALOCEAN-ASN AS14061 102,929 6,885,423 8
4 Hangzhou Alibaba Advertising Co.,Ltd. AS37963 62,294 567,033 2
5 Google LLC AS396982 60,583 248,615 28
6 Amazon.com, Inc. AS14618 54,408 152,234 2
7 OVH SAS AS16276 52,435 638,932 26
8 Microsoft Corporation AS8075 51,750 288,671 34
9 Alibaba US Technology Co., Ltd. AS45102 51,066 1,301,227 14
10 AMAZON-02 AS16509 42,650 2,467,978 28
11 Tencent Building, Kejizhongyi Avenue AS132203 34,245 673,807 12
12 Hetzner Online GmbH AS24940 31,879 397,860 3
13 MICROSOFT-CORP-MSN-AS-BLOCK AS8075 31,319 1,706,781 31
14 GOOGLE-CLOUD-PLATFORM AS396982 29,209 2,439,077 27
15 Oracle Corporation AS31898 26,760 78,826 27
16 Shenzhen Tencent Computer Systems Company Limited AS45090 24,933 274,885 1
17 Contabo GmbH AS51167 18,956 484,335 4
18 Cloudflare, Inc. AS13335 14,926 73,175 96
19 AMAZON-AES AS14618 13,469 988,995 1
20 IONOS SE AS8560 8,250 232,422 6
21 GOOGLE AS15169 4,854 243,264 15
22 CLOUDFLARENET AS13335 4,660 85,294 34
23 ORACLE-BMC-31898 AS31898 3,992 233,184 24
24 Cloudflare London, LLC AS209242 3,586 6,631 3
25 Hostinger International Limited AS47583 3,354 85,009 12
26 Hetzner Online GmbH AS212317 3,032 10,170 1
27 Contabo Asia Private Limited AS141995 2,880 63,436 6
28 Google LLC AS15169 2,803 7,500 23
29 Contabo Inc. AS40021 2,718 11,831 3
30 AS-VULTR AS20473 2,449 66,980 19

Why Cloud Providers Are Abused

Cloud platforms are not inherently insecure, but several characteristics make them attractive to threat actors:

  • Low cost and instant provisioning — Attackers can spin up virtual machines for a few dollars or use free-tier credits to launch attacks. API-driven provisioning means infrastructure can be created and destroyed programmatically, making it difficult to trace.
  • Clean IP reputation — Newly provisioned cloud IPs often have no history in blocklists, allowing attackers to bypass reputation-based security controls until enough reports accumulate.
  • Jurisdiction shopping — Global cloud providers operate in many regions. Attackers can deploy infrastructure in jurisdictions where abuse complaints are slow to process or where legal cooperation is limited.
  • Scale and anonymity — Large cloud providers manage millions of IPs. Individual malicious instances are difficult to distinguish from legitimate workloads, and stolen payment methods are commonly used to create accounts.

What This Means for Security Teams

Seeing a major cloud provider on this list does not mean you should block all traffic from that network. These providers host millions of legitimate services — blocking an entire ASN like Amazon AWS would break access to countless websites and APIs.

Instead, security teams should:

  • Use IP-level threat intelligence to identify and block specific malicious addresses rather than entire networks
  • Apply enhanced monitoring for traffic from cloud providers, especially for authentication endpoints
  • Implement rate limiting and behavioral analysis to detect automated attacks from cloud infrastructure
  • Integrate the WAYSCloud API to check IPs in real time before allowing access

Related Threat Intelligence

Why Cloud IPs Are Abused → ASN Threat Ranking → Top Malicious IPs → ASN Intelligence → API Documentation →