Live · 42 countries reporting

Attackers change networks.
They can't change their tools.

Passive threat intelligence that fingerprints the tooling behind every connection. JA3, JA4, SSH, command patterns — the profile survives the rotation.

IP
Try 185.63.253.12 (seen) or any random IP (clean).
Proof of life

Right now, our sensors are seeing attacks.

A three-event peek at the stream. Sign in to pivot into the full map, the DSL editor, and the alert engine.

Sign in to see the rest →
  • connecting…
  • connecting…
  • connecting…
28
Verified Core nodes
18 regions · operated by BoarNet
3,412
Community Mesh sensors
42 countries · volunteer hosted
891k
Attacker profiles tracked
keyed by JA3/JA4, not by IP
14k/s
Events ingested
real-time to Pro · 1h delay free
Twin fleets

Ground truth,
everywhere at once.

Verified Core

High-interaction honeypots in global datacenters. Known infrastructure, known operator — the canonical baseline every community report is measured against.

Community Mesh

Thousands of volunteer sensors on home networks and small clouds. IP diversity no single vendor can buy, anonymized at ingest, cross-validated against Core.

Give-to-Get

Contributors get it free. Consumers fund the core.

Participant
$0run a sensor

A spare Pi, a VPS, or the old laptop in your closet earns you full Pro API access in 48 hours. JA3, cluster attribution, 90-day history.

Commercial
From $499/month

For firewalls, SIEMs, and SOC integrations that can't host sensors. Your subscription pays for the Verified Core fleet.

Give a little telemetry. Get enterprise intel back.

Install a sensor →