Free Cyber Threat Intelligence Feeds
Real-time IOCs collected from globally distributed honeypots. Updated every hour. 100% free for the cybersecurity community.
Quick IOC Lookup
IP Address Distribution
Top 10 IP ranges by first octet
Domain TLD Distribution
Top 10 malicious domain TLDs
Available Threat Intelligence Feeds
🌐 IP Addresses
Malicious IP addresses from honeypot attacks
Comprehensive list of IP addresses that have attempted attacks on our honeypot infrastructure. Includes brute-force attempts, scanning, and exploitation attempts.
🔗 Domains & URLs
Malicious domains and URLs detected
Collection of malicious domains and URLs used for phishing, malware distribution, C2 communication, and other malicious activities observed in our honeypots.
🔐 File Hashes
Hashes of malicious files
MD5, SHA1, and SHA256 hashes of malware samples collected through our honeypot network. Useful for file reputation checks and malware detection.
⚡ Malicious Commands
Attack commands and payloads
Real commands and payloads executed by attackers on our honeypots. Includes shell commands, exploit attempts, and malicious scripts.
🛡️ Suricata Rules
IDS/IPS rules for threat detection
Suricata rules generated from our threat intelligence. Deploy these rules in your IDS/IPS to detect and block known threats.
📊 API Access
Programmatic access to feeds
Integrate our feeds directly into your security tools. All feeds are available via simple HTTP GET requests. No authentication required.
About Our Honeypots
Check-The-Sum operates a global network of honeypots - deliberately vulnerable systems designed to attract and monitor cyber attacks. By analyzing attacker behavior, we collect valuable threat intelligence that benefits the entire cybersecurity community.
What We Collect:
- Source IP addresses of attackers
- Malicious domains and URLs accessed
- File hashes of malware samples
- Commands and payloads executed
- Attack patterns and techniques
How to Use This Data:
- Block malicious IPs at your firewall
- Add domains to DNS blocklists
- Check file hashes before execution
- Analyze attacker TTPs (Tactics, Techniques, and Procedures)
- Enhance SIEM and security monitoring