🌐 IP blocklist
All attacker IPs ever seen. One IP per line, sorted. Also available per-day.
Malicious IPs, domains, hashes and attacker commands observed in the wild. Downloadable every hour, no API key, no signup.
Paste an IP, domain or hash to check if it's in our feeds.
Attackers observed per day.
By first octet, across all observed attackers.
Among URLs captured in attacker commands.
All attacker IPs ever seen. One IP per line, sorted. Also available per-day.
URLs extracted from attacker shell commands — typically malware drop-points.
Hashes of payloads attackers dropped on the honeypot.
Unique shell commands typed on the honeypot — TTPs, C2 probes, wipers.
IDS rules auto-generated from today's IP blocklist. Drop-in for your sensor.
Full JSON event logs, with the honeypot IP masked. Great for lab replays.
Check-The-Sum runs a Cowrie SSH/Telnet honeypot: a fake shell that records every attacker session, every command typed, and every file downloaded. Every hour a Python pipeline parses the raw event log, extracts IOCs, sanitises our own IP, and publishes the feeds here as static files — no database, no API key, no friction.
We also share everything with VirusTotal and AbuseIPDB so that the wider community benefits too.