Welcome to Check-The-Sum
Most used SSH clients
Last IP address
Last 10 IOCs
World map of the most aggressive countries
Presentation of the site
Thanks to our extensive network of SSH honeypots(*), scattered around the world, we trap attackers looking to exploit vulnerabilities. These honeypots capture their IP addresses, allowing in-depth analysis of where they come from, their activities, the commands they attempt to execute, and the files they seek to download. All of this data, derived from our real-time observations, is available free of charge on our site, providing a transparent and accessible overview of the global cyber threat.
(*)A honeypot is an intentionally vulnerable system designed to attract attackers, providing crucial information for understanding and preventing online threats.
Access our API for free
If you would like to integrate the artifacts collected by Check-The-Sum into your project, an API has been put in place to allow you to do so.
This API allows you to retrieve a large amount of data in JSON format (lists of IPs, lists of payloads, statistics, etc.).