About Check-The-Sum

Learn more about Check-the-Sum...
...

Presentation of the site

Thanks to our extensive network of SSH honeypots, scattered around the world, we trap attackers looking to exploit vulnerabilities. These honeypots capture their IP addresses, allowing in-depth analysis of where they come from, their activities, the commands they attempt to execute, and the files they seek to download. All of this data, derived from our real-time observations, is available free of charge on our site, providing a transparent and accessible overview of the global cyber threat.


What is a honneypot?

A honeypot is a computer security technique used to deliberately attract attackers and observe their behavior. It is a digital lure, simulating potential vulnerabilities, in order to detect, study and analyze the methods of cybercriminals. By deploying honeypots, cybersecurity professionals can gather valuable information about emerging threats, thereby strengthening the security of systems and networks. These devices play a crucial role in understanding attack tactics and contribute to the continuous improvement of online defenses.


What do I have access to on Check-the-Sum?

Check-the-sum puts its detection and analysis capabilities at your disposal free of charge to allow you to better understand the state of the current cyber threat. On Check-the-Sum, you have access to the last 1000 events in each of our categories (IPs detected, payloads, credentials, malware, etc...). To retrieve our entire database you must use our free API.