Internet Threat Intelligence, Visualized

Real-time attack data and infrastructure health from a distributed sensor network. Powered by watch4.me monitoring agents.

Active Threats (24h)

Unique source IPs that attacked our honeypot sensors in the last 24 hours. Each IP is enriched with GeoIP, ASN, and confidence scoring.

GeoIP ASN 24h window
348
Unique IPs (24h)

Sensor Nodes

Geographically distributed honeypot agents running cowrie and opencanary. Each node reports attacks in real-time to the IntrusionLabs collector.

cowrie opencanary
2
Honeypot sensors

Active Campaigns

Correlated clusters of attacking IPs identified through network-level correlation, ASN temporal clustering, and cross-sensor target pattern matching. A campaign is deactivated after 7 days with no correlated activity, and closed after 30 days—all historical data is preserved.

network correlation ASN cluster target pattern
2849
Coordinated attack clusters

Known Scanners

Legitimate security scanning organizations (Shadowserver, Censys, ONYPHE, etc.) detected by our sensors. Classified and excluded from threat campaigns.

15 orgs excluded from campaigns
259
IPs from 15 orgs

Attack Volume — Last 30 Days

Global Threat Origins

Sensor Server Low Medium High volume