Real-time spam and email threat intelligence from a live honeypot network spanning thousands of monitored domains
White-label threat maps and blacklist feeds for your security platform β’ Price on application
Our live threat map shows real-time spam attack origins across the globe β country by country, attack by attack. Embeddable into your platform and fully white-labelable with your own branding.
The threat map updates in real-time, plotting active spam sources by country and attack volume. See exactly where threats are originating, which IPs are most active, and how attack patterns shift throughout the day.
CentralMail operates a sophisticated multi-vector spam detection and threat intelligence system. Our honeypot network captures and analyses spam attempts in real-time from sources worldwide, delivering actionable intelligence through continuously updated blacklist feeds and embeddable live threat maps β ready to white-label and resell as part of your own security platform.
Embeddable real-time world map showing active spam sources by country, attack volume and threat severity. Auto-refreshes and fully white-labelable with your own branding and domain.
Thousands of unused domains configured as spam traps, attracting and cataloguing unsolicited communications from spammers worldwide. Continuously expanding coverage.
Simulated open relay service capturing spammers attempting to exploit mail servers for unauthorised relay. Relay targets logged and distributed in real-time feeds.
IP and domain blacklists updated every 15 minutes in multiple formats: Postfix-ready, SpamAssassin-compatible. Consolidated daily list covers 159,000+ IPs.
Real-time feed from production email security appliances forwarding all detected spam for comprehensive cross-referencing and pattern analysis.
IP geolocation tracking identifying spam origins by country with threat correlation. Country-level threat ranking, peak attack analysis and trend reporting.
Automated threat scoring evaluating each source across attack frequency, domain patterns, historical behaviour and attack vectors. Critical, High, Medium severity classification.
Your logo, your domain, your brand. The threat map and dashboard can be embedded directly into your customer portal or security product as a fully branded service.
Full detail of what the platform delivers
| Specification | Detail |
|---|---|
| Honeypot Domains | Thousands of monitored domains across multiple TLDs |
| Detection Vectors | Direct honeypot, open relay simulation, production mail feed |
| Blacklist Update Frequency | Every 15 minutes + consolidated daily at 02:00 UTC |
| IP Blacklist Formats | Raw IP list, Postfix hash format, consolidated combined list |
| Domain Blacklist Formats | Raw domain list, SpamAssassin compatible format |
| Threat Classification | Critical, High, Medium severity levels |
| Geographic Coverage | Global β IP geolocation across all monitored sources |
| Dashboard Refresh | 60-second auto-refresh, real-time streaming for new threats |
| Threat Map | Live embeddable world map β centralmail.co.uk/threat-map.php |
| AbuseIPDB Integration | Active contributor β all confirmed threats reported automatically |
| API Access | Available β feed integration and IP status lookup |
| White-Label | Full custom branding, domain, logo and colour scheme |
| Embedding | iframe-embeddable threat map for customer portals |
Protect your mail infrastructure and offer customers a value-added spam intelligence feed branded as your own service.
Embed live threat intelligence into your SIEM, mail gateway or security dashboard to enrich your product offering.
Automate blacklist updates for Postfix and SpamAssassin every 15 minutes without maintaining your own honeypot infrastructure.
White-label the threat map and dashboard as a managed service deliverable β differentiate with real-time visual intelligence.
One cron job pulls the latest consolidated blacklist directly into Postfix or SpamAssassin. No complex setup, no maintenance burden.
Continuously updated corpus of real spam data, source IPs, targeted domains and attack patterns for research and analysis.
Pricing depends on your specific requirements β feed volume, white-label scope, API access level and embedding requirements. Contact us to discuss.
Price on application β tailored to your integration requirements, data volume and white-label scope.
White-label spam threat maps and blacklist feeds β branded as your own service
Get in Touch Today βPrice on application β’ No obligation β’ Response within 24 hours