πŸ† βœ“ Trusted since 1992 β€” 34 Years of Excellence

⚑ SigmaNetworks Attack Intelligence

Real-time SSH brute force and intrusion detection intelligence from distributed honeypot servers monitoring attacks worldwide

White-label attack maps and firewall blacklist feeds for your security platform β€’ Price on application

🍯
839,000+Attacks Tracked
🌍
GlobalCoverage
⚑
Real-TimeDetection
🏷️
White-LabelReady

πŸ—ΊοΈ Live Attack Map

Our live attack map shows real-time SSH intrusion attempts across the globe β€” country by country, attack by attack. Embeddable into your platform and fully white-labelable with your own branding.

🌐 SigmaNetworks Live SSH Attack Map

The attack map updates in real-time, plotting active SSH attack sources by country and attack volume. See exactly where attacks are originating, which IPs are most active, and how attack patterns shift throughout the day.

839,000+Total Attacks
5,000+Unique Attacker IPs
1,800+Blocked IPs
6,600+Targeted Usernames
10,000+Daily Consolidated
πŸ—ΊοΈ Open Live Attack Map β†’

πŸ’Ό Professional Attack Intelligence You Can Sell

SigmaNetworks operates a distributed SSH honeypot network monitoring brute force and intrusion attempts in real-time from sources worldwide. Every attack attempt is immediately logged, analysed and scored β€” delivering actionable firewall intelligence through continuously updated blacklist feeds and embeddable live attack maps β€” ready to white-label and resell as part of your own security platform.

Everything Included

πŸ—ΊοΈ

Live SSH Attack Map

Embeddable real-time world map showing active SSH attack sources by country, attack volume and threat severity. Auto-refreshes every 60 seconds and fully white-labelable with your own branding and domain.

🍯

Distributed Honeypot Network

SSH honeypot servers capturing unauthorised login attempts and credential stuffing attacks from across the globe. Every attempt logged in real-time with full metadata.

πŸ”

Brute Force Detection

Real-time identification of automated password guessing attacks. Attack frequency, timing patterns and source behaviour analysed to classify and score each attacker.

πŸ“–

Credential Pattern Analysis

Tracking of common username and password combinations used by attackers. Targeted username lists and attack password patterns distributed as intelligence feeds.

πŸ”₯

Firewall Blacklist Feeds

Confirmed attacker IP lists updated in real-time, plus a consolidated daily master list. Compatible with iptables, ipset, fail2ban and most firewall platforms.

🌍

Geographic Intelligence

Country-level attack origin tracking with threat correlation. Highest origin country ranking, peak attack hour analysis and weekly trend reporting included.

πŸ“Š

Behavioural Scoring

Multi-dimension threat scoring per attacker IP β€” attack frequency, username targeting, historical patterns and attack vector classification. Critical, High and Medium severity levels.

🏷️

White-Label Ready

Your logo, your domain, your brand. The live attack map and intelligence dashboard can be embedded directly into your customer portal or security product as a fully branded service.

βš™οΈ Technical Specifications

Full detail of what the platform delivers

SpecificationDetail
Detection MethodDistributed SSH honeypot servers capturing real attack attempts
Attack Types DetectedBrute force, dictionary attacks, credential stuffing, port scanning
Blacklist Update FrequencyReal-time stream + consolidated daily at 02:00 UTC
IP Blacklist FormatsRaw IP list (ssh-ips.txt), consolidated combined list (ssh-combined.txt)
Credential IntelligenceTargeted username list, common attack passwords list
Threat ClassificationCritical, High, Medium severity levels
Attack CategoriesBrute Force, Dictionary Attack
Geographic CoverageGlobal β€” IP geolocation across all monitored sources
Dashboard Refresh60-second auto-refresh, real-time streaming for new attacks
Attack MapLive embeddable world map β€” sigmanetworks.co.uk/hack-map.php
AbuseIPDB IntegrationActive contributor β€” confirmed attack IPs reported automatically
Firewall Compatibilityiptables, ipset, fail2ban, pfSense and most Linux firewall platforms
White-LabelFull custom branding, domain, logo and colour scheme
Embeddingiframe-embeddable attack map for customer portals and dashboards
API AccessAvailable β€” feed integration and IP status lookup

Who Uses This

VPS & Cloud Providers

Protect your customers' servers and offer a value-added firewall intelligence feed branded as your own service. Reduce support overhead from compromised instances.

Security Vendors

Enrich your SIEM, IDS or firewall product with live SSH attack intelligence. Embed the attack map as a visual threat feed inside your security dashboard.

MSSPs

White-label the attack map and dashboard as a managed security deliverable β€” give clients a real-time window into global SSH attack activity.

Enterprise IT & SecOps

Automate firewall blacklist updates via cron. Integrate IP status lookup into your SOC workflow without maintaining your own honeypot infrastructure.

Server Administrators

One cron job pulls the latest confirmed attacker IPs directly into iptables or fail2ban. Credential pattern analysis helps identify which usernames to monitor closely.

Threat Researchers

Continuously updated corpus of real SSH attack data β€” source IPs, targeted usernames, password patterns, geographic origin and timing for research and analysis.

Pricing

Pricing depends on your specific requirements β€” feed volume, white-label scope, API access level and embedding requirements. Contact us to discuss.

SigmaNetworks Attack Intelligence

POA

Price on application β€” tailored to your integration requirements, data volume and white-label scope.

  • Live SSH attack map
  • Real-time firewall blacklist feeds
  • Distributed honeypot intelligence
  • Credential pattern analysis
  • Geographic attack analysis
  • White-label & embeddable
  • API access available
πŸ“© Request a Quote

Frequently Asked Questions

How often are the firewall blacklists updated?
The real-time confirmed attacker IP stream updates continuously. A consolidated master list is generated daily at 02:00 UTC covering all sources and typically contains 10,000+ IPs.
Can I embed the attack map in my own platform?
Yes. The live attack map at sigmanetworks.co.uk/hack-map.php is iframe-embeddable and can be white-labelled with your own domain, logo and colour scheme. We handle all the infrastructure and data feeds.
How do I integrate the blacklists with iptables or fail2ban?
Download ssh-ips.txt and add to iptables directly or use ipset for bulk blocking. For fail2ban, add a custom filter and configure the action to check against the blacklist. Full implementation guidance is provided on the platform.
What attack types are detected?
SSH brute force attacks, dictionary attacks using common credential combinations, and credential stuffing. All classified by severity and attack type with full metadata per attempt.
What is the credential intelligence feed?
The targeted usernames list shows which account names are most commonly attacked globally β€” useful for hardening and monitoring. The passwords list shows the most common attack patterns observed across the honeypot network.
Do you report to AbuseIPDB?
Yes. We are an active AbuseIPDB contributor and all confirmed attacker IPs are automatically reported, contributing to the global community blacklist.
Is there an API for automated integration?
Yes, API access is available for feed integration and IP status lookup. Details and rate limits are provided on request.

Ready to Add Attack Intelligence to Your Platform?

White-label SSH attack maps and firewall feeds β€” branded as your own service

Get in Touch Today β†’

Price on application β€’ No obligation β€’ Response within 24 hours