Honeypod Tracker: Identifying and logging IP addresses that interact with decoy ports.
Our system collects valuable data on potential attackers by monitoring unsolicited connection attempts.
Strengthen your network security with real-time threat intelligence.
Personal Use
Personal / Business Use
A Honeypod is a decoy system designed to attract and detect unauthorized or malicious connection attempts. In the FLOD-Project, multiple distributed systems monitor connection attempts on various ports. These systems are not part of any productive environment and have no legitimate services running. Any connection to these Honeypods reliably indicates port scans, probing, or other potentially harmful activities.
Send your request and view result.
Live metrics calculated by the system.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
How does FLOD work? We use a large number of servers worldwide to filter out unwanted and unusual requests to IP addresses and services. All slave systems send their collected diagnostic data to the master server in real time. Blacklists are created in real time from the data from the master servers. This allows connections to be blocked at the first level in firewalls and on various operating systems. The systems run day and night and always provide live data.
Even though our systems serve both IPv4 and IPv6 requests, we rarely detect connection attempts via IPv6. Nevertheless, we are constantly increasing the number of breadcrumbs we provide.