Illuminate the adversary

Malware Attribution Intelligence


Adversaries

Attacker source IP addresses

35,732

Beacons Received

Illuminated attacker callbacks

500,276

Malware C2 Instances

Attacker infrastructure enumerated

45,282



Welcome to MalBeacon

Beaconing Adversaries in the Internet's dark corners


Thanks for checking us out!

This system contains data collected on adversaries that are conducting malware attacks. For over three years we have been conducting counter-intelligence operations against these knuckleheads and are now bringing this project to light.


Follow @hexlax for frequent updates as we will be opening up registration soon!


- The MalBeacon Devs

Adversary Operating Systems

Attacker's preferred OS
Overall attacker OS preferences
  • Android 10.8 %
  • iOS 4.3 %
  • Linux 4.5 %
  • Mac OS 11.1 %
  • Other 0.0 %
  • Windows 69.2 %
© 2020 MalBeacon | All Rights Reserved