Illuminate the adversary

Malware Attribution Intelligence


Adversaries

Attacker source IP addresses

36,903

Beacons Received

Illuminated attacker callbacks

529,985

Malware C2 Instances

Attacker infrastructure enumerated

46,969



Welcome to MalBeacon

Beaconing Adversaries in the Internet's dark corners


Thanks for checking us out!

This system contains data collected on adversaries that are conducting malware attacks. For over three years we have been conducting counter-intelligence operations against these knuckleheads and are now bringing this project to light.


Follow @hexlax for frequent updates as we will be opening up registration soon!


- The MalBeacon Devs

Adversary Operating Systems

Attacker's preferred OS
Overall attacker OS preferences
  • Android 10.6 %
  • iOS 4.3 %
  • Linux 4.5 %
  • Mac OS 11.3 %
  • Other 0.0 %
  • Windows 69.3 %
© 2020 MalBeacon | All Rights Reserved