Illuminate the adversary

Malware Attribution Intelligence


Adversaries

Attacker source IP addresses

40,859

Beacons Received

Illuminated attacker callbacks

632,386

Malware C2 Instances

Attacker infrastructure enumerated

51,049



Welcome to MalBeacon

Beaconing Adversaries in the Internet's dark corners


Thanks for checking us out!

This system contains data collected on adversaries that are conducting malware attacks. For over three years we have been conducting counter-intelligence operations against these knuckleheads and are now bringing this project to light.


Follow @hexlax for frequent updates as we will be opening up registration soon!


- The MalBeacon Devs

Adversary Operating Systems

Attacker's preferred OS
Overall attacker OS preferences
  • Android 9.8 %
  • iOS 4.2 %
  • Linux 4.4 %
  • Mac OS 11.0 %
  • Other 0.0 %
  • Windows 70.6 %
© 2020 MalBeacon | All Rights Reserved