Illuminate the adversary

Malware Attribution Intelligence


Attacker source IP addresses


Beacons Received

Illuminated attacker callbacks


Malware C2 Instances

Attacker infrastructure enumerated


Welcome to MalBeacon

Beaconing Adversaries in the Internet's dark corners

Thanks for checking us out!

This system contains data collected on adversaries that are conducting malware attacks. For over three years we have been conducting counter-intelligence operations against these knuckleheads and are now bringing this project to light.

Follow @hexlax for frequent updates as we will be opening up registration soon!

- The MalBeacon Devs

Adversary Operating Systems

Attacker's preferred OS
Overall attacker OS preferences
  • Android 9.8 %
  • iOS 4.2 %
  • Linux 4.4 %
  • Mac OS 11.0 %
  • Other 0.0 %
  • Windows 70.6 %
© 2020 MalBeacon | All Rights Reserved