Illuminate the adversary
Malware Attribution Intelligence
AdversariesAttacker source IP addresses
Beacons ReceivedIlluminated attacker callbacks
Malware C2 InstancesAttacker infrastructure enumerated
Welcome to MalBeacon
Beaconing Adversaries in the Internet's dark corners
Thanks for checking us out!
This system contains data collected on adversaries that are conducting malware attacks. For over three years we have been conducting counter-intelligence operations against these knuckleheads and are now bringing this project to light.
Follow @hexlax for frequent updates as we will be opening up registration soon!
- The MalBeacon Devs
Adversary Operating Systems
Attacker's preferred OS
- Android 10.3 %
- iOS 4.3 %
- Linux 4.5 %
- Mac OS 11.2 %
- Other 0.0 %
- Windows 69.8 %