Being a good steward of the information security community means giving back data through information exchanges. Our goal is aggregate threat data from our own sources and 3rd party sources and provide a comprehensive threat reputation database. This threat reputation database can be used to apply security rules on your infrastructure to block and identify attackers in a more meaningfull way.
We actively run Honeypots that are distributed across multiple networks. We also ingest data from 3rd party feeds to further strenghten our lists.
We collect and aggregate data on compromised and/or malicious IP addresses. These addresses can be acquired via our lists for applying rules, foresnics, or research purposes.
We collect statistics via our Honeypots such as trends, geo data, and comproimised usernames and passwords. This data is shared to periodical reports that show how the security landscape is evolving.