top of page

Security feed services for your internet router or website host

Helping all NETizens of good standing!
 

Fortinet, Mikrotik, iptables (ipset) and others, feed thy firewall!

 

Live txt file here: Download txt file
(50:1 redacted ip4 list) 

Current honeypot statistics: See more


Charity organisations can subscribe for free. email security-desk@supportu.nz

Castle Wall

Buy subscription for private or MSP use.

Honeypot basic blocklist subscription​

Honeypot + predictive blocklist subscription​

A cost effective fee in exchange for individuals or businesses to use this honeypot blocklist and predictive blocklists.

There is a 14day free trial period available!

NZD$120+GST, Monthly.​​​​​

Once your subscription has started you will be provided with credentials so can download the plain txt blocklist file/s.

 

We recommend the download schedule should be no more than every 4 hours or 240 mins.

 

Credential reuse and abuse detection will block your credential and a reset will be required.

You might be hosting a small bunch of business or client services as a independent contractor or managing many routers and services on behalf of your clients as a MSP, the two plans are appropriately priced.

The reasons for having a security blocklist are really quite simple

  • Your hosting websites or services like RDP and VPN that are internet accessible!

  • GeoIP blocking is too restrictive while hosting remote worker resources for your scenario.

  • You are security minded, just want the best security which is prevention!


This the cheapest option is just the current honeypot blocklist.

This blocklist is a reactive list from honeypot logging and over 99.9% effective across the entire dataset vs new IP information.

The better option for MSP's and business use is the honeypot blocklist + pattern predictive blocklists found in the plus package which is 90% effective against same day newly logged information (zero day).

 
See the honeypot stats page, the blocklist overlap with many publically available blocklists is low and proof static honeypots are missing new information on a sizeable double digit % scale.

 

A high overlap count would imply were all seeing the same bad actor IP information but that is not the case. 

​​​​

Get in Touch!

Canterbury, New Zealand

Data Two Limited t/a SUPPORTU

NZBN 9429032227307

Motorcycle
<< I use two wheels to get around!
bottom of page