Defused TF - Curated Honeypot Streams
Defused TF provides a real-time stream of attack data collected from distributed network of honeypots. It enables security researchers, detection engineers, IT personnel and threat intelligence teams to monitor and analyze live adversary behaviour against specific honeypot profiles.
TF uses a simple subscription-based flow which allows curating a feed out of profiles you are interested in.
Our honeypot profiles include many of the most popular enterprise technologies, and we are adding new honeypot types into the capabilities repository on a weekly basis.
Overview
Defused TF makes it simple to:
- Subscribe to honeypot feeds across various technologies
- Monitor live attack traffic including payloads
- Correlate behavior across attacker infrastructure and campaigns
- Export data for building detections, threat intel reports, blogs and other relevant media
Key Capabilities
| Capability | Description |
|---|---|
| Real-Time Feed Access | Subscribe to livestreams of honeypot activity |
| Payload Visibility | Inspect dropped or embedded payloads from active exploitation attempts |
| Data Export | Export individual events for further offline analysis (CSV) |
| Threat Intelligence Enablement | Use collected data to inform blogs, advisories, and customer reports |
Example Use Cases
Pre-emptive Threat Blocking
Identify malicious IPs targetting assets & applications you are running, and pre-emptively add them to your blocklist.
Example workflow:
- Find and subscribe to suitable intel streams on the capabilities page
- Watch for surges in login bruteforcing, exploits or other malicious activity, like version fingerprinting
- Bulk select associated events
- Use the export function to download associated IPs as a CSV file and use in your blocklist tooling
Threat Research and Intelligence
Track live exploit activity as it happens. Identify trends in exploit targets, payload delivery, and attacker infrastructure.
Example workflow:
- Subscribe to the Defused TF Cisco ASA Honeypot Feed
- Watch for surges in login bruteforcing, simulataneous exploits or similar anomalous activity
- Observe payloads for further pivots
- Export, correlate with existing / other data sources and publish findings in internal or public intel briefs
Threat Reporting to Customers
Deliver value-added reporting to clients based on observed activity.
Example workflow:
- Correlate Defused TF events with customer infrastructure
- Highlight relevant TTPs and indicators
- Include verified payload data in your intel reporting
Detection Engineering
Use real-time attacker activity to strengthen your defensive content.
Example workflow:
- Filter events by exploit signature or payload characteristics
- Generate detection logic (Sigma, YARA, Suricata, Splunk, or other)
- Validate rules against live incoming data
- Deploy detections to production SOC pipelines
Content Creation & Education
Leverage live attack streams for blogs, talks, and educational content.
Example workflow:
- Monitor high-volume exploit campaigns
- Visualize trends over time (e.g., surge in CVE-2025-64446 usage)
- Write technical breakdowns or advisories
- Embed anonymized live feed snippets for illustration
Integration Options
- Web Console: Interactive UI to browse and replay activity
- Export Formats: export selected intel events to CSV
- Automated Integrations: Coming soon to TF Business/Enterprise subscriptions
Getting Started
- Sign up for a Defused account
- Choose feeds from interesting technologies
- Subscribe via UI
- Start analyzing live attack data immediately