See Exploits Land Before the Advisory Drops
Real-time honeypot intelligence. Pick a plan, start seeing attacks.
Defused TF and EX (External Threat Intelligence)
Defused TF
- โ Manual analysis & learning
- โ Non-operational research
- โ No API or integrations
Defused EX
- โ 10 always-on decoys
- โ Choose your Geolocation
- โ REST API access
- โ Webhook, syslog & SIEM integrations
- โ Radar anomaly detection
- โ Custom decoy branding & applications
Mix and match TF + EX
TF and EX are designed to complement each other. Use TF for broad internet threat telemetry across our shared sensor network, and add EX to deploy bespoke decoys that mirror your real infrastructure. Cross-reference TF's wide-angle data with EX's targeted signals to identify campaigns specifically probing your technology stack. Subscribe to both independently - no bundling required.
| Feature | Starter | TF Research | TF Pro | TF Enterprise | EX |
|---|---|---|---|---|---|
| Data Access | |||||
| Live honeypot streams | Rotating | 10 | 20 | Unlimited | - |
| Dedicated bespoke decoys | - | - | - | - | 10 |
| Custom decoy branding | - | - | - | - | โ |
| Geolocation selection | - | - | - | - | โ |
| PCAP collection | - | - | - | - | Add-on |
| Platform & Integrations | |||||
| Console dashboard | โ | โ | โ | โ | โ |
| REST API | - | - | โ | โ | โ |
| Webhook / syslog | - | - | โ | โ | โ |
| SIEM integration | - | - | โ | โ | โ |
| Radar anomaly detection | - | - | โ | โ | โ |
| Users & Support | |||||
| User seats | 1 | 1 | 3 | Unlimited | 5 |
| Support | Community | Priority email | Dedicated | Priority email | |
| Custom SLA | - | - | - | โ | - |
| License | |||||
| Research & education | โ | โ | โ | โ | โ |
| Internal defensive operations | - | - | โ | โ | โ |
| Commercial redistribution | - | - | - | โ | - |
| Pricing | |||||
| Monthly | Free | $50 | $299 | Custom | From $599 |
Coming Soon
Builder (coming soon)
Defused IB (Internal Breach Detection)
Defused IB
- โ IT, OT & identity decoys
- โ Unlimited decoy servers & Windows agents
- โ On-premise & cloud deployments
- โ Automated responses & SOAR integration
- โ Full API, SIEM & webhook integrations
- โ RBAC & multi-tenant governance
- โ Dedicated support & custom SLA
- โ Bespoke decoy tailoring included
Who is IB for?
Organizations with mature security programs that need to detect lateral movement, credential theft, and insider threats before damage is done. IB deploys deceptive infrastructure inside your network - decoy servers, honeytokens, and endpoint agents that generate high-fidelity alerts with near-zero false positives.
How it works
- 1. Scoping call to map your network topology and threat model
- 2. We design and deploy deceptive assets tailored to your environment
- 3. Ongoing monitoring, tuning, and triage by the Defused team