See Exploits Land Before the Advisory Drops

Real-time honeypot intelligence. Pick a plan, start seeing attacks.

Monthly Yearly Save 20%
๐Ÿงช

Starter (Free)

Rotating free feeds Subscribe to rotating honeypot feeds for free
Get started
Defused TF/EX

Defused TF and EX (External Threat Intelligence)

TF โ€ข DATA LICENSE
10
Streams
$50
Monthly
Research
Tier

Defused TF

Streamed Data from Our Honeypots
  • โœ” Manual analysis & learning
  • โœ” Non-operational research
  • โœ– No API or integrations
EX
10
Full-time honeypots
Customize
Custom applications
Integrate
To Your Security Stack

Defused EX

Deploy your own Managed Internet Honeypots
$599
Monthly subscription
  • โœ” 10 always-on decoys
  • โœ” Choose your Geolocation
  • โœ” REST API access
  • โœ” Webhook, syslog & SIEM integrations
  • โœ” Radar anomaly detection
  • โœ” Custom decoy branding & applications
๐Ÿ”—

Mix and match TF + EX

TF and EX are designed to complement each other. Use TF for broad internet threat telemetry across our shared sensor network, and add EX to deploy bespoke decoys that mirror your real infrastructure. Cross-reference TF's wide-angle data with EX's targeted signals to identify campaigns specifically probing your technology stack. Subscribe to both independently - no bundling required.

Feature Starter TF Research TF Pro TF Enterprise EX
Data Access
Live honeypot streams Rotating 10 20 Unlimited -
Dedicated bespoke decoys - - - - 10
Custom decoy branding - - - - โœ”
Geolocation selection - - - - โœ”
PCAP collection - - - - Add-on
Platform & Integrations
Console dashboard โœ” โœ” โœ” โœ” โœ”
REST API - - โœ” โœ” โœ”
Webhook / syslog - - โœ” โœ” โœ”
SIEM integration - - โœ” โœ” โœ”
Radar anomaly detection - - โœ” โœ” โœ”
Users & Support
User seats 1 1 3 Unlimited 5
Support Community Email Priority email Dedicated Priority email
Custom SLA - - - โœ” -
License
Research & education โœ” โœ” โœ” โœ” โœ”
Internal defensive operations - - โœ” โœ” โœ”
Commercial redistribution - - - โœ” -
Pricing
Monthly Free $50 $299 Custom From $599

Coming Soon

BUILDER

Builder (coming soon)

Construct custom honeypot ops incl. outlook modifications, custom certs, and more
Professional Services
Defused IB

Defused IB (Internal Breach Detection)

IB โ€ข ENTERPRISE
IT/OT/ID
All decoy domains
โˆž
Servers & agents
Auto
Response & SOAR

Defused IB

Managed Cyber Deception for Internal Breach Detection
Tailored pricing
Scoped to your environment
Defused IB is a bespoke deception deployment engineered for organizations that treat breach detection as a first-class security function. Every engagement is scoped, architected and operated by our team - from decoy topology design through ongoing tuning and incident triage. This is not a self-serve product.
  • โœ” IT, OT & identity decoys
  • โœ” Unlimited decoy servers & Windows agents
  • โœ” On-premise & cloud deployments
  • โœ” Automated responses & SOAR integration
  • โœ” Full API, SIEM & webhook integrations
  • โœ” RBAC & multi-tenant governance
  • โœ” Dedicated support & custom SLA
  • โœ” Bespoke decoy tailoring included
Request scoping call

Who is IB for?

Organizations with mature security programs that need to detect lateral movement, credential theft, and insider threats before damage is done. IB deploys deceptive infrastructure inside your network - decoy servers, honeytokens, and endpoint agents that generate high-fidelity alerts with near-zero false positives.

How it works

  • 1. Scoping call to map your network topology and threat model
  • 2. We design and deploy deceptive assets tailored to your environment
  • 3. Ongoing monitoring, tuning, and triage by the Defused team