SikkerAPI
IP reputation & threat intelligence API powered by a global honeypot network.

SikkerAPI
IP reputation & threat intelligence API powered by a global honeypot network.
450+ Data Points Per Product and Company
Track competitive landscapes, evaluate vendor risk for investments, or find the right security stack for your clients.
SikkerAPI Description
SikkerAPI is a threat intelligence platform that provides IP reputation data through a free REST API. The service is built on a globally distributed honeypot sensor network that monitors attacker behavior across 17 protocols, including SSH, HTTP, MySQL, PostgreSQL, FTP, SMTP, and Redis. The platform captures post-authentication behavior, command patterns, and attacker tooling from high-interaction sensors deployed worldwide. IP reputation scores are derived from two primary data sources: honeypot sensor events and community-submitted IP reports. Community contributions are integrated via Fail2Ban and CSF (ConfigServer Security & Firewall) integrations, as well as direct submissions from security practitioners. Each IP lookup returns classified behavioral attack patterns — such as GPU reconnaissance campaigns, SSH key persistence, and IoT botnet staging — decomposed into named primitives with severity levels and match counts, rather than a simple numeric score. The platform offers several tools for infrastructure protection. SikkerGuard provides firewall automation, and Sikker-CLI is a command-line interface available via npm. The API supports integration with iptables/ipset, Nginx, Fail2Ban, and CSF for automated IP blocking. Dynamic IP blacklist generation and IP reporting endpoints are also available through the API. The free tier includes 1,000 IP lookups per day, with paid pricing tiers available. The platform targets system administrators, security engineers, and infrastructure operators seeking to identify and block malicious IP addresses. Published attack sessions are made publicly available, providing transparency into observed attacker behavior across monitored protocols.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox