What is Bait?

Bait is a system capable of collecting, analyzing and correlating cyber threat information.
Right now Bait is under development. We have launched crowdfunding to finance this project, if you want you can give us your contribution. Thank you.

Use threat intelligence to prevent attacks

Bait offers the ability to access a cyber threat database via a secure API channel. Having a history of cyber attacks, knowing where malware resides, which domains contain exploits, and phishing websites is essential for facilities like SOC and CERT.
Bait is a system capable of acquiring, analyzing and classifying information of various kinds collected by its honeypot network.

SERVICES

Services we
offer for you

Download Database

This mode allows you to download complete or part of the database.
Useful for facilities that need to have a large amount of data at home

Cyberg Threat Feed

The feed mode provides access to a dataset of information in csv format, useful for the automatic classification go threats during the detention and blocking process

Cyberg Threat Hunting

The Hunting mode provides the ability to search for information and IOCs present in the database using advanced queries.

HONEYPOT

Bait uses different types of honeypots to collect information

OUR WORK PROCESS

How the Bait process works

1

Collect Threats

Using the honeypot network Bait collects cyber threats.
2

Analyze information

Data received on the threat Bait analyzes, processes and enriches the information.
3

Store the Data

when the data have been analyzed and processed they are saved in the database making them available to users.

WHY CHOOSE US

Reason for people choose us

Global Honeypot Network

Our honeypot network is distributed almost all over the world which allows us to track the movements of hackers on a global scale.

Data Updated Every Day

Our data is updated daily ensuring a constant release of information.

IOCS

Bait is able to extract a list of IOCs from honeypot data.

IP

IP addresses referable to threats and/or malicious actors.

Domain

Domains used to host and distribute malware, unreliable domains or involved in other threats.

URL

URLs known as phishing sites, websites that hosts Exploit Kits or involved in other threats.

E-Mail

Emails used for spam, phishing or malware distribution campaigns

User Credential

Customer compromised emails or accounts.

Malware Sample

File recognized as malicious and related to old or new threats.