Second Edge

What we do

Security (mostly), including architecture, design, implementation, automation, and the occasional pen-testing.

This site

A breakdown of the different attacks our honeypots/systems have experienced over the last 7 days, a world map to see where the majority of attacks are coming from, and download links for the threat intelligence data (updated hourly).


Queries can be sent to queries <at>


Entries are automatically submitted to the AbuseIPDB service periodically.