+

Internet scale real-time intelligence.

We scan the entire internet space and create real-time threat intelligence streams and reports that show the exposure of your perimeter to the world.

2,000,000,000

Events per month

200

Ports

Data Points

Datapoints Icon

Access To Data

Self-Service Portal

Use our Portal to query the data generated by 40fy and other datasets from BinaryEdge.

These include:
- Torrents, Dataleaks, Risk Score, Remote Desktops, and Service Exposure.

https://app.binaryedge.io

Enterprise Access

Get Full access to our datasets, real-time streams and on-demand scans, that show the exposure of your organization or those of your clients.
Contact us at [email protected]

Features

Realtime Icon

Real-time Stream

View in real-time our firehose of worldwide scans. Our real-time stream will provide you with a simple way to view the data that we produce by scanning the entire internet, you can also have your custom stream with the jobs you request.


Modules Icon

Custom Scans and Modules

Submit your own custom modules
If you want to acquire data about some specific use case or test your perimeter for the latest vulnerability, you can submit custom modules which we can deploy on our platform. Currently we acquire data from scanning, torrent downloads, public data leaks, and much more...


Historical Icon

Archive and Historical data

If you don’t want to consume data via a stream you can request scans and get them in your own personal archive. You can also query our platform for all information about a specific IP address or port.

Conferences & Talks

To learn a bit more about the 40FY platform watch these videos of presentations we have done about the service.

BSides Lisbon 2015

BSidesLisbon2015 - Security Metrics: Why, where and how? - Tiago Henriques / Tiago Martins

Security Metrics, when used correctly can help you paint a picture on the status of ur Security, they can also help you make security decisions so that you can prioritize and reduce the risk when making these decisions.


BSides Lisbon 2016

I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACHINE LEARNING IN CYBERSECURITY

In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scann ing and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way

Media

The Register

"Misconfigured Big Data apps are leaking data like sieves
BinaryEdge concludes that it found close to 1,175 terabytes (or 1.1 petabytes) of data exposed online, after looking into just four technologies as part of an online scan"

IT News

- Companies leaking big data troves onto the internet
"Binaryedge said it discovered almost 200,000 big data systems that were publicly addressable. Such systems were found running on a wide range of companies, from start-ups to Fortune 500 businesses."

Top