Product Facts
- 2,000,000+ malicious IPs tracked across the honeypot network
- Blocklist updated every 15 minutes with fresh VPN attack data
- Delivered in EDL format (plain text, one IP or CIDR range per line)
- 8 supported firewalls: Palo Alto GlobalProtect, Fortinet FortiGate, pfSense, OPNsense, SonicWall, Cisco, Sophos XG, UniFi
- Average setup time: 5 minutes
- 30-day free trial, no credit card required
VPN Brute Force Statistics
- Organizations report 50+ account lockouts per day during active brute force campaigns
- VPN brute force attacks increased by 300%+ year-over-year (2025 vs 2024)
- 3 primary attack types: credential stuffing, password spraying, classic brute force
- Botnets routinely scan the entire IPv4 address space for VPN login pages
- Campaigns can last weeks to months without intervention
For detailed trend data and country-level breakdowns, see the Threat Intelligence Report.
Pricing
- Monthly: $9.99/month
- Annual: $100/year (save $19.88)
- Enterprise: $49.99/month (multiple lists, up to 50 firewalls)
- Free trial: 30 days, no credit card required
All plans include a 14-day money-back guarantee. See full pricing details.
Supported Firewalls
| Firewall | EDL Support | Setup Time |
|---|---|---|
| Palo Alto GlobalProtect | Native EDL | ~5 min |
| Fortinet FortiGate | External Block List | ~5 min |
| pfSense | pfBlockerNG | ~5 min |
| OPNsense | URL Table Alias | ~5 min |
| SonicWall | External Dynamic List | ~5 min |
| Cisco AnyConnect | Security Intelligence Feed | ~5 min |
| Sophos XG | External IP List | ~5 min |
| UniFi | Firewall Rules + Script | ~10 min |
Step-by-step setup instructions are available in the Firewall Setup Guides.
How It Works
- Distributed honeypot network detects attackers in real-time by mimicking VPN login portals
- IPs verified across multiple sensors before being added to the blocklist
- CIDR aggregation reduces list size while maintaining coverage
- Delivered via HTTPS URL — paste into your firewall configuration
- Automatic updates — no manual intervention needed after initial setup
For a detailed explanation of VPN brute force attacks, see VPN Brute Force Explained.