Spitfire launches live honeypot attack map revealing 88,000 attacks on a public IP in 24 hours
Harry Bowlby, Managing Director
14 April 2026
-New real-time honeypot tracker reveals the scale of automated cyber attacks targeting public IP addresses-
-88,000+ attacks recorded in just 24 hours-
-Majority of attacks appear to originate from the US, though attackers may be masking their true location-
LONDON, UK. 14 APRIL 2026 – Spitfire Network Services Ltd (Spitfire), the award-winning provider of voice, internet, IoT and wide area connectivity services, today launched a live honeypot cyber-attack tracker, revealing the relentless scale of automated attacks targeting publicly exposed IP addresses. In just the past 24 hours, Spitfire’s monitoring system recorded more than 88,000 attack attempts against a single public IP address.
The honeypot – a type of security system used to highlight the growing threat of malicious actors – is exposed to the Internet and is now accessible online to be viewed and analysed globally:
In the past 24 hours the honeypot recorded:
- 88,994 times in total.
- 1605 attacks per hour.
- 14 attacks every minute.
Attacks are broken down by location, although there is a strong possibility those orchestrating the attacks are using temporary virtual machines to mask their exact location.
“We originally developed this tracker internally, but we felt now was the right time to make it public so people can see just how active cyber attackers really are,” said Harry Bowlby, Managing Director at Spitfire Network Services Ltd. “The volume of attacks is startling. Every organisation with a public-facing IP address is constantly being probed by automated tools searching for vulnerabilities. Business leaders need to understand that exposure to the internet means being targeted.”
“The risk to any organisation could quite literally upend their business. Once an attacker has access to a single device on a network, they can use that to then infiltrate other devices in that network. In the worst case scenario, malicious actors will make sure you are unaware of this vulnerability for as long as possible before potentially launching a ransomware attack on your network, which can be business critical from the interruption to business activity and the high financial cost of regeneration of lost data, the restoration of damaged IT systems, and should it be paid, the high financial cost of the ransom. This is a major reason why the secure private networking across fixed line, mobile and cloud offered by Spitfire’s One Network® is such an industry leading solution for businesses,” added Bowlby.
To access the live honeypot attack map, click here.
For more information or to contact Spitfire Network Services Ltd directly, organisations should visit www.spitfire.co.uk.
ENDS
Spitfire has been providing internet and telecoms services from our central London offices for 35 years.
With an emphasis on engineering skills and customer service, we aim to build long-term relationships with our clients – delivering innovative, award-winning solutions and significant cost savings to businesses and organisations.
This approach has seen us grow from a modest start-up to a business with more than £23m turnover and over 100 staff.
