TXOne unveils its one-of-a-kind live IoT/ICS Threat Atlas

Jul 03, 2020

Over the last year TXOne Networks’ researchers have received and analyzed more than 45 terabytes of traffic, detected more than 1.1 billion attacks, searched more than 400 million malicious IPs and more than 30 million malicious domains, and analyzed more than 1 million malicious files. From this information, as well as live incoming data, our one-of-a-kind IoT/ICS Threat Atlas generates a live visual of what’s happening on the global IoT network.


Our threat-hunting systems inspect malicious traffic that our sensors detect, and categorize it by signature, which is then output on the Threat Atlas with information about what the most common attacks are at this time. Threats are classified according to the TXOne Networks researchers’ system of naming and classifying different threat types. This will usually include the kind of protocol followed by the means of attack. Take “SMB_(Possible_MS17-010_exploit)” as one example — It’s showing the type of traffic or attack, SMB (a commonly-used protocol for Windows Devices), and our inspector sensed that it’s similar to a specific type of exploit, MS17-010.


SMB: A very useful, but also very complicated, protocol for Windows devices – a Windows service file or a Windows user files will use this protocol to transfer files. If a hacker targets the SMB protocol, it’s to find security flaws in the protocol so they can write exploit code to attack this protocol. A successful attack on the SMB protocol could, for example, allow a hacker to harm or take over a Windows PC.


Our Threat Atlas shows all activity of these known threats that takes place within vision of our over 200 sensors. These sensors alone detect more than 100 types of attack in an hour. Through this information, we can form a clear picture of what kinds of threats are in most common use, and which are the most important to consider when securing your work sites and critical assets.


EdgeIPS and EdgeFire offer virtual patch technology which can be used to prevent attacks such as these from exposing legacy and unpatched systems to successful cyber attack.


Visit our IoT/ICS Threat Atlas and start learning about the modern threat environment today.

TXOne image
TXOne Networks

Need assistance?

TXOne’s global teams are here to help!

Find support