Outnumbering cybercriminals all together

CrowdSec is an open-source and collaborative IPS (Intrusion Prevention System) and a security suite.
We leverage local behavior analysis and crowd power to build the largest CTI network in the world.

Illustration of the heart not yet protect by CrowdSecIllustration of the heart not yet protect by CrowdSec

WHY CROWDSEC

Cybercriminals use compromised machines’ IP addresses to stay anonymous. But by teaming together, Sysadmins, Devops & Secops can outnumber them and burn all their precious masks. That is the essence of CrowdSec: a collaborative Cyber Security effort to secure the Internet, our countries, companies, institutions, privacies, personal data.

All together

PRODUCTS

Discover our products

CrowdSec offers a crowd-based cybersecurity suite, designed to protect your online services, a dashboard to visualize & act upon threats and a TIP (Threat Intel Platform) to block IP known to carry aggressions

HOW TO GET started?

01
Create an account on the Console
02
Install the Agent on your servers
03
Use global CTI to detect cyberattacks
Crowdsec Console
01
CrowdSec Console

The cockpit to monitor your server's security, visualize intrusion attempts, get alerts on unusual activities, and collect intelligence on IP addresses.

graphic illustration for the product crowdsec console
02
CrowdSec Agent

The collaborative malicious activity detection and remediation tool. And it’s open-source!

graphic illustration for the product crowdsec agent
Crowdsec Agent
03
CrowdSec Threat Intelligence

The biggest Cyber Threat Intelligence (CTI) network on earth, fueled by the CrowdSec community. 

graphic illustration for the product crowdsec threat intelligence

CrowdSec in figures

Alpaga icon

6.5 million

Rogue IPs under scrutiny

Yellow Github Icon

5.6k

Stars on GitHub

Earth icon

175

Countries

People icon

112k

Installations

Curved blue backgroundCurved blue backgroundCurved blue background

The open-source and participative cyber defence solution

CrowdSec runs on Unix & Windows, VMs, containers or bare-metal servers. It can even be interfaced with your existing code through our API.

3 alpacas with sunglasses in an icon

Collaborative Security

Our strength comes from our cybersecurity community that is burning cybercriminals’ anonymity. By sharing IP addresses that aggressed you, you help us curate and redistribute a qualified IP blocklist to protect everyone preventively. Through collaboration, we provide security to the largest number.

Icon to illustrate global protection

Local detection - global protection

CrowdSec acts on two levels.

Locally, on your servers where the Agent analyzes activity logs in real time, identifies suspicious behavior, acts upon IPs and shares the data with the community.

Globally, by aggregating, curating and redistributing blocklists to the community, to preventively block all flagged IPs on every CrowdSec user's machine.

Icon representing a rocket to illustrate high performance

High Performance

Developed in Go for ultra fast execution and low-memory footprint, CrowdSec can analyze thousands of lines of logs without impact on user service.


No matter if your servers or attackers are using IPV4 or IPV6 addresses, CrowdSec will do the job.

Dashboard icon

Observability

Dashboards are great steering tools. CrowdSec is instrumented with Metabase & Prometheus to help you with visualization.

With the CrowdSec console, you can manage fleets of servers, visualize attacks and alerts in real-time and remediate intrusion attempts.

Earth Icon to illustrate cumulating layers of defence

Have an EDR / XDR / NDR? Awesome

Cybersecurity is about cumulating layers of defense. If you already use security tools to protect your assets, CrowdSec integrates nicely with stacks already in place through APIs to feed them with intelligence and boost their efficiency.

Control icon to illustrate GDPR compliance

GDPR Compliant

Sharing is caring but privacy matters even more. We collect the very strict minimum in order to be GDPR compliant. We never export your logs . The only data sent for curation are a timestamp, the aggressive IP, and the scenario used in the attack.

Icon representing a magic wand to illustrate the ease of use

Ease of use

CrowdSec is developed by former pentesters, SecOps & DevOps, to be a fire-and-forget and easy-to-deploy software.

CrowdSec is available on a variety of OS & containers, and integrated with a large number of services (servers, proxies, WAFs , etc.).

3 alpacas with sunglasses in a medal

Join the crowd

Our core advantage over cyber criminals? Numbers. We have to stand as a crowd and act in a coordinated way. When you, Sysadmins, DevOps & SecOps join forces, you outnumber them and can burn their IPs one by one, crippling this precious anonymity.

Illustration of the world map, with little alpacas everywhere, carrying flags
Illustration of an insect robot
Illustration of a crab robot

Leverage CrowdSec across diverse industries

Select
CrowdSec for 

VOIP

VOIP operators are frequently the target of credential thefts, allowing criminals to call additionally taxed telephone number services they own to cash-in money. CrowdSec protects VOIP servers by detecting and blocking credential brute forces attacks.

VOIP
CrowdSec for 

Ecommerce

Ecommerce websites are amongst the most attacked websites. Most commun attemps include page scraping, credit card stuffing, credential stealing or scalping. CrowdSec provides protection against intrusion attempts by detecting all malicious activity and banning nefarious traffic while limiting false positives.

Ecommerce
CrowdSec for 

MSSP

CrowdSec offers Managed Security Service Companies a simple all-in-one tool to monitor intrusion attempts on fleets of servers. Able to detect a large variety of attacks, CrowdSec comes with a dedicated SaaS tool to visualise and remediate all nefarious activity.

MSSP
CrowdSec for 

SOC teams

With 50% of internet traffic generated by bots, Security Operations Center analysts are frequently overwhelmed with alerts and false positives. CrowdSec identifies automated and malicious trafic to feed only highly curated data to analysts, to remove alert fatigue and allowing users to focus on high priority threats.

SOC teams

Discover how companies are using CrowdSec

See all use cases

Lookopen

We had a chat with Dyllan Pascoe, co-founder of Lookopen. Find out how he used CrowdSec and how it helped him secure his clients' IT assets.

Read use case

Siegler Informatique

Yannick Siegler has been one of our earliest adopters and most involved community members. Discover his CrowdSec use cases, both personal and professional.

Read use case

EsyOil

Esyoil is using CrowdSec to bring multiple data sources together and block IPs before they even act, leveraging log analysis.

Read use case
2 purple alpacas in suits and sunglasses

Open-source since Day 1

At CrowdSec we believe the best way to develop cybersecurity software is through open-source. We are all about transparency, trust and code quality. 

The Agent has always been and will always remain open source (MIT license). We will open source other components of the CrowdSec solution in the future.

Where you can use CrowdSec

OS

Linux
Linux
Coming soon
FreeBSD
FreeBSD
Coming soon
Windows
Windows
Coming soon
Open WRT
Open WRT
Coming soon

Services

Iptables
Iptables
Coming soon
Nftables
Nftables
Coming soon
Nginx
Nginx
Coming soon
Apache
Apache
Coming soon
Caddy
Caddy
Coming soon
PF
PF
Coming soon
Traefik
Traefik
Coming soon

Languages & Frameworks

JS
JS
Coming soon
PHP
PHP
Coming soon
Wordpress
Wordpress
Coming soon
Python
Python
Coming soon

Platforms

Cloudflare
Cloudflare
Coming soon
AWS
AWS
Coming soon
Docker
Docker
Coming soon

DIVE INTO CROWDEC’S UNIVERSE

Get started with
CrowdSec today