Skip to main content

Overview

What is the Live Exploit Tracker

The Live Exploit Tracker gives security teams real-time visibility into which vulnerabilities are being actively exploited in the wild, who is exploiting them, and how urgently you need to act.

Live Exploit Tracker answers the questions that matter during triage:

  • Is this CVE actually being exploited right now? Not just theoretically exploitable — are real attackers targeting it today?
  • How worried should I be? Is this mass scanning noise, or are attackers carefully selecting targets?
  • Is the threat growing or fading? Should I patch now, or is this yesterday's news?
  • Who is attacking? What do we know about the IPs involved — are they known botnets, legitimate scanners, or fresh infrastructure?
  • How do I protect my technology stack? Subscribe to the vendors you rely on and automatically block attacker IPs targeting their products — current and future threats included.

The tracker draws on telemetry from the CrowdSec Network — a global community of security practitioners sharing real-time attack signals — to provide exploitation intelligence that goes beyond what traditional vulnerability databases offer.

Key Capabilities

Prioritize

Not all CVEs deserve the same urgency. The Live Exploit Tracker provides two complementary scores and an exploitation phase classification to help you decide where to focus:

  • CrowdSec Score (0–10): A composite severity rating that accounts for both attacker sophistication and current momentum. A score of 8 means "this is actively dangerous and demands attention."
    • Opportunity Score (0–5): How targeted the attacks are. A high score means attackers are carefully selecting victims — an alert on your systems is a serious signal.
    • Momentum Score (0–5): Whether exploitation is growing, steady, or declining. A high score means a new campaign is likely underway.
  • Exploitation Phase: Where the CVE sits in its lifecycle — from insufficient data through background noise to mass exploitation.

Each tracked CVE also includes a CrowdSec Analysis — a human-readable intelligence narrative describing the vulnerability, observed exploitation patterns, and specific indicators like targeted endpoints.

Learn more about Scores & Ratings

Learn more about Exploitation Phases

Mitigate

Once you've identified a threat, the tracker lets you act on it:

  • IP Intelligence: View every IP address observed exploiting a specific CVE or probing a specific product, enriched with CTI data including reputation, geolocation, known classifications, and behavioral history.
  • Firewall Integrations: Create blocklists that automatically feed malicious IPs into your firewalls (Palo Alto, FortiGate, Cisco, pfSense, OPNsense, and more). Subscribe an integration to entire vendors, specific CVEs, or reconnaissance rules, and the blocklist stays current as new attacker IPs are observed. Vendor subscriptions automatically cover all current and future threats for that vendor's products.

Beyond CVEs: Reconnaissance Rules

Not all threats map to a single CVE. The tracker also monitors Reconnaissance rules (called "fingerprint rules" in the API) — detection patterns for product-level probing activity. For example, "Microsoft Exchange Probing" catches reconnaissance targeting Exchange servers regardless of which specific vulnerability the attacker intends to exploit.

Learn more about Reconnaissance Rules vs CVEs

How to Access

The Live Exploit Tracker is available through two interfaces:

  • Web Interface: A dashboard for browsing CVEs, viewing timelines and attacker IPs, managing integrations, and reading CrowdSec Analysis reports. Ideal for SOC analysts and security managers.
  • REST API: Programmatic access for automation, SIEM/SOAR integration, and custom tooling. A Python SDK is also available.

Both interfaces require an API key. Contact the CrowdSec team to obtain yours if you haven't already.

Next Steps

I want to...Start here
Protect my technology stack by vendorVendor Subscriptions
Understand what the scores meanScores & Ratings
Browse CVEs and assess threatsWeb Interface Guide
Automate with the APIAPI Authentication & Setup
Block attacker IPs on my firewallIntegrations & Blocklists
Investigate a specific alertTriage Workflow Guide
Set up proactive monitoringProactive Monitoring Guide