One detection.
Every server blocks it.

Threat404 connects independent servers into one shared defense layer. A single 404 scanner detection anywhere instantly protects every member at the firewall — no agents, no dashboards, just results.

threat404-sync.sh • live on 62 nodes
curl -s https://api.threat404.cloud/blocklist \
  | xargs -I {} ipset add threat404_v4 "{}" 2>/dev/null
# Blocking 2,478 IPs network-wide
# Last sync: 52s ago
THREE STEPS

Automatic collective defense

Detect

Local script scans logs for 404 probe patterns (wp-admin, .env, backups, exploit paths). No dependencies, no outbound calls until match.

Share

Signed attacker IP posted to central nodes. No origin info leaked. Private IPs rejected automatically.

Block

Members pull blocklist ~every 12 min, apply to ipset + iptables. Dropped at kernel level — zero app impact.

WHAT YOU GET

Built for operators who hate scanners

Kernel-level blocking

ipset + iptables. Scanners never reach your web server or application — zero overhead on clean traffic.

Any server stack

Apache, Nginx, Caddy, LiteSpeed, Go — anything with standard logs and cron works. No plugins required.

Dual-stack IPv4 + IPv6

Separate lists and rules for both. Modern bots scan both — Threat404 blocks both.

No dashboard required

Just scripts + cron. Optional WP MU-plugin dashboard if you want stats inside WordPress.

Authenticated & private

Cryptographic signing. No member sees who reported an IP. Loopback/private ranges blocked server-side.

Network effect

More members = stronger protection for everyone. One detection anywhere benefits the whole collective.

EARLY ACCESS

Join the private network

No sales. No credit card. Just instant shared blocking.