About VESNX SA
VESNX SA
Our company was founded in 2017, and we have accomplished much over the years. VESNX S.A. is located in Luxemburg. We primarily focus on providing state-of-the-art security-related products for small companies and private individuals and making good cyber security affordable, accessible and understandable.
Contact Information
You can contact our general manager Richard Schepers via mail richard.scs@vesnx.com and he will get back to you.
VESNX SA
29 Bd Grande-Duchesse Charlotte
1331 Luxembourg
Luxembourg
Our corporate registration and business license No 10093473/1 can be downloaded here.
Products & Services
VESNX offers several products and services ranging from security-related soft- and hardware to consulting. All products are plug & play and are ready for use as soon as activated.
We find it essential that all products are easy to use by non-security professionals as we target the "average" person; if you see something to be confusing, then don't hesitate to get in touch with us with your concern, and we will try and incorporate your suggestions into our next update.
Facts about our intrusion detection systems & real-time data
Regularly update your computers and devices.
Servers that are managed or have been infected by cybercriminals.
Active out-of-the-box protection
Active types of threat
The data subscription will constantly replicate active threads and merge them with those configured on each IDPS device or computer. As of 38.9 Minutes ago, the Intrusion Detection & Protection Systems (IDPS) rules were updated and will detect and prevent the following threats.
Attack vector | Malware Servers |
BotNet Control Servers | 755 |
Internet Domains infecting visitors (knowing or unknowing) | 95 |
Severs used to control & distribute malware | 9 |
Active Malware
As of 38.9 Minutes ago, we noted that the following malware is actively managed via control servers and spread via infected domains. The list below shows all active viruses, Trojans, Ransomware and other actively distributed malware. Sure, having an antivirus like Microsoft Defender helps; however, we recommend actively preventing infection.
Malware | Distributing Servers |
Creal Stealer | 1 |
Remcos | 6 |
Melofee | 2 |
Active Firewall Rules
It's laborious to maintain and not always clear where cybercrime is hosted from. Luckily the Intrusion Detection and Protection System (IDPS) maintains this data for you. We would have merged the firewall rules in your system 38.9 Minutes ago. We would have removed those no longer considered a threat and ensured that the last replication of 2’998 individual configurations that are a threat are still blocked.
Country | Blocked Servers |
China | 1’038 |
Netherlands | 25 |
Germany | 25 |
United States | 237 |
India | 192 |
South Korea | 63 |
Thailand | 11 |
HongKong | 62 |
Austria | 9 |
Bosnia Herzegovina | 3 |
Kazakhstan | 12 |
Russia | 163 |
Indonesia | 88 |
Cameroon | 6 |
Ukraine | 60 |
Bangladesh | 40 |
Argentina | 32 |
Albania | 6 |
Chile | 10 |
South Africa | 23 |
Turkey | 31 |
Serbia | 11 |
Spain | 33 |
Kuwait | 2 |
Viet Nam | 35 |
Malta | 2 |
Poland | 38 |
Tunisia | 2 |
Syria | 1 |
Pakistan | 11 |
Greece | 3 |
France | 28 |
Malaysia | 1 |
Iran | 44 |
Mali | 2 |
Seychelles | 8 |
Brazil | 51 |
Moldova | 10 |
Colombia | 36 |
Hungary | 7 |
Taiwan | 20 |
Singapore | 14 |
Italy | 32 |
Sweden | 22 |
Romania | 32 |
Ghana | 3 |
Lithuania | 9 |
Czech Republic | 16 |
Zambia | 1 |
Cambodia | 15 |
Georgia | 10 |
Australia | 54 |
Belarus | 2 |
Bulgaria | 50 |
Lebanon | 1 |
Kyrgyzstan | 3 |
Libya | 1 |
Kenya | 6 |
Palestine | 4 |
UnKnown | 17 |
Jordan | 2 |
Mongolia | 5 |
Nepal | 4 |
Pitcairn | 9 |
Costa Rica | 4 |
Bolivia | 8 |
Slovakia | 4 |
Slovenia | 5 |
Mexico | 8 |
Fiji | 1 |
Canada | 18 |
North Macedonia | 3 |
Armenia | 8 |
Uganda | 3 |
Latvia | 5 |
Nigeria | 2 |
Myanmar | 1 |
Puerto Rico | 3 |
Iraq | 4 |
Montenegro | 1 |
Paraguay | 2 |
Panama | 1 |
New Zealand | 1 |
Peru | 2 |
Honduras | 6 |
Azerbaijan | 2 |
Malawi | 1 |
Croatia | 2 |
Guatemala | 2 |
Ecuador | 4 |
Belgium | 7 |
New Caledonia | 2 |
Switzerland | 1 |
French Polynesia | 2 |
Portugal | 3 |
United Kingdom | 15 |
Turkmenistan | 2 |
Japan | 25 |
Morocco | 3 |
DominicanRepublic | 1 |
Macao | 5 |
Venezuela | 6 |
SriLanka | 1 |
Saudi Arabia | 2 |
Luxembourg | 1 |
Israel | 10 |
Somalia | 1 |
Nicaragua | 1 |
Egypt | 2 |
Iceland | 1 |
Norway | 4 |
Ireland | 1 |
Cyprus | 2 |
Denmark | 1 |
Tanzania | 1 |
Algeria | 1 |
Ethiopia | 3 |
The future
- Go to market with our IPDS-enabled hardware like WiFi Routers and Firewalls.
- Hire and train more people to expand our team.
- Expand our service so that firewall vendors, law enforcement and security researchers can access our virtual lab, see the malware byte code, reverse-engineered malware source code, and inspect infected virtual machines.
- We will provide you the user with virus removal and data recovery tools.
- Allow you to engage our "red team", and we will see how protected your systems are.