Research Access Program

Request Your Free 3-Month Access

We invite researchers and students to explore our cyber deception platform free for 3 months.

Program Details

NeroSwarm Honeypot is committed to advancing research by providing free access to our innovative Deception-as-a-Service platform. Our platform includes AI-powered decoys and honeytokens designed for early breach warning and advanced threat detection.


Who Can Apply: Academics, independent researchers, and research institutions focused on cybersecurity.

Research Criteria: We are looking for projects that have the potential to impact real-world security positively and that aim to share findings with the broader community.

Email Requirement: Currently, we only accept applications from researchers and students with a .edu email address, ensuring the applicant is affiliated with a university. However, we may extend this to others in the future.

Access Level

One Cloud-Based Honeypot: Deploy a versatile cloud-based honeypot on your own server, taking advantage of our platform's extensive network protocol support to accommodate your research demands.

Unlimited Honeytokens: Use AI-generated unique and convincing content in as many honeytokens as needed, gaining insights into document interactions through our comprehensive dashboard.

Unlimited IP Reputation Research: Conduct extensive IP reputation analysis without limitations, gathering actionable intelligence on IP activities from a vast network of globally deployed honeypots to provide insights into the behaviors associated with specific IP addresses.

Qualifying Research Projects

We prioritize research projects aimed at advancing cybersecurity knowledge and practice on a global scale through the deployment of honeypots. We welcome applications from researchers and students focused on the following areas:

  • Identifying Zero-Day Exploits: Deploy honeypots to capture and analyze unknown exploits before they become widely known or patched.
  • Developing Mitigation Strategies: Use real-time data from honeypots to devise effective countermeasures against emerging threats.
  • Refining Threat Intelligence: Gather and correlate data on attack vectors, sources, and methodologies to improve threat intelligence frameworks.
  • Improving Incident Response: Leverage honeypot data to refine incident response strategies and reduce the time to detect and mitigate breaches.

Projects focused on commercial purposes, such as bug bounty hunting or internal threat analysis for companies, are not eligible for this free access.

Application Requirements

To apply, email us at [email protected] with the following:

  • Project Description: 3-4 sentences detailing your research goals and where you intend to publish or present your findings.
  • About Yourself: 2-3 sentences about your background, including your academic or research credentials.
  • Specific Needs: Please explain what specific resources or support you need from NeroSwarm to conduct your research.
  • Non-Commercial Use Confirmation: Please confirm that any data collected through the use of honeypots or honeytokens deployed as part of your research project will be used solely for non-commercial research purposes.
  • Agreement to Terms: Please confirm that you have read and agree to the terms of the NeroSwarm service agreement. ( Read our service agreement )

Application Process

1. Submit a Request:

  • To apply for research support, please submit a detailed project proposal that outlines your research goals, methodologies, and expected outcomes. In your proposal, be sure to include information about your background, such as any previous research experience, academic qualifications, and relevant publications. We encourage applicants from diverse backgrounds and fields of study to apply, as we believe that interdisciplinary collaboration can lead to innovative solutions in the field of cybersecurity.

2. Evaluation:

  • Once we receive your application, our team of experts will carefully review it based on several criteria. We will assess the potential impact of your research and how it aligns with our goals of enriching cybersecurity knowledge and practice. We will also consider the feasibility of your proposed methodologies and the potential for your research to contribute to the broader cybersecurity community. We may follow up with you to request additional information or clarification about your proposal.

3. Approval:

  • If your application is successful, we will provide you with access details and ongoing support throughout the research period.

Usage Guidelines

Researchers and students must use the platform ethically, ensuring no malicious or commercial use. Any publications or presentations must cite NeroSwarm appropriately.

Ongoing Support

Our team is committed to providing continuous support throughout your research period to help you achieve your goals. We offer a range of services to ensure that you have the resources and guidance you need to succeed, including:

  • Technical Assistance: Our team of experts is available to provide technical assistance and troubleshoot any issues you may encounter while using our platform. We can help you set up your honeypots, configure your decoys, and resolve any technical challenges that arise during your research.
  • Data Interpretation Help: We understand that analyzing and interpreting data can be a complex and time-consuming process. That's why we offer data interpretation assistance to help you make sense of the data you collect and draw meaningful conclusions from it. Our team can work with you to identify trends, patterns, and insights that can inform your research and advance your goals.
  • Guidance on Maximizing the Platform's Potential: Our platform offers a wide range of features and capabilities, and we want to ensure that you are able to leverage them to their fullest potential. That's why we offer guidance on how to use our platform effectively and efficiently, including tips on how to deploy honeypots, configure decoys, and collect and analyze data. We can also provide recommendations on best practices for conducting research in the field of cybersecurity.

Extension of Access

We understand that research projects can be complex and time-consuming, and that additional time may be needed to achieve your goals. That's why we offer the option to extend your license for an additional three months, subject to approval.
To request an extension, please submit a progress report detailing the following:

  • Achievements during the initial period: Please provide an overview of the progress you have made during the initial license period, including any milestones achieved, data collected, and preliminary findings. This will help us understand the status of your research and evaluate your request for an extension.
  • Plans for continued research: Please outline your plans for continued research during the extension period. This should include a detailed description of the research activities you plan to undertake, the methods you will use, and the expected outcomes. We encourage you to be specific and to provide as much detail as possible to help us assess the feasibility and potential impact of your research.
  • Any preliminary findings or publications: If you have any preliminary findings or publications resulting from your research, please include them in your progress report. This will help us understand the significance of your work and its potential contribution to the field of cybersecurity.

Requests for license extensions are subject to approval and will be evaluated based on the merit and feasibility of your research proposal, as well as the availability of resources. We may follow up with you to request additional information or clarification about your proposal.
If your request for an extension is approved, you will be granted access to NeroSwarm resources for an additional three months.

Publication and Citation

We are committed to supporting research that advances the field of cybersecurity, and we ask that any publications resulting from research conducted using NeroSwarm Honeypot data acknowledge our service. Proper citation of NeroSwarm in all publications is required.

If you are writing a blog post or other non-academic publication, we request that you include a link to the NeroSwarm website ( to acknowledge our contribution to your research.

If you are writing an academic paper, we ask that you use the following citation format:

We also encourage researchers to share their findings with the broader cybersecurity community. If you have published a paper or presented your research at a conference, please let us know so that we can highlight your work on our website and social media channels.

Contact Information

For any queries or to submit your application, contact us at [email protected].