Home Security
Assistant
A custom Home Assistant integration that provides real-time network security monitoring for your home.
It combines passive NetFlow/IPFIX traffic analysis with active network scanning, external IP threat intelligence,
DNS blacklist checks, and vulnerability detection — all presented through a dedicated multi-view sidebar dashboard.
Get it on GitHub
Explore Features

Network Flow Analysis
Passively monitor all your network traffic without installing agents on any device.
Home Security Assistant listens for NetFlow v5, v9, and IPFIX datagrams on a configurable UDP port and classifies
internal vs. external traffic using your configured CIDR ranges.
- Tracks per-device flow counts, byte volumes, and connection history
- Detects suspicious patterns: outbound traffic to commonly abused ports, port scanning, unusual egress volume
- Works with any standard NetFlow/IPFIX exporter — no proprietary hardware needed

Active Network Scanner
Go beyond passive monitoring with optional ping + port scanning of all observed internal hosts.
The scanner runs on a configurable interval and discovers services even when hosts block ping.
- Configurable scan ports — specify individual ports, ranges, or both (e.g.
22,80,443,8000-9000). Defaults to 47 well-known ports
- HTTP fingerprinting — lightweight WhatWeb-style technology detection identifies CMS platforms
(WordPress, Joomla, Drupal), web servers (Tomcat, IIS, Caddy), applications (Grafana, GitLab, Nextcloud, Pi-hole, Synology DSM, UniFi),
and runtimes (PHP, Node.js, ASP.NET)
- Reports alive status, ping latency, open ports, OS fingerprint, and detected technologies per host

External IP Intelligence
Every external IP that communicates with your network is automatically enriched with threat intelligence
from multiple sources, giving you unparalleled visibility into who is connecting to your home.
- Enrichment from IPInfo.io, VirusTotal, Shodan, and AbuseIPDB (all optional, API keys configurable)
- Reverse DNS resolution for external IPs
- Checks external IPs and hostnames against threat intel blacklists (abuse.ch feeds by default, fully customizable)
- Configurable retention window for external IP history (default 24 hours, or keep forever)

Vulnerability Detection
Proactively discover known vulnerabilities on your network before attackers do.
Home Security Assistant queries the NIST National Vulnerability Database (NVD) and cross-references findings
against the CISA Known Exploited Vulnerabilities catalog.
- NVD enrichment — precise CPE vendor/product filtering for 20+ service mappings: SSH (OpenSSH, Dropbear), HTTP (Apache, nginx),
MySQL/MariaDB, FTP, SMTP, Redis, MongoDB, PostgreSQL, Samba, MQTT, and more
- Service-aware prefetching — only queries NVD for services actually detected on your network
- HTTP technology validation — CVEs for web applications are only reported if the technology was confirmed via HTTP fingerprinting,
eliminating false positives
- CISA KEV flags — highlights CVEs under active exploitation in the wild
- Version-range matching — checks if your exact detected version falls within a vulnerable range

Device Fingerprinting & Enrichment
Every device on your network is automatically fingerprinted and categorized, giving you a complete inventory
of your connected home.
- Infers device roles: gateway, camera, IoT, unknown, etc.
- Editable roles — correct any auto-detected role via dropdown; overrides persist across restarts
- Enriches device identities from Home Assistant
device_tracker entities (IP, name, hostname, MAC)
- Flags devices with known high/critical CVE vulnerabilities as "at risk"

Actionable Security Findings
No more wading through raw logs. Get clear, prioritized findings with severity ratings,
source IPs, categories, and occurrence counts.
- Categories: suspicious ports, port scanning, high egress, vulnerabilities
- Dismissible findings — clear resolved issues from the UI
- Hardening recommendations derived from observed behavior and telemetry gaps

Quick Installation
Getting started with Home Security Assistant takes just a few minutes.
- Copy the
custom_components/homesec directory into your Home Assistant custom_components/ folder.
- Restart Home Assistant.
- Go to Settings → Devices & Services → Add Integration and search for "Home Security Assistant".
- Configure the bind host, UDP port, internal network CIDRs, scanner settings, and optional API keys.
- Point your router or flow exporter at the Home Assistant host and configured port.
Device tracker enrichment is automatic — if you have router or presence integrations that create
device_tracker entities, Home Security Assistant will use those names, hostnames, and MAC addresses.
Recommended Exporters
- OpenWrt with
softflowd
- OPNsense / pfSense NetFlow or IPFIX export
- UniFi gateway flow export
- MikroTik Traffic Flow

Secure your smart home today
Home Security Assistant is free, open-source, and built for the Home Assistant community.
Start monitoring your network in minutes.
View on GitHub
Contact Us