Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0305-0010 | HTTP | 5 | Yes | 4 | 1m 34s |
| PUB-2026-0305-0009 | HTTP | 1 | Yes | 1 | 0s |
| PUB-2026-0305-0008 | FTP | 13 | Yes | 7 | 13s |
| PUB-2026-0305-0007 | FTP | 85 | Yes | 17 | 34s |
| PUB-2026-0305-0006 | SMB | 4 | Yes | 5 | 3m 46s |
| PUB-2026-0305-0005 | SMB | 8 | Yes | 6 | 3s |
| PUB-2026-0305-0004 | DOCKER | 6 | No | 8 | 5m 30s |
| PUB-2026-0305-0003 | DOCKER | 13 | No | 5 | — |
| PUB-2026-0305-0002 | SSH | 8 | Yes | 7 | 3s |
| PUB-2026-0305-0001 | SSH | 9 | Yes | 8 | 2s |