Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0309-0002 | FTP | 85 | Yes | 17 | 16s |
| PUB-2026-0307-0004 | FTP | 11 | No | 7 | 24s |
| PUB-2026-0305-0032 | FTP | 10 | Yes | 7 | 9s |
| PUB-2026-0305-0031 | FTP | 10 | Yes | 7 | 9s |
| PUB-2026-0305-0008 | FTP | 13 | Yes | 7 | 13s |
| PUB-2026-0305-0007 | FTP | 85 | Yes | 17 | 34s |