Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0312-0001 | HTTP | 1 | No | 0 | 1m |
| PUB-2026-0308-0005 | HTTP | 101 | No | 2 | 12s |
| PUB-2026-0307-0014 | HTTP | 1 | No | 1 | 3s |
| PUB-2026-0307-0013 | HTTP | 1 | No | 2 | 0s |
| PUB-2026-0307-0012 | HTTP | 2 | No | 1 | 1m 1s |
| PUB-2026-0305-0035 | HTTP | 46 | Yes | 20 | 15s |
| PUB-2026-0305-0010 | HTTP | 5 | Yes | 4 | 1m 34s |
| PUB-2026-0305-0009 | HTTP | 1 | Yes | 1 | 0s |