Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0319-0001 | MYSQL | 10 | Yes | 7 | 0s |
| PUB-2026-0307-0010 | MYSQL | 35 | No | 1 | 1s |
| PUB-2026-0305-0020 | MYSQL | 10 | Yes | 6 | 1s |
| PUB-2026-0305-0019 | MYSQL | 6 | Yes | 4 | 6s |