Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0308-0003 | REDIS | 45 | No | 6 | 1m 22s |
| PUB-2026-0308-0002 | REDIS | 25 | No | 14 | 38s |
| PUB-2026-0305-0018 | REDIS | 25 | No | 20 | 20s |
| PUB-2026-0305-0017 | REDIS | 25 | No | 17 | 46s |