Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0315-0001 | SMB | 42 | No | 6 | — |
| PUB-2026-0307-0011 | SMB | 42 | No | 6 | — |
| PUB-2026-0307-0003 | SMB | 3 | Yes | 4 | 1m 12s |
| PUB-2026-0305-0034 | SMB | 8 | No | 7 | 5m |
| PUB-2026-0305-0033 | SMB | 3 | Yes | 2 | 5m 1s |
| PUB-2026-0305-0006 | SMB | 4 | Yes | 5 | 3m 46s |
| PUB-2026-0305-0005 | SMB | 8 | Yes | 6 | 3s |