Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0310-0001 | SMTP | 11 | No | 5 | 5s |
| PUB-2026-0306-0002 | SMTP | 5 | No | 6 | 11s |
| PUB-2026-0306-0001 | SMTP | 10 | No | 6 | 2s |
| PUB-2026-0305-0023 | SMTP | 30 | No | 5 | 10s |
| PUB-2026-0305-0022 | SMTP | 5 | No | 5 | 1s |