Loading
Browse real cyberattack sessions captured by a globally distributed network of high interaction honeypots. Search raw SSH commands, HTTP exploits, SQL injections, and more — each session annotated with behavioral analysis and attack primitives.
| ID | Protocol | Events | Behavior | Primitives | Duration |
|---|---|---|---|---|---|
| PUB-2026-0327-0002 | SSH | 36 | No | 12 | 2m 5s |
| PUB-2026-0327-0001 | SSH | 14 | No | 12 | 57s |
| PUB-2026-0309-0001 | SSH | 41 | No | 31 | 54s |
| PUB-2026-0308-0004 | SSH | 3 | No | 0 | 16s |
| PUB-2026-0307-0009 | SSH | 12 | Yes | 11 | 8s |
| PUB-2026-0307-0008 | SSH | 11 | No | 7 | 43s |
| PUB-2026-0307-0007 | SSH | 2 | No | 0 | 10s |
| PUB-2026-0307-0006 | SSH | 3 | No | 0 | 18s |
| PUB-2026-0305-0040 |
| SSH |
| 62 |
| No |
| 48 |
| 20s |
| PUB-2026-0305-0027 | SSH | 19 | Yes | 18 | 35s |
| PUB-2026-0305-0026 | SSH | 3 | Yes | 2 | 6s |
| PUB-2026-0305-0025 | SSH | 3 | Yes | 2 | 9s |
| PUB-2026-0305-0002 | SSH | 8 | Yes | 7 | 3s |
| PUB-2026-0305-0001 | SSH | 9 | Yes | 8 | 2s |