Statistics
Select one of our four honeypots:
dionaeahttps://github.com/DinoTools/dionaea The aim of using Dionaea is to trap malware, which exploits various weak points of networks, and to capture a copy of the malware used for the attacks. In Dionaea different transfer protocols are implemented for this purpose, for example ftp, http, smb, upnp and many other common protocols.
History of registered attacks
World map of attacks
Top 10 countries of origin of attacks
Time course of attacks by country of origin
Classification of IP addresses used in attacks
Protocols used in attacks
Logins used for attacks
Passwords used for attacks
Provider of the attackers IP addressInternet provider of the network in which the IP address is located