Select one of our four honeypots:dionaeahttps://github.com/DinoTools/dionaea The aim of using Dionaea is to trap malware, which exploits various weak points of networks, and to capture a copy of the malware used for the attacks. In Dionaea different transfer protocols are implemented for this purpose, for example ftp, http, smb, upnp and many other common protocols.
History of registered attacks
info
World map of attacks
info
Top 10 countries of origin of attacks
info
Time course of attacks by country of origin
info
Classification of IP addresses used in attacks
info
Protocols used in attacks
info
Logins used for attacks
info
Passwords used for attacks
info
Provider of the attackers IP addressInternet provider of the network in which the IP address is located