You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-`cowrie`: attacks detected from the Cowrie Honeypot.
15
+
-`<honeypot_name>`: attacks detected from a specific type of honeypot; for example `cowrie`
17
16
-`all`: get all types at once
18
-
- The following honeypot feeds exist (for extraction of (only) the source IPs):
19
-
-`heralding`
20
-
-`ciscoasa`
21
-
-`honeytrap`
22
-
-`dionaea`
23
-
-`conpot`
24
-
-`adbhoney`
25
-
-`tanner`
26
-
-`citrixhoneypot`
27
-
-`mailoney`
28
-
-`ipphoney`
29
-
-`elasticpot`
30
-
-`dicompot`
31
-
-`redishoneypot`
32
-
-`sentrypeer`
33
-
-`glutton`
34
17
35
18
The available attack_type are:
36
19
37
20
-`scanner`: IP addresses captured by the honeypots while performing attacks
38
-
-`payload_request`: IP addresses and domains extracted from payloads that would have been executed after a speficic attack would have been successful
21
+
-`payload_request`: IP addresses and domains extracted from payloads that would have been executed after a speficic attack would have been successful. This will currently only return requests recorded by the Cowrie honeypot.
0 commit comments