Get more information about attacker's behavior

We make it easy to understand real-time attacker's behavior

Icon

Live Threat Hunting

The Threat Hunting Project

Icon

Real-time Attack Map

Our Honeynet network allow users to watch real-time behavior of attackers

Icon

Bi-Weekly Reports

Bi-weekly reports on all discovered traffic

Icon

OUR DATA SET

Our collected honeynet dataset is available here

Icon

Honeypot Software

A list of all the software we have used in this project.

Icon

Attacker's software

We've analysed and listed attacker's software we discovered in our honeynet

Icon

Online Analysis

Online analysis of honeypot dataset by CICFlowMeter

Benefits of the Honeynet