Conversation

Replying to
Interesting work Antoine. Do you plan to provide more context about the type of malicious activity observed from the IPs? Are these web attackers or does it also include SSH bots and compromised devices serving as a part of botnets?
1
1
Replying to and
All the IPs for which I have information are IPs for which I either received malicious traffic on my honeypots or IPs for which I was able to route bot traffic through (proxies). Thus, I'm 100% sure these are IPs used by bots.
1
1
Show replies