Conversation

Replying to
Interesting work Antoine. Do you plan to provide more context about the type of malicious activity observed from the IPs? Are these web attackers or does it also include SSH bots and compromised devices serving as a part of botnets?
1
1
Replying to
Sure, for the moment I store everything in files so it's difficult to provide more context. However, I plan to migrate to a DB, which will make it easier to provide more context.
1
1
Replying to and
All the IPs for which I have information are IPs for which I either received malicious traffic on my honeypots or IPs for which I was able to route bot traffic through (proxies). Thus, I'm 100% sure these are IPs used by bots.
1
1