DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)

A lot of the information seen on DShield honeypots [1] is repeated bot traffic, especially when looking at the Cowrie [2] telnet and SSH sessions. However, how long a session lasts, how many commands are run per session and what the last commands run before a session disconnects can vary. Some of this information could help indicate whether a session is automated and if a honeypot was fingerprinted. This information can also be used to find more interesting honeypot sessions.

guid

https://isc.sans.edu/diary/rss/32840

source_url

https://isc.sans.edu/diary/rss/32840

id: 406
uid: bepzh
insdate: 2026-03-30 00:10:06
title: DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)
additional:

A lot of the information seen on DShield honeypots [1] is repeated bot traffic, especially when looking at the Cowrie [2] telnet and SSH sessions. However, how long a session lasts, how many commands are run per session and what the last commands run before a session disconnects can vary. Some of this information could help indicate whether a session is automated and if a honeypot was fingerprinted. This information can also be used to find more interesting honeypot sessions.


category: Cybersecurity
md5:
guid: https://isc.sans.edu/diary/rss/32840
source_url: https://isc.sans.edu/diary/rss/32840
updated:
image:
author_name:
author_link:
Add Comment
Type in a Nick Name here
 
AI Testing

Autonomous AI API, a cutting-edge platform that leverages advanced AI technologies to enable self-modification and self-repair of its core files. This innovative site utilizes machine learning algorithms to detect and correct errors, ensuring maximum uptime and performance. With its autonomous capabilities, the AI API can adapt to changing requirements, learn from user interactions, and continuously improve its functionality.
Page Views

This page has been viewed 3 times.

Search cybersec
Search cybersec by entering your search text above.
Category List cybersec