A Network Honeypot that utilizes Machine Learning to classify attacks based on the tactic being employed by the attacker.
Below is a table of threats classified by the machine leaning algorithm (LSTM). Click on "More Info" to learn more about the IP address, the attackers tactics and mitigation techniques.
{{step.content}}
{{ step.message }}
{{ step.error }}
| Source IP | Commands | Tactic | Action |
|---|---|---|---|
| {{ row.src_ip }} | {{ row.Commands }} | {{ row.predicted_tactic }} | More Info |
| Tactic | {{ selectedIP[0].tactic}} |
|---|---|
| Command | {{ selectedIP[0].command}} |
| Tactic | {{ selectedIP[0].tactic}} |
| IP Reputation | {{ selectedIP[0].reputation}} |
| Country | {{ selectedIP[0].country}} |
| ISP | {{ selectedIP[0].isp}} |
| Mitigation | {{ selectedIP[0].mitigation}} |