June 15, 2024, 2:54 p.m. | /u/CyberSecMaverick

cybersecurity www.reddit.com

Following on from my previous articles in the honeypots series, here are the results from my two-week DShield Honeypot experiment. In this article, I'll share insights and analysis on the threats captured by my public-facing honeypot and shared with SANS's global Internet Storm Center.



# [Honeypots 103: Decoding Your SANS DShield Honeypot’s Data](https://infosecwriteups.com/honeypots-103-decoding-your-sans-dshield-honeypots-data-194dfb7b5a5f)

A Beginner’s Guide to Analyzing and Making Sense of Your SANS DShield Honeypot Data Captures
[https://infosecwriteups.com/honeypots-103-decoding-your-sans-dshield-honeypots-data-194dfb7b5a5f](https://infosecwriteups.com/honeypots-103-decoding-your-sans-dshield-honeypots-data-194dfb7b5a5f)




If you want to brush up on honeypots basics or how …

analysis article articles beginner center cybersecurity data decoding dshield facing global guide honeypot honeypots insights internet internet storm center making public results sans series s guide share shared storm threats week

Senior Streaming Platform Engineer

@ Armis Security | Tel Aviv-Yafo, Tel Aviv District, Israel

Senior Streaming Platform Engineer

@ Armis Security | Tel Aviv-Yafo, Tel Aviv District, Israel

Deputy Chief Information Officer of Operations (Senior Public Service Administrator, Opt. 3)

@ State of Illinois | Springfield, IL, US, 62701-1222

Deputy Chief Information Officer of Operations (Senior Public Service Administrator, Opt. 3)

@ State of Illinois | Springfield, IL, US, 62701-1222

Analyst, Security

@ DailyPay | New York City

Analyst, Security

@ DailyPay | New York City