You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SUMMARY
Hi, I have some very basic questions.
We are running some Dionaea honeypots and consuming the data through hpfeeds. Analyzing the data, I noticed about ~50% of all events with application protocol "ftpdatalisten" have attacker IP as an empty string and source port 0. I have two questions related to this.
Is this an expected behavior? (IMHO, at least port 0 seems like corrupted data, not a legit port number. Why not send None instead?)
What is the meaning of such an event in the context of this "ftpdatalisten" protocol?
Thanks.
Looking forward to your replies.
STEPS TO REPRODUCE
Install dionaea from source
Run dionaea
Observe events with "ftpdatalisten" protocol
EXPECTED RESULTS
All events have legit attacker IP and port.
The text was updated successfully, but these errors were encountered:
ISSUE TYPE
Question
DIONAEA VERSION
0.11.0
OS / ENVIRONMENT
Debian 10
SUMMARY
Hi, I have some very basic questions.
We are running some Dionaea honeypots and consuming the data through hpfeeds. Analyzing the data, I noticed about ~50% of all events with application protocol "ftpdatalisten" have attacker IP as an empty string and source port
0
. I have two questions related to this.Thanks.
Looking forward to your replies.
STEPS TO REPRODUCE
Install dionaea from source
Run dionaea
Observe events with "ftpdatalisten" protocol
EXPECTED RESULTS
All events have legit attacker IP and port.
The text was updated successfully, but these errors were encountered: