Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Table 8

Logs of unknown hacker that signs predefined honeypot specs.

IPA2A3A4A22

Unknown
hacker
22.1.11.22210100