You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What is the version of the OS lsb_release -a and uname -a?
Linux opcxxxxx 5.14.0-427.13.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Apr 30 18:22:29 EDT 2024 x86_64 x86_64 x86_64 GNU/Linux
What T-Pot version are you currently using (only T-Pot 24.04.x is currently supported)?
Latest git pull
What architecture are you running on (i.e. hardware, cloud, VM, etc.)?
VM
I have installed T-POT last version a few days ago but when ingress to dashboard I saw that I have 49 attacks:
48 ddospot
1 ciscoasa
data/ddospot/log/dnspot.log:
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 43783, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 11:51:42.124147"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 43783, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 11:51:42.520485"}
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 38484, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 12:51:43.289977"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 38484, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 12:51:43.662521"}
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 59945, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 13:51:44.434559"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 59945, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 13:51:44.736614"}
The text was updated successfully, but these errors were encountered:
Based on the logs provided and the arbitrary high ports, those are expected responses. At best would be to open an issue with the developer of ddospot as the log could be improved accordingly.
Also note: For some honeypots to reach full functionality (i.e. Cowrie or Log4Pot) outgoing connections are necessary as well, in order for them to download the attacker's malware. Please see the individual honeypot's documentation to learn more by following the links to their repositories.
What OS are you T-Pot running on?
Almalinux 9.4
What is the version of the OS lsb_release -a and uname -a?
Linux opcxxxxx 5.14.0-427.13.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Apr 30 18:22:29 EDT 2024 x86_64 x86_64 x86_64 GNU/Linux
What T-Pot version are you currently using (only T-Pot 24.04.x is currently supported)?
Latest git pull
What architecture are you running on (i.e. hardware, cloud, VM, etc.)?
VM
I have installed T-POT last version a few days ago but when ingress to dashboard I saw that I have 49 attacks:
48 ddospot
1 ciscoasa
data/ddospot/log/dnspot.log:
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 43783, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 11:51:42.124147"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 43783, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 11:51:42.520485"}
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 38484, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 12:51:43.289977"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 38484, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 12:51:43.662521"}
New attack started for quartet ('172.24.0.1', '', 'AAAA', 'IN')
{"src_ip": "172.24.0.1", "src_port": 59945, "opcode": 0, "dns_name": "", "dns_type": "AAAA", "dns_cls": "IN", "time": "2024-10-30 13:51:44.434559"}
New attack started for quartet ('172.24.0.1', '', 'A', 'IN')
{"src_ip": "172.24.0.1", "src_port": 59945, "opcode": 0, "dns_name": "", "dns_type": "A", "dns_cls": "IN", "time": "2024-10-30 13:51:44.736614"}
The text was updated successfully, but these errors were encountered: