Index of /publicDatasets/IoTDatasets/CTU-Honeypot-Capture-4-1

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2018-10-25-14-06-32-192.168.1.132.capinfos2021-01-18 20:33 1.1K 
[   ]2018-10-25-14-06-32-192.168.1.132.dnstop2021-01-18 20:33 2.5K 
[   ]2018-10-25-14-06-32-192.168.1.132.passivedns2021-01-18 20:33 4.0K 
[   ]2018-10-25-14-06-32-192.168.1.132.pcap2021-03-09 18:00 4.4M 
[TXT]README.html2022-03-30 10:54 3.5K 
[   ]README.json2022-03-27 05:49 13K 
[TXT]README.md2022-03-30 10:54 2.8K 
[DIR]bro/2022-03-30 10:40 -  
[DIR]suricata/2022-01-30 12:27 -  

IoT Lab Capture

Descripttion of Files

IP Addresses

- Infected device: 192.168.1.132
- Default GW: 192.168.1.1
- Public IP: 147.32.82.200

Generic Dataset name: CTU-Honeypot-Capture-4-1

Origin device: Philips Hue

Timeline

Start. 2018/10/25

Thu Oct 25 14:16:00 CEST 2018

Capturing traffic again. The camera has new IP address

##Mon Dec 14 19:19:28 CET 2020 Stop for maintenace

##Tue Dec 15 17:41:39 CET 2020 Power on again

##Thu Jan 14 15:27:44 CET 2021 Network restored

Disclaimer

These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures with the support of Avast Software.Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz

You need authorization from the Stratosphere Lab to use these files.

Suricata run with rules updated on 2021-03-09