![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | 2018-11-13-13-56-06-192.168.1.50.capinfos | 2021-01-18 17:13 | 1.1K | |
![]() | 2018-11-13-13-56-06-192.168.1.50.dnstop | 2021-01-18 17:13 | 6.7K | |
![]() | 2018-11-13-13-56-06-192.168.1.50.passivedns | 2021-01-18 17:13 | 41K | |
![]() | 2018-11-13-13-56-06-192.168.1.50.pcap.xz | 2021-03-07 21:29 | 341M | |
![]() | README.html | 2022-03-30 10:52 | 1.6K | |
![]() | README.json | 2022-03-27 05:25 | 15K | |
![]() | README.md | 2022-03-30 10:51 | 1.1K | |
![]() | bro/ | 2022-03-30 10:52 | - | |
![]() | suricata/ | 2022-01-30 12:27 | - | |
- Infected device: 192.168.1.50
- Default GW: 192.168.1.1
- Public IP: 147.32.82.199
These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures, with the support of Avast Software. Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You need authorization from the Stratosphere Lab to use these files.