Anonymised statistics from a passive system emulating industrial control systems, network cameras, VPN portals and DevOps services.
Excl. own IP addresses and known scanning systems.
| Time UTC | Country | Endpoint | Category | Method |
|---|---|---|---|---|
| 2 h sedan | US | root_probe | generic_scan | GET |
| 2 h sedan | BG | actuator_gateway_routes | generic_scan | GET |
| 2 h sedan | SG | root_probe | generic_scan | GET |
| 2 h sedan | NL | cgi_bin_luci_stok_locale | generic_scan | GET |
| 3 h sedan | US | fchksbg2t17ghj | generic_scan | GET |
| 3 h sedan | US | favicon_ico | generic_scan | GET |
| 3 h sedan | US | favicon_ico | generic_scan | GET |
| 3 h sedan | US | wiki | generic_scan | GET |
| # | Requests | Endpoint groups | Service types | OT focus |
|---|---|---|---|---|
| 1 | 280 | 5 | 4 | OT-targeted |
| 2 | 170 | 4 | 4 | OT-targeted |
| 3 | 40 | 4 | 4 | OT-targeted |
| 4 | 1 727 | 3 | 3 | OT-targeted |
| 5 | 1 425 | 3 | 3 | OT-targeted |
| 6 | 1 182 | 3 | 3 | OT-targeted |
| 7 | 990 | 3 | 3 | OT-targeted |
| 8 | 641 | 3 | 3 | OT-targeted |
| 9 | 611 | 3 | 3 | OT-targeted |
| 10 | 549 | 3 | 3 | OT-targeted |
| 11 | 288 | 3 | 3 | OT-targeted |
| 12 | 273 | 3 | 3 | OT-targeted |
| Date | DE Tyskland |
NL Nederländerna |
US USA |
AD AD |
SG Singapore |
BE Belgien |
Total |
|---|---|---|---|---|---|---|---|
| 2026-05-19 | 64 | 26 | 37 | 3 | 6 | 5 | 162 |
| 2026-05-18 | 215 | 77 | 80 | 9 | 5 | 3 | 432 |
| 2026-05-17 | 59 | 34 | 47 | 9 | 6 | 8 | 186 |
| 2026-05-16 | 156 | 101 | 43 | 3 | 2 | 1 | 340 |
| 2026-05-15 | 193 | 64 | 53 | 4 | 6 | 2 | 357 |
| 2026-05-14 | 5 | 91 | 72 | 8 | 2 | 9 | 207 |
| 2026-05-13 | 120 | 28 | 61 | 6 | 8 | 1 | 244 |
| 2026-05-12 | 138 | 8 | 25 | 2 | 5 | · | 185 |
External traffic only. Dark cell = high activity from the country. Own IP addresses excluded.
| # | Protocol | Total | Share | Today | Distribution |
|---|---|---|---|---|---|
| 1 | SSDP/UPnP :1900 | 6 385 | 47% | — |
|
| 2 | SSH Banner :2222 | 5 278 | 38.9% | — |
|
| 3 | Telnet :23 | 285 | 2.1% | — |
|
| 4 | Hikvision SDK :8000 | 252 | 1.9% | — |
|
| 5 | OPC-UA :4840 | 141 | 1% | — |
|
| 6 | Siemens S7comm :10102 | 138 | 1% | — |
|
| 7 | Niagara Fox :1911 | 135 | 1% | — |
|
| 8 | DNP3 :20000 | 112 | 0.8% | — |
|
| 9 | Modbus TCP :15502 | 105 | 0.8% | — |
|
| 10 | EtherNet/IP :44818 | 101 | 0.7% | — |
|
| 11 | iec104 | 91 | 0.7% | — |
|
| 12 | SIP :5060 | 90 | 0.7% | — |
|
| 13 | Dahua TCP :37777 | 86 | 0.6% | — |
|
| 14 | SNMP :161 | 78 | 0.6% | — |
|
| 15 | RTSP :554 | 76 | 0.6% | — |
|
| 16 | MQTT :1883 | 74 | 0.5% | — |
|
| 17 | GE SRTP :18245 | 58 | 0.4% | — |
|
| 18 | MELSEC SLMP :5007 | 52 | 0.4% | — |
|
| 19 | bacnet | 41 | 0.3% | — |
|
| 20 | FTP :21 | 1 | 0% | — |
|
All hits since launch. "Today" = requests on the current UTC day. Own IP addresses excluded.
Automated Telnet connections systematically trying credentials from leaked databases. The goal is to take over routers and IoT devices to expand botnets.
Requests matching known CVE signatures — the attacker is looking for a specific vulnerability in industrial control systems, cameras or network equipment.
OT protocol requests with browser user-agent (Mozilla/Chrome/Safari). The intent is to evade signature-based detection systems that filter out obvious scanner identities.
Counts refer to observations in honeypot data. Figures reflect attacker patterns, not actual breaches.
Trend data is aggregated per UTC day from the internal collection pipeline and published with up to 24 hours delay.
Each bar represents the total number of incoming requests during the day, excluding own IP addresses and known scanning systems.
Days with no recorded activity are shown as zero.
| Quarter | Requests | Unique IPs | High-signal | Credential attempts | Residential IPs |
|---|---|---|---|---|---|
| 2026-Q1 | 18 256 | 2 551 | 112 | 470 | — |
Quarters with zero requests are excluded. Δ = change vs. previous quarter in the table.
No IP addresses shown. ASN data via passive geo-enrichment.
The honeypot exposes a full MCP interface with OT/ICS themes. Scanning is identified via endpoint_group=mcp_probe and attack_type=mcp_probe.