> Live Threat Intelligence Feed

[Awaiting connection to data stream...]

This dashboard provides a near real-time, interactive view of data collected from a global network of T-Pot honeypots. The visualizations below summarize automated attack patterns, showing the most common credentials, commands, and sources of malicious activity.

Total Events (7 days)

--

Unique Attack Sources

--

Top Attacking Country

--

Attacker Geo-location

Top 10 Attackers

  1. Loading...

Top 10 Commands Executed

The most frequent commands attackers attempt to run after gaining initial access.

  1. Loading...

Credential Analysis

Top 10 Usernames

Top 10 Passwords