@hrbrmstr@mastodon.social
There are lots of ways to "do honeypots", and if you'd like to do a bit of what I do on a daily basis (though in a different way) def take a look at this project: https://lightscope.isi.edu/
Clever idea! Decent-ish dashboards.
Do not use the blocklists. Lots of overlaps with our Benign lists.
@ajn142@infosec.exchange
@hrbrmstr@mastodon.social since they explicitly call out ID’ing “malicious” behavior from IPs y’all have classified as “benign” any thoughts on the reason for that difference?