Name | Description | |
---|---|---|
Abstract | Get a small summery of the penetration detected | |
AccessProtocol | ||
AddressFamily | The AddressFamily used. | |
CloseConnection | Gets a value indicating whether the connection was closed. | |
CommunicationLog | contains the data that was send by the remote phishing request | |
Communications | number of times we have received data from the IP and Port | |
DataOwner | The data owner that owns the entry | |
DnsEntry | Gets the DNS entry at the time of the recording. | |
FirstDetectedOn | first detection made | |
GuardResponse | Gets the guard response type send to the user. | |
LastDetection | Last time the port was accessed by the IP address | |
LocalAddress | The local IP address that was connected to in the detection. | |
PayloadInfo | Gets the payload information if a offensive response. | |
PortMapper | The port mapper configuration | |
ProtocolType | protocols that the was used when sending the data; | |
RawStream | A base 64 string containing the data that was send to the honeypot | |
RemoteAddress | Represents a network endpoint as an IP address and a port number that triggered the detection. | |
RemoteCIDR | Gets the remote cidr. | |
RemotePort | The remote port as communicated by the socket connection | |
ReportingUri | Uniform Resource identified providing a reporting endpoint for the resource being monitored | |
SocketType | type of socket that was used | |
Triggered | Indicates what type of attempt was detected | |
Ttl | The hackers Time To Live (TTL) value that was used | |
UniqueIdentifier | Gets the unique identifier. | |
UserID | Gets the user ID mapped to the incident. |