| Name | Description | |
|---|---|---|
![]()  | Abstract | Get a small summery of the penetration detected | 
![]()  | AccessProtocol | |
![]()  | AddressFamily | The AddressFamily used. | 
![]()  | CloseConnection | Gets a value indicating whether the connection was closed. | 
![]()  | CommunicationLog | contains the data that was send by the remote phishing request | 
![]()  | Communications | number of times we have received data from the IP and Port | 
![]()  | DataOwner | The data owner that owns the entry | 
![]()  | DnsEntry | Gets the DNS entry at the time of the recording. | 
![]()  | FirstDetectedOn | first detection made | 
![]()  | GuardResponse | Gets the guard response type send to the user. | 
![]()  | LastDetection | Last time the port was accessed by the IP address | 
![]()  | LocalAddress | The local IP address that was connected to in the detection. | 
![]()  | PayloadInfo | Gets the payload information if a offensive response. | 
![]()  | PortMapper | The port mapper configuration | 
![]()  | ProtocolType | protocols that the was used when sending the data; | 
![]()  | RawStream | A base 64 string containing the data that was send to the honeypot | 
![]()  | RemoteAddress | Represents a network endpoint as an IP address and a port number that triggered the detection. | 
![]()  | RemoteCIDR | Gets the remote cidr. | 
![]()  | RemotePort | The remote port as communicated by the socket connection | 
![]()  | ReportingUri | Uniform Resource identified providing a reporting endpoint for the resource being monitored | 
![]()  | SocketType | type of socket that was used | 
![]()  | Triggered | Indicates what type of attempt was detected | 
![]()  | Ttl | The hackers Time To Live (TTL) value that was used | 
![]()  | UniqueIdentifier | Gets the unique identifier. | 
![]()  | UserID | Gets the user ID mapped to the incident. | 


