All Posts
Cyber Threat Intelligence
Modern Honey Network
SIEM
Splunk
1
min read

Splunking The Modern Honey Network: Community Data (Part 4)

In this post I am going to give you a brief insight into the data that was reported back from the MHN honeypots in January 2017 (all 85 million of them!)
Published on
February 21, 2017
Table of Contents
<p>Over the last 3 weeks, I’ve looked at: <a href="https://www.anomali.com/blog/splunking-the-modern-honey-network-getting-value-from-your-honeypots-data-p">ingesting Modern Honey Network data into Splunk</a>, <a href="https://www.anomali.com/blog/splunking-the-modern-honey-network-adding-context-using-threat-feeds-part-2">adding context to MHN data using threat feeds</a>, and <a href="https://www.anomali.com/blog/splunking-the-modern-honey-network-honeypot-alert-automation-part-3">creating alerts using MHN data</a>.</p><p>In this post I am going to give you a brief insight into the data that was reported back from the MHN honeypots in January 2017.</p><h2>About MHN Community Data</h2><p>The MHN Server reports anonymised attack data back to a central Anomali datastore. <a href="https://github.com/threatstream/mhn/blob/master/README.md">You can control what data from your honeypots is shared</a>. After some analysis we also incorporate some MHN Community data into a threat feed in our <a href="https://www.anomali.com/products/threatstream">Anomali Threatstream platform</a>. Hint: <a href="https://ui.threatstream.com/store">you can find it in the App Store</a>.</p><p><img alt="" src="https://cdn.filestackcontent.com/IRNlwu76Qv26psaI1z6U" style="width: 800px; height: 197px;"/></p><p>We provide access to the MHN Community data for those who are sharing honeypot data with us. <a href="https://github.com/threatstream/mhn/wiki/Getting-Access-to-the-MHN-Community-Data">You can read more about gaining access to the data here</a>.</p><h2>MHN Community Data Stats</h2><h3>Overview</h3><p><img alt="" src="https://cdn.filestackcontent.com/QFjN2mitQv28d4rNPD8c" style="width: 800px; height: 380px;"/></p><p>There were almost 85 million distinct honeypot events. We saw peak attack volume on January 1st where 4.32 million events were reported. This fell to an 1.8 million on the January 6th (the 3rd lowest volume by day — only January 30th and 31st saw fewer events).</p><h3>Honeypot Types</h3><p><img alt="" src="https://cdn.filestackcontent.com/wKM7YaVR5qFhES1Nw9WQ" style="width: 800px; height: 241px;"/></p><p>Digging slightly deeper, the p0f honeypots produce the most events.</p><p><img alt="" src="https://cdn.filestackcontent.com/ZkJnRACS4ifdOl6I0vQ0" style="width: 705px; height: 527px;"/></p><p>The table above shows events received by each distinct p0f honeypot. You’ll notice one p0f honeypot accounts for almost 11 million events alone — over 30% of all p0f events (there were 35.2 million p0f events in total).</p><h3>Honeypot Source IPs</h3><p>The source IP seen most across our honeypot network in January 2017 was 144.217.68.19 (almost 322,000 distinct events across 50+ honeypots). However, looking at individual attack data, 309,000 of these were against a single honeypot.</p><p><img alt="" src="https://cdn.filestackcontent.com/mLK8d0SHSwSxlSQ3ZVYd" style="width: 700px; height: 525px;"/></p><p>There are a number of internal IPs (10.x) in the top 20 shown below which are probably the result of local honeypot testing (note: a single internal IP is likely reporting data from a high number of distinct sources).</p><p><img alt="" src="https://cdn.filestackcontent.com/E7GDfncsT5e6a8XvvejC" style="width: 800px; height: 491px;"/></p><p>Digging deeper on the top IP, 144.217.68.19, in the <a href="https://ui.threatstream.com/">Threatstream platform</a> the IP is listed as an IOC by 4 threat feeds reported as a phishing IP, brute force IP, and a scanning IP (unsurprising it is reported as a scanning IP given number of events).</p><h2>Further reading</h2><p><a href="https://github.com/threatstream/mhn">The MHN documentation</a> is the perfect starting point if you’re interested in gaining access to the MHN Community data or want to learn more about how data sharing work.</p><h2>Exploring The Modern Honey Network</h2><p>This is the last in the series of Splunking the Modern Honey Network posts. <a href="https://www.anomali.com/blog/category/modern-honey-network">You can find them all, and all our previous MHN posts on the Anomali Blog</a>.</p>

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All