To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.


CAIDA UCSD Network Telescope Traffic Samples
UCSD - Center for Applied Internet Data Analysis
UCSD - Center for Applied Internet Data Analysis
49 (lowest rank is 55)

Category & Restrictions

Blackhole Address Space Data
blackhole address space data, denial of service, computer worms, malicious traffic


Samples of Internet Background Radiation traffic

The dataset consists of IPv4 packets received by the UCSD Network Telescope
( ). This unidirectional, unsolicited
traffic can originate from a wide range of security-related events, such as backscatter
from spoofed denial-of-service attacks, an automated spread of Internet worms or viruses,
scanning in search of vulnerable targets, etc. The source addresses are not anonymized.

Possible uses of this data include: studying and modeling DoS attacks, understanding
victim populations, and using real packet traces to validate algorithms for detecting or
classifying malicious traffic. This last use is particularly valuable because it is extremely
challenging to artificially generate the kind of real-world noise constantly present (and
growing) on the Internet.
For more detailed description of the data please see:

Additional Details

ucsd - center for applied internet data analysis, communication protocol, cryptographic protocol, cyberinfrastructure, dos, internet background noise, application layer protocols, san diego supercomputer center, packets, transport layer security, network trace, ipv4, caida ucsd network telescope traffic samples, california collegiate athletic association schools, 834, internet protocol, data protection, denial of service, network packet, uniform resource identifier, universities and colleges in san diego, hypertext transfer protocol, backscatter, university of california, data anonymization, denial of service attack, university of california san diego, cyberwarfare, network telescope, secure communication, information privacy, history of computing, internet relay chat, exploit
backscatter, denial-of-service