This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


DDS Dataset Collection
External Dataset
External Data Source
Data Driven Security
51 (lowest rank is 51)

Category & Restrictions

malicious traffic


Two AWS honeypot data sets. One is a CSV file from a collection of AWS honeypots. The other is CSV file from a collection of AWS honeypots with both long int and string IPv4 addresses and full geolocation information (via MaxMind GeoIP2)

From Data-Driven security blog. "I recently got some data from my friend Daniel Blander. He and I were talking about learning from honeypots some time ago, and he spun up several instances across the world and just let iptables capture packets. He let these run from March to September last year and shared the data so we can play around with it." ;

Additional Details

iptables, spamming, internet privacy, inferlink corporation, amazon web services, integer, blog, packets, data type, amazon, honeypot, external data source, ipv4, internet protocol, 947, dds dataset collection, network packet, firewall software, geolocation