From a33574ccd9a6b3c70e6eefd22547cbfafa4ce471 Mon Sep 17 00:00:00 2001 From: Domenico Del Giudice <114437746+domedg@users.noreply.github.com> Date: Sun, 2 Mar 2025 14:29:23 +0100 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 2eb88a79..714d3072 100644 --- a/README.md +++ b/README.md @@ -454,7 +454,7 @@ The update script will ... ## 3 Data Analysis and Insights 📊 -Recent studies, such as one conducted by **Jiuma Elhshik**, have demonstrated T-Pot's effectiveness in collecting and analyzing threat data. Over 48 hours, T-Pot captured **126,833 attacks**, providing valuable insights into current threat landscapes. Key findings include: +Recent studies, such as one conducted by **Jiuma Elhshik** ([source](https://medium.com/@jiumael/trap-the-hackers-leveraging-t-pot-for-threat-intelligence-part-2-b7a96848a09b)), have demonstrated T-Pot's effectiveness in collecting and analyzing threat data. Over 48 hours, T-Pot captured **126,833 attacks**, providing valuable insights into current threat landscapes. Key findings include: 1. **Most Targeted Honeypots**: - **Dionaea**: Over 47,000 attacks, primarily targeting SMB (port 445).