Threats against Military targets in the United States and Israel.
Data collected by Consternation Security.
To support future projects like this, please donate so we can collect more useful data on things that really matter.
Email: bpgroup001 (at) gmail.com
The following IP's showed actual intent to attack the military target which their IP is listed under, along with the time and date the event took place. the user was given the chance to reconsider his/her actions, but chose to conduct this type of activity anyways.
Honeypot used was http://www.hamascyberarmy.com
Raw logs can be accessed at http://www.hamascyberarmy.com/sys/view.php
any visits to the main website outside of the sys directory are logged. so please be advised against clicking the attack button or you too will end up in the logs. I will leave the website running so that everyone can see just how overwhelming the results really are.
Another interesting note is around 90% of the traffic came from paid advertising in the Microsoft/Bing Ad network. Somehow a Microsoft employee allowed a terrorist website requesting people to attack Military targets passed editorial review.
the ads received 106,417 Impressions, and 1,215 clicks.
View full post at pastebin
Sorry we couldn't complete your registration. Please try again.
Please enter your email to finish creating your account.
Receive a personalized list of podcasts based on your preferences.