[IntelMQ-users] shadowserver-parser and new sinkhole/honeypot reports?

Sebastian Wagner wagner at cert.at
Mon May 3 09:36:36 CEST 2021


Hi Patrick,

I haven't heard of anyone doing this work already. It would be very much
appreciated if we could spread the workload of implementing the required
changes on multiple parties.

Sebastian

On 5/1/21 10:00 AM, Patrick Forsberg wrote:
> Hi,
>
> Is anyone working on adding the new sinkhole and honeypot reports to
> the parser?
>
> _https_://www.shadowserver.org/news/changes-in-sinkhole-and-honeypot-report-types-and-formats/
>
>
>
> Regards,
>
>
> /Patrick

-- 
// Sebastian Wagner <wagner at cert.at> - T: +43 676 898 298 7201
// CERT Austria - https://www.cert.at/
// Eine Initiative der nic.at GmbH - https://www.nic.at/
// Firmenbuchnummer 172568b, LG Salzburg


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cert.at/pipermail/intelmq-users/attachments/20210503/3b17735d/attachment.sig>


More information about the IntelMQ-users mailing list