Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

[Honeypot Alert] Status Report for January 2012

Monthly Web Honeypot Status Report

We have received a tremendous amount of positive feedback on our web-based honeypot alert blog posts. While we agree that this data is useful for raising awareness of individual attack details, we feel that what was missing was information on scale. Specifically, how many of each type of attacks are we seeing. The goal of these new monthly blog posts will be to provide some context on the web attack trends we are seeing in hopes that this will aid organization with determining attack likelihood.

Reporting Period: January 2012

Number of Web Honeypot Sensors: 69

Total Number of Attacks Seen for January 2012: 468194

Attack Types per Month


The overall number of attacks seen did decrease from 646973 in December 2011 down to 468194 in January 2012 (a 27% reduction).

Example Attack Trends

Timthumb Attacks


The overall volume of Timthumb injection attacks dropped significantly from what we saw in December 2011 (down 67%) however with ~144k attacks still seen it is by no means a sporadic attack vector.

Remote File Inclusion (RFI) Attacks




RFI attacks also decreased significantly from December 2011 to January 2012 (down 86%).

Local File Inclusion (RFI) Attacks




While Timthumb and RFI attack traffic was trending down, LFI attacks increased dramatically up 671% from December 2011.

Attacker Source Trends

Total Number of Unique Attack Sources: 2100

Top 10 Attacker Sources



Hostname Country Code Country Name Region Region Name City ISP Organization FR France       Ovh Systems OVH SAS NL Netherlands       Go Daddy Netherlands B.V. Go Daddy Netherlands B.V. RU Russian Federation       Internet-Hosting Ltd Internet-Hosting Ltd US United States TX Texas Dallas Limestone Networks Limestone Networks US United States MI Michigan Lansing SourceDNS SourceDNS DE Germany       1&1 Internet AG 1&1 Internet AG FR France       Ovh Systems OVH SAS US United States TX Texas Dallas SoftLayer Technologies US United States PA Pennsylvania Wayne 1&1 Internet 1&1 Internet US United States IL Illinois Chicago SingleHop JDI - JustHost Web and Backup Servers


Latest SpiderLabs Blogs

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a...

Read More

The Sentinel’s Watch: Building a Security Reporting Framework

Imagine being on shift as the guard of a fortress. Your job is to identify threats as they approach the perimeter. The more methods you have for detecting those threats, the better your chances of...

Read More

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the Advanced IP Scanner installer, which contained a backdoored DLL module. Our client had been searching for...

Read More