This dataset includes malware binaries captured by IoTPOT and its
4,000 executable files captured by IoTPOT between 2016/10/02 and 2017/10/02
1,276 executable files captured by X-Pot between 2020/3/15 and 2020/5/20
284 executable files captured by X-Pot between 2020/6/22 and 2020/7/21
86,496 executable files captured by IoTPOT between2018/09/14 and 2020/05/20
The details of our honeypots are described in the following papers.
Seiya Kato, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Adaptive
Observation of Emerging Cyber Attacks targeting Various IoT Devices,"
IFIP/IEEE International Symposium on Integrated Network Management (IM),
Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari
Yoshioka, Tsutomu Matsumoto, Carlos Ganan and Michel Van Eeten,
"Disposable Botnets: Examining the Anatomy of IoT Botnet
Infrastructure," Proc. International Conference on Availability,
Reliability, and Security (ARES2020), 2020.
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, and Tsutomu Matsumoto,
Takahiro Kasama, Christian Rossow, "IoTPOT: Analysing the Rise of IoT
Compromises," 9th USENIX Workshop on Offensive Technologies (USENIX WOOT
These results have been obtained through a series of research projects: WarpDrive supported by the National Institute of Information and Communications Technology (NICT),Japan and PRACTICE and MITIGATE supported by the Ministry of Internal Affairs and Communications, Japan.
Copyright (c) Yoshioka Lab, Yokohama National University, All rights reserved.