![[Guest Diary] Comparing Honeypot Passwords with HIBP](https://informernow.online/wp-content/uploads/2025/09/2025-10-01_figure1-400x250.png)
[Guest Diary] Comparing Honeypot Passwords with HIBP
[This is a Guest Diary by Draden Barwick, an ISC intern as part of the SANS.edu Bachelor’s Degree in Applied Cybersecurity (BACS) program [1].] DShield Honeypots are constantly exposed to the internet and inundated with exploit traffic, login attempts, and other malicious activity. Analyzing the logged password attempts can help identify what attackers are targeting. To…