• 27 minutes

      A professional web scraper and data extraction expert …

      Looks like he’s a tool … maybe sed/awk?

  • That was an interesting read. I didn’t have a lot If knowledge about this topic. So thanks for that!

    Was ist using AI for assisted writing? Maybe. But I don’t have a Problem with that. I assume everyone ist using it to some extend (me included) and uses it as a tool as any other tool.

    The Data is the actual interesting Thing. Would be cool If the author could share his data (of course IP’s or other personel information must be anonymized/hashed). If that is made up by AI…Well there goes your credibility. But I don’t assume that from the beginning.

    • I really struggle to see the point of posts like this. It is an interesting article about an interesting topic.

    • 9 hours

      For me it is not only that they used AI for the writing, is that they did not care to review/recheck/polishing it before releasing it to the public, so my effort in consuming it will be reciprocal

    • 1 day

      Oh so you want them to do all that and gather all the data and do it themselves for free? What a dumb comment.

      I’ve run a honeypot for the last month and the data is near-identical to this. It’s definitely credible.

      • If you publish something online, that’s also a responsibility. If they don’t want that, then they could just have made a comment somewhere “yo, i’ve had this container online on port 22 and this is what happened, yolo”.

        Same for open source software btw.

      • The issue with using AI is that the author doesn’t openly disclose the use at the beginning of the paper.

        Yes, I know this particular write-up isn’t for official submission to an academic journal, but sharing methodology is important.

        I would have no problem with AI-assisted writing IF the author credited the service used and, where applicable, included the prompts used.

        It should be similar to documenting any sourced material. It’s not just about giving credit where credit is due. It’s also about accountability.

        What a dumb comment.

        Why is this necessary? Does this add anything at all to the conversation?

        I’ve run a honeypot for the last month and the data is near-identical to this. It’s definitely credible.

        Ah, well then. Problem solved. Someone on the internet said it’s credible, therefore it must be credible. Tell ya what - when you create a webpage to display your data and then provide an analysis of said data, I’ll consider you credible. Until then, though, you are just some short-tempered, rude, anonymous voice shouting into the void.

      • Oh so you want them to do all that and gather all the data and do it themselves for free?

        Yes, that is what 90% of the internet has been about since it became a thing. Doing everything for profit turns everything into shit.

      • Near-identical doesn’t make it valuable. Plausible but incorrect is still incorrect. AI creates plausible and credible but incorrect data.

        The plausibility and credibility is like a honeypot for your confidence. You read it, and understand it, and come to believe it. But it was false all along. You think you learned things. You actually learned nothing.

      • 23 hours

        I initially disagreed but after actually reading the post, I’m with you. If it was only the article’s text that was generated and not the data or graphs then I don’t see why the whole thing would be written off. I mean, it’s really sad seeing people offload their writing to AI but I still found it interesting.

  • Honeypot as a Python script in a docker container?
    Isn’t that not really a true isolation?

    • 15 hours

      Please say more.

      I use both on a daily basis and from what I understand, there’s no implicit access from within a container. If you set it up right, there’s no access outside the container of any sort unless you explicitly say so.

        • Yeah the system isn’t protecting you (like it does preventing a normal user accessing another user), “only” the docker code does.

          Or so I have understood it.

  • 23 hours

    The Belgian traffic? Almost entirely from a single residential IP — one box that sent over 156,000 login attempts, more than the entire country of Germany. It just sat there, hammering echo “\x6F\x6B” over and over, every single second, for weeks. Relentless.

    Had a funny similar thing, there’s some weird person/people that randomly probe and attack a specific game’s community hosted dedicated servers; and one week this specific IP address out of Virginia was just hammering one of mine, with what amounts to a specific byte sequence, then an incrementing number of the packet (until it wrapped around). Then it stopped. Weird shit.

    • 16 hours

      It’s possible it was something misconfigured, a poorly-written script, or a bug in some software causing unexpected behavior. At the scale of the Internet, all of those are very possible.

      It could also be the Internet equivalent of a numbers station.

      • 3 hours

        It’s was a pretty specific non standard port on UDP. It’s not even doing proper scanning since the byte sequence used isn’t one that would trigger a response challenge/ack. My guess is someone trying to DOS using an older byte sequence that used to choke/kill the server software on older versions.

  • 18 hours

    I’m kind of disappointed that bigboobz wasn’t on the top of the password list.

  • 23 hours

    and contains mistakes to that effect

    What mistakes?

    • 21 hours

      At one point it said only 28 IPs came back and those 31 were clever. Or something to that effect.

  • 1 day

    Weird I did the exact same thing on a VPS. Basically the same data.

  • 23 hours

    So is there a socket container for this? Wi wouldn’t mind wasting some hacker assholes time with this