Walter.Net.HoneyPot
2021.9.17.1449
Prefix Reserved
See the version list below for details.
dotnet add package Walter.Net.HoneyPot --version 2021.9.17.1449
NuGet\Install-Package Walter.Net.HoneyPot -Version 2021.9.17.1449
<PackageReference Include="Walter.Net.HoneyPot" Version="2021.9.17.1449" />
paket add Walter.Net.HoneyPot --version 2021.9.17.1449
#r "nuget: Walter.Net.HoneyPot, 2021.9.17.1449"
// Install Walter.Net.HoneyPot as a Cake Addin
#addin nuget:?package=Walter.Net.HoneyPot&version=2021.9.17.1449
// Install Walter.Net.HoneyPot as a Cake Tool
#tool nuget:?package=Walter.Net.HoneyPot&version=2021.9.17.1449
Look Whois talking discovery service for port access
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 is compatible. net5.0-windows was computed. net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp3.0 was computed. netcoreapp3.1 is compatible. |
.NET Standard | netstandard2.1 is compatible. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETCoreApp 3.1
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter.Net.LookWhosTalking (>= 2021.9.17.1449)
- Walter.Net.Networking (>= 2021.9.17.1449)
-
.NETStandard 2.1
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter.Net.LookWhosTalking (>= 2021.9.17.1449)
- Walter.Net.Networking (>= 2021.9.17.1449)
-
net5.0
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter.Net.LookWhosTalking (>= 2021.9.17.1449)
- Walter.Net.Networking (>= 2021.9.17.1449)
-
net6.0
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter.Net.LookWhosTalking (>= 2021.9.17.1449)
- Walter.Net.Networking (>= 2021.9.17.1449)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on Walter.Net.HoneyPot:
Package | Downloads |
---|---|
Walter.Web.FireWall
Enhance .NET applications with a robust firewall, designed as middleware and IActionFilter, protecting against CVE attacks, web scraping, and phishing. Configurable via annotations and a rule engine services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }); Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in applications. You can view the firewall in action using https://www.asp-waf.com/Firewall You can get started with the firewall using the samples shown in https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as the on line documentation at https://firewallapi.asp-waf.com/ |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2024.6.28.953 | 37 | 6/28/2024 |
2024.6.6.1320 | 68 | 6/8/2024 |
2024.5.15.1634 | 70 | 5/15/2024 |
2023.11.13.1117 | 1,535 | 11/13/2023 |
2023.10.26.1502 | 1,446 | 10/29/2023 |
2023.10.12.1926 | 1,597 | 10/12/2023 |
2023.9.14.812 | 1,720 | 9/14/2023 |
2023.9.7.1748 | 1,726 | 9/7/2023 |
2023.9.7.1241 | 1,702 | 9/7/2023 |
2023.9.6.1001 | 1,676 | 9/6/2023 |
2023.9.5.1246 | 1,718 | 9/5/2023 |
2023.9.5.1032 | 1,688 | 9/5/2023 |
2023.8.31.1522 | 1,758 | 8/31/2023 |
2023.8.29.1040 | 1,766 | 8/29/2023 |
2023.8.17.901 | 1,838 | 8/17/2023 |
2023.8.9.1314 | 1,920 | 8/9/2023 |
2023.8.2.750 | 2,014 | 8/2/2023 |
2023.7.12.830 | 1,980 | 7/12/2023 |
2023.7.5.1419 | 2,071 | 7/6/2023 |
2023.6.14.1628 | 2,100 | 6/14/2023 |
2023.6.11.1304 | 2,225 | 6/11/2023 |
2023.5.30.1640 | 2,141 | 5/30/2023 |
2023.5.4.1552 | 2,257 | 5/4/2023 |
2023.5.1.1524 | 2,188 | 5/1/2023 |
2023.4.29.910 | 2,397 | 4/29/2023 |
2023.4.12.1236 | 2,415 | 4/12/2023 |
2023.3.22.1456 | 2,529 | 3/22/2023 |
2023.3.14.1356 | 2,650 | 3/14/2023 |
2023.3.1.810 | 2,673 | 3/1/2023 |
2023.2.25.11857 | 2,681 | 2/25/2023 |
2023.2.22.27 | 2,702 | 2/22/2023 |
2023.2.15.1413 | 2,750 | 2/15/2023 |
2023.2.11.1628 | 2,801 | 2/11/2023 |
2023.1.11.534 | 2,951 | 1/11/2023 |
2022.12.30.711 | 3,018 | 12/30/2022 |
2022.12.16.1536 | 936 | 12/16/2022 |
2022.12.15.1241 | 880 | 12/16/2022 |
2022.12.15.1108 | 3,012 | 12/15/2022 |
2022.12.14.648 | 3,092 | 12/14/2022 |
2022.11.27.1059 | 3,128 | 11/27/2022 |
2022.11.21.338 | 3,183 | 11/21/2022 |
2022.11.14.1819 | 3,285 | 11/14/2022 |
2022.11.13.917 | 3,250 | 11/13/2022 |
2022.11.7.1632 | 986 | 11/13/2022 |
2022.10.31.740 | 5,833 | 11/1/2022 |
2022.10.15.652 | 6,366 | 10/15/2022 |
2022.10.1.810 | 6,657 | 10/1/2022 |
2022.9.26.1444 | 6,742 | 9/26/2022 |
2022.9.14.1508 | 6,820 | 9/14/2022 |
2022.9.14.809 | 6,915 | 9/14/2022 |
2022.9.8.1009 | 7,045 | 9/8/2022 |
2022.8.20.1007 | 6,930 | 8/20/2022 |
2022.8.1.1 | 7,045 | 7/31/2022 |
2022.7.1300 | 7,234 | 7/1/2022 |
2022.7.31.1016 | 7,137 | 7/31/2022 |
2022.7.15.841 | 7,138 | 7/15/2022 |
2022.6.21.647 | 7,130 | 6/21/2022 |
2022.5.18.638 | 7,155 | 5/19/2022 |
2022.5.16.853 | 7,269 | 5/19/2022 |
2022.5.16.816 | 7,241 | 5/16/2022 |
2022.5.4.1010 | 7,172 | 5/4/2022 |
2022.4.10.947 | 7,731 | 4/10/2022 |
2022.4.10.925 | 7,658 | 4/10/2022 |
2022.4.10.828 | 7,629 | 4/10/2022 |
2022.4.1.1545 | 7,825 | 4/1/2022 |
2022.3.31.823 | 6,708 | 3/31/2022 |
2022.3.26.1103 | 7,851 | 3/26/2022 |
2022.3.26.820 | 7,480 | 3/26/2022 |
2022.3.25.840 | 6,930 | 3/26/2022 |
2022.3.24.1701 | 1,203 | 3/25/2022 |
2022.2.16.1131 | 8,037 | 2/17/2022 |
2022.2.16.834 | 7,814 | 2/17/2022 |
2022.2.15.824 | 2,113 | 2/17/2022 |
2022.2.11.1452 | 2,229 | 2/17/2022 |
2022.2.11.931 | 2,031 | 2/17/2022 |
2022.2.5.1114 | 8,123 | 2/5/2022 |
2022.1.17.1158 | 7,884 | 1/17/2022 |
2022.1.10.1505 | 8,290 | 1/10/2022 |
2022.1.10.537 | 8,264 | 1/10/2022 |
2022.1.5.1139 | 7,722 | 1/8/2022 |
2021.12.28.1452 | 8,772 | 12/28/2021 |
2021.12.16.812 | 8,368 | 12/16/2021 |
2021.11.23.1528 | 14,613 | 11/24/2021 |
2021.11.21.925 | 14,494 | 11/22/2021 |
2021.11.19.1503 | 983 | 11/22/2021 |
2021.11.19.847 | 9,513 | 11/19/2021 |
2021.11.18.1824 | 8,933 | 11/16/2021 |
2021.11.10.852 | 9,726 | 11/10/2021 |
2021.11.9.2021 | 9,250 | 11/9/2021 |
2021.11.8.2109 | 6,958 | 11/9/2021 |
2021.11.8.1612 | 7,551 | 11/8/2021 |
2021.11.7.1021 | 7,631 | 11/8/2021 |
2021.11.3.1612 | 7,897 | 11/4/2021 |
2021.11.1.1102 | 6,410 | 11/1/2021 |
2021.10.25.1206 | 7,927 | 10/25/2021 |
2021.10.23.1310 | 7,801 | 10/25/2021 |
2021.10.19.1522 | 7,838 | 10/19/2021 |
2021.10.16.1325 | 7,704 | 10/18/2021 |
2021.10.6.1546 | 7,756 | 10/6/2021 |
2021.10.5.1450 | 7,949 | 10/5/2021 |
2021.10.4.1155 | 7,966 | 10/5/2021 |
2021.10.4.807 | 1,052 | 10/5/2021 |
2021.10.1.753 | 7,997 | 10/1/2021 |
2021.9.27.1005 | 7,406 | 9/28/2021 |
2021.9.26.1913 | 8,033 | 9/26/2021 |
2021.9.19.1015 | 7,684 | 9/19/2021 |
2021.9.17.1702 | 4,609 | 9/17/2021 |
2021.9.17.1449 | 10,472 | 9/17/2021 |
2021.9.13.1600 | 5,945 | 9/13/2021 |
2021.9.12.1100 | 4,383 | 9/13/2021 |
2021.9.11.2004 | 7,271 | 9/11/2021 |
2021.9.9.1110 | 7,741 | 9/9/2021 |
2021.9.7.1901 | 7,875 | 9/8/2021 |
2021.9.7.1121 | 7,994 | 9/7/2021 |
2021.9.7.927 | 1,024 | 9/7/2021 |
2021.9.6.1518 | 7,455 | 9/7/2021 |
2021.9.4.1124 | 7,800 | 9/4/2021 |
2021.9.2.708 | 7,550 | 9/4/2021 |
2021.9.0.1259 | 7,463 | 9/2/2021 |
2021.8.2200 | 6,936 | 8/23/2021 |
2021.8.2100 | 7,785 | 8/23/2021 |
2021.8.22.900 | 7,990 | 8/22/2021 |
2021.8.18.1500 | 7,898 | 8/18/2021 |
2021.8.18.930 | 7,840 | 8/18/2021 |
2021.8.14.1600 | 7,859 | 8/16/2021 |
2021.8.14.829 | 3,751 | 8/14/2021 |
2021.8.9.1105 | 7,880 | 8/9/2021 |
2021.8.8.1612 | 7,564 | 8/8/2021 |
2021.8.8.1138 | 6,873 | 8/8/2021 |
2021.8.6.1044 | 7,575 | 8/6/2021 |
2021.8.4.1355 | 8,189 | 8/5/2021 |
2021.7.30.2118 | 8,078 | 7/31/2021 |
2021.7.27.926 | 8,051 | 7/28/2021 |
2021.7.23.931 | 8,158 | 7/26/2021 |
2021.7.22.1456 | 7,756 | 7/23/2021 |
2021.7.15.1547 | 7,837 | 7/15/2021 |
2021.7.13.812 | 7,682 | 7/13/2021 |
2021.7.8.1527 | 7,964 | 7/10/2021 |
2021.7.5.1649 | 6,979 | 7/5/2021 |
2021.6.29.1453 | 8,149 | 6/30/2021 |
2021.6.26.1753 | 8,429 | 6/27/2021 |
2021.6.25.1849 | 8,040 | 6/25/2021 |
2021.6.24.1518 | 8,018 | 6/24/2021 |
2021.6.20.729 | 15,336 | 6/20/2021 |
2021.6.14.2025 | 8,156 | 6/15/2021 |
2021.6.13.2035 | 8,494 | 6/14/2021 |
2021.6.12.1154 | 7,868 | 6/13/2021 |
2021.6.9.1120 | 8,181 | 6/9/2021 |
2021.6.7.2103 | 1,049 | 6/7/2021 |
2021.6.3.1509 | 7,830 | 6/3/2021 |
2021.5.31.1533 | 8,086 | 5/31/2021 |
2021.5.31.1415 | 8,056 | 5/31/2021 |
2021.5.25.1732 | 7,032 | 5/25/2021 |
2021.5.24.1128 | 7,786 | 5/24/2021 |
2021.5.24.1019 | 7,651 | 5/24/2021 |
2021.5.12.1054 | 7,681 | 5/12/2021 |
2021.5.12.637 | 6,035 | 5/12/2021 |
2021.5.10.1442 | 7,143 | 5/11/2021 |
2021.5.8.1226 | 7,596 | 5/8/2021 |
Major releases that add functionality other than optimization and minor bug fixing
19 September
- Update NuGet packages release for .Net 5.0.10
4 September 2021
- Add default port configuration for WAC and Tomcat
8 Aug 2021
- update to .NET 6.0 SDK (v6.0.100-preview.6)
30 June 2021
- Add .Net 6.0 binaries to the nuget package
23 June 2021
- Save native attack stream in IHoneyPotPortDetection as Base64 string allowing for attack-replay
15 June 2021
- Update to .Net Core 3.1.17 and .Net 5.0.8 SDK
19 June 2020
- Record data send to the honey-pot based on text encoding detection text
11 June 2021
- Update store GuardResponse in data tables
- Add trace route to detected incident if the option is set
09 June 2021
- Update to .Net SDK 5.0.301 and 3.1.410
07 June 2021
- Update NuGet Package references
31 May 2021
- Update to more efficiently extract WHOIS data for more possible attackers
12 April 2021
- Update to new code base after .net security violation fix
10 May 2021
- Update Database based storage
05 April 2021
- Update process data processing
- Log requests that do not send data
22 March 2021 - performance update
- Logging update