<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://greedybear-project.github.io/feed.xml" rel="self" type="application/atom+xml" /><link href="https://greedybear-project.github.io/" rel="alternate" type="text/html" hreflang="en" /><updated>2026-04-21T14:55:14+00:00</updated><id>https://greedybear-project.github.io/feed.xml</id><title type="html">GreedyBear Blog</title><subtitle>Official GreedyBear Blog</subtitle><author><name>Tim Leonhard</name></author><entry><title type="html">GreedyBear version 3 coming</title><link href="https://greedybear-project.github.io/greedybear_v3_release/" rel="alternate" type="text/html" title="GreedyBear version 3 coming" /><published>2026-01-29T00:00:00+00:00</published><updated>2026-01-29T00:00:00+00:00</updated><id>https://greedybear-project.github.io/greedybear_v3_release</id><content type="html" xml:base="https://greedybear-project.github.io/greedybear_v3_release/"><![CDATA[<p>Over the last months some new contributors helped us to implement a lot of new stuff in GreedyBear. Because of the huge number of new features and a different structure of the Feeds API responses, we are releasing a new major version in the next week.</p>

<h2 id="breaking-changes">Breaking changes</h2>
<ul>
  <li>Feeds API responses do not contain the fields “honeypots”, “cowrie” and “log4j” anymore.</li>
  <li>Log4Pot-specific data handling was removed, because the honeypot is not that relevant anymore.</li>
  <li>The possibility to use legacy extraction with an 11 minute time window has been removed. The LEGACY_EXTRACTION switch in the env_file will be ignored.</li>
</ul>

<h2 id="highlights">Highlights</h2>
<ul>
  <li>We are using the Elasticsearch client version 9 now to match T-Pots recent migration to ES9.</li>
  <li>GreedyBear now dynamically supports all honeypots that are actively collecting data in the attached T-Pot instance.</li>
  <li>A shiny new API endpoint that aggregates IOC data by ASN was built by <a href="https://github.com/drona-gyawali">Dorna Raj Gyawali</a>.</li>
  <li>Automated ingestion of FireHol blocklists enriches IOCs with threat intelligence categories thanks to <a href="https://github.com/opbot-xd">Krishna Awasthi</a>.</li>
  <li>Users can now authenticate using email instead of just username, thanks to the work of <a href="https://github.com/ManaswibRane">ManaswibRane</a>.</li>
  <li>Self-hosted instances can now set their own license text (or none) via environment variable thanks to <a href="https://github.com/opbot-xd">Krishna Awasthi</a>.</li>
  <li>The monitoring jobs can now send alerts via ntfy thanks to <a href="https://github.com/HARSHVARANDANI">Varandani Harsh Pramod</a></li>
  <li>GreedyBear now extracts and tracks Tor exit nodes as a dedicated data source thanks to <a href="https://github.com/Sumit-ai-dev">Sumit Das</a></li>
  <li>And a lot of additional stuff happened under the hood. Thank you <a href="https://github.com/shivraj1182">Shivraj Suman</a>, <a href="https://github.com/srijan2607">Srijan</a>, <a href="https://github.com/amishhaa">Amisha Chhajed</a>, <a href="https://github.com/RaviTeja799">Ravi Teja Bhagavatula</a> and <a href="https://github.com/Eshaan-byte">Eshaan Gupta</a>.</li>
</ul>]]></content><author><name>Tim Leonhard</name></author><summary type="html"><![CDATA[Over the last months some new contributors helped us to implement a lot of new stuff in GreedyBear. Because of the huge number of new features and a different structure of the Feeds API responses, we are releasing a new major version in the next week. Breaking changes Feeds API responses do not contain the fields “honeypots”, “cowrie” and “log4j” anymore. Log4Pot-specific data handling was removed, because the honeypot is not that relevant anymore. The possibility to use legacy extraction with an 11 minute time window has been removed. The LEGACY_EXTRACTION switch in the env_file will be ignored.]]></summary></entry><entry><title type="html">GreedyBear version 2.0 released</title><link href="https://greedybear-project.github.io/greedybear_v2_release/" rel="alternate" type="text/html" title="GreedyBear version 2.0 released" /><published>2025-10-03T00:00:00+00:00</published><updated>2025-10-03T00:00:00+00:00</updated><id>https://greedybear-project.github.io/greedybear_v2_release</id><content type="html" xml:base="https://greedybear-project.github.io/greedybear_v2_release/"><![CDATA[<p>Almost four years have passed since the GreedyBear launch in 2021. Much has changed since then, and some of the underlying technologies require an update. That’s why we are releasing a new major version of GreedyBear which comes with the most current versions of Django (5.2) and PostgreSQL (18). These changes will ensure our project remains greedy and up-to-date for years to come but require some manual intervention. You can find a detailed upgrade guide <a href="https://intelowlproject.github.io/docs/GreedyBear/UpgradeToV2/">here</a>.</p>]]></content><author><name>Tim Leonhard</name></author><summary type="html"><![CDATA[Almost four years have passed since the GreedyBear launch in 2021. Much has changed since then, and some of the underlying technologies require an update. That’s why we are releasing a new major version of GreedyBear which comes with the most current versions of Django (5.2) and PostgreSQL (18). These changes will ensure our project remains greedy and up-to-date for years to come but require some manual intervention. You can find a detailed upgrade guide here.]]></summary></entry><entry><title type="html">Improvements to GreedyBear</title><link href="https://greedybear-project.github.io/improvements_to_greedybear/" rel="alternate" type="text/html" title="Improvements to GreedyBear" /><published>2025-05-28T00:00:00+00:00</published><updated>2025-05-28T00:00:00+00:00</updated><id>https://greedybear-project.github.io/improvements_to_greedybear</id><content type="html" xml:base="https://greedybear-project.github.io/improvements_to_greedybear/"><![CDATA[<p>Over the past few months I wrote my Master’s thesis about improving threat intelligence generated from honeypot data. For this purpose I made some changes to the <a href="https://github.com/intelowlproject/GreedyBear/">GreedyBear</a> project from Matteo Lodi, who greatly supported my coding work.</p>

<h3 id="new-feeds">New feeds</h3>
<p>The core of my work is the development and comparison of scoring models which try to predict future honeypot interactions. As a result of this comparison, two of these models were integrated into GreedyBear and already do their work on the <a href="https://greedybear.honeynet.org/">Honeynet instance</a>:</p>

<p>The first model is a Random Forest classifier, a machine learning model that predicts binary events. In our case, for each known IP address it estimates the probability that this IP address will hit any honeypot in the next 24 hours. GreedyBear now offers a <a href="https://greedybear.honeynet.org/api/feeds/all/all/likely_to_recur.json">feed</a> that orders its entries by that probability such that the most likely IP addresses to reoccur are at the top of the list.</p>

<p>The second model, a Random Forest regressor, predicts the number of honeypot hits that we can expect from an IP address in the next 24 hours. Analogous to the “likely to reoccur” feed from the classifier model, GreedyBear now also offers the “most expected hits” <a href="https://greedybear.honeynet.org/api/feeds/all/all/most_expected_hits.json">feed</a> which is based on the prediction of the regressor model.</p>

<p>Both predictions, along with some other new information, are also included in every ‘json’ based GreedyBear feed. For details about the different feeds and their contents, please refer to the <a href="https://intelowlproject.github.io/docs/GreedyBear/Usage/">documentation</a>.</p>

<h3 id="command-sequences">Command sequences</h3>
<p>The Cowrie honeypot records the sequence of commands which an attacker executes during a SSH session. These command sequences and their relation to the IP addresses which executed them, are now also extracted and stored by GreedyBear. The new <a href="https://intelowlproject.github.io/docs/GreedyBear/Usage/#command-sequence">command sequence API</a> supports two kinds of requests:</p>
<ul>
  <li>You can send an IP address and receive every command sequence which was executed by this address.</li>
  <li>You can send a SHA256 hash of a (correctly formatted) command sequence and receive every IP address that executed this sequence.</li>
</ul>

<p>In addition there is a clustering feature, which groups similar command sequences together, allowing for a “fuzzy” search using the ‘include_similar’ query parameter. If this parameter is used, the result will also contain IP addresses that executed similar command to the one requested. In my testing, this feature allowed me to attribute more than 2000 IP addresses to the ‘mdrfckr’ botnet on my personal instance of GreedyBear. On the Honeynet instance, the clustering feature is currently not activated, as it is very resource hungry. I’ll try to make it more efficient soon(ish). :)</p>

<p>If you are interested in reading into my full thesis, you can find it <a href="https://fx-tm.de/Master_Thesis_TimLeonhard_final.pdf">here</a>. If you want to get in touch, you can find me on <a href="https://23.social/@tim">Mastodon</a>.</p>]]></content><author><name>Tim Leonhard</name></author><summary type="html"><![CDATA[Over the past few months I wrote my Master’s thesis about improving threat intelligence generated from honeypot data. For this purpose I made some changes to the GreedyBear project from Matteo Lodi, who greatly supported my coding work.]]></summary></entry><entry><title type="html">Presenting GreedyBear</title><link href="https://greedybear-project.github.io/presenting_greedybear/" rel="alternate" type="text/html" title="Presenting GreedyBear" /><published>2023-07-20T00:00:00+00:00</published><updated>2023-07-20T00:00:00+00:00</updated><id>https://greedybear-project.github.io/presenting_greedybear</id><content type="html" xml:base="https://greedybear-project.github.io/presenting_greedybear/"><![CDATA[<p><a href="https://github.com/intelowlproject/GreedyBear">GreedyBear</a> is a tool that was created mainly to help to extract Indicators of Compromise from one or more available <a href="https://github.com/telekom-security/tpotce">TPOTs</a>. For those who do not know this tool, we are talking about the most popular all-in-one honeypot available in the community.
While the T-POT is great in allowing a fast, easy and reliable installation and collection of data, it struggles in organizing that data in a way that they can be easily collected and disseminated. This is where GreedyBear comes in and becomes the Threat Intelligence Platform for the TPOT.</p>

<p>Started as a personal Christmas project from <a href="https://twitter.com/matte_lodi">Matteo Lodi</a>, since then GreedyBear is being improved mainly thanks to the efforts of the Certego Threat Intelligence Team.</p>

<p>It has been evolved to a fully operational web application which provides convenient ways to explore and search extracted data and fully fledged API REST to programmatically extract them.</p>

<p>Thanks to the efforts of The Honeynet Project, we have a public site which allows us to share the data collected from the TPOTs of this organization. Check the official site <a href="https://greedybear.honeynet.org/">here</a>!</p>

<p>Happy hunting!</p>]]></content><author><name>Matteo Lodi</name></author><summary type="html"><![CDATA[GreedyBear is a tool that was created mainly to help to extract Indicators of Compromise from one or more available TPOTs. For those who do not know this tool, we are talking about the most popular all-in-one honeypot available in the community. While the T-POT is great in allowing a fast, easy and reliable installation and collection of data, it struggles in organizing that data in a way that they can be easily collected and disseminated. This is where GreedyBear comes in and becomes the Threat Intelligence Platform for the TPOT.]]></summary></entry></feed>