Overview
Thesfn iot command provides access to IoT honeypot threat intelligence data stored in SafeNetworking. It retrieves information about malicious IPs and their associated threat tags from the integrated IoT honeypot system.
Command Syntax
Description
This command queries thesfn-iot-details index in ElasticSearch to retrieve threat intelligence gathered from IoT honeypots. The data includes malicious IP addresses and their associated threat classifications.
Options
Returns the last 9,999 entries of internal honeypot information, formatted as CSV output.Type: Flag (no value required)Output Format:
ip,threat_tagExample: --datadumpUsage Examples
Retrieve IoT Threat Intelligence
Dump all recent IoT honeypot detections:Save Output to File
Redirect the output to a CSV file for analysis:Filter Specific IPs
Combine with grep to find specific IP addresses:Count Threats by Type
Analyze threat distribution:Expected Output
The command outputs comma-separated values (CSV) format with two fields:Output Fields
The malicious IP address detected by the honeypot system
Human-readable threat classification or tag associated with the IP address
Data Source
The IoT data is sourced from:- Index:
sfn-iot-details - Sort Field:
time.keyword(chronological order) - Limit: Last 9,999 entries
Common Threat Tags
Typical threat classifications you may see include:- Mirai Botnet - IoT devices infected with Mirai malware
- Brute Force SSH - Automated SSH login attempts
- Telnet Scanner - Scanning for open Telnet services
- Port Scanner - Network reconnaissance activity
- DDoS Source - Distributed Denial of Service attack origin
- IoT Malware - Generic IoT malware infections
- Credential Stuffing - Automated credential testing
Integration with Background Processing
When SafeNetworking is running (viasfn start), the IoT processing thread:
- Continuously retrieves updated IoT honeypot data
- Stores it in the
sfn-iot-detailsindex - Enriches incoming network events with IoT threat intelligence
- Updates at intervals defined by
IOT_POOL_TIMEconfiguration
Use Cases
Threat Intelligence Feed
Export IoT threats for integration with external security tools:Firewall Rule Generation
Extract IPs for automated firewall blocking:Threat Analysis
Identify trending threat types:IP Reputation Checking
Check if a specific IP is flagged:Notes
The command retrieves the most recent 9,999 entries. For complete historical data, use
sfn admin --datadump with the sfn-iot-details index.The IoT honeypot data is continuously updated by the background processing thread when SafeNetworking is running.
Differences from Admin Command
Unlikesfn admin --datadump, the sfn iot command:
- Formatted Output: Returns clean CSV format (not raw Python dictionaries)
- Specific Index: Always queries
sfn-iot-details - Limited Fields: Only returns IP and threat tag
- User-Friendly: Designed for immediate use in scripts and analysis
