General Questions
What is Somnium and what does it do?
What is Somnium and what does it do?
- Known malicious IP addresses
- Phishing URLs
- TOR exit nodes
- Malware distribution sites
- Cryptomining domains
- Domain Generation Algorithm (DGA) patterns
- Remote access tools (TeamViewer, AnyDesk, etc.)
- Malicious user agents
- DNS-over-HTTPS (DoH) traffic
Is Somnium safe to use?
Is Somnium safe to use?
- Only run in isolated test environments
- Never run on production systems
- Use proper network segmentation
- Have security controls in place to monitor and block traffic
- Coordinate with your security team before testing
Do I need special permissions to run Somnium?
Do I need special permissions to run Somnium?
- Network access: Outbound internet connectivity to download threat feeds
- File permissions: Write access to create result files in the current directory
- Organizational approval: Authorization from your security team to generate malicious traffic
- Python environment: Python 3.x with ability to install packages
How often should I run Somnium tests?
How often should I run Somnium tests?
- After security tool changes: Immediately after updating IDS/IPS rules, firewall policies, or threat feeds
- Monthly validation: Regular verification that detection capabilities remain effective
- Post-maintenance: After network maintenance or security appliance updates
- New deployment: During initial setup of security infrastructure
Technical Questions
What Python version does Somnium require?
What Python version does Somnium require?
- Python 3.6 or higher
- pip package manager
- Internet connectivity for package installation
requierements.txt with a spelling variation)Why are some tests reporting 'FAILED'?
Why are some tests reporting 'FAILED'?
- Malicious infrastructure goes offline quickly - Many threat actors shut down infrastructure within hours
- Your security tools are working - Blocked connections appear as “FAILED”
- Network timeouts - 5-second timeout may be too short for slow connections
- Firewall blocking - Outbound filtering is preventing connections
- Review IDS/IPS logs during test timeframe
- Check if alerts were generated
- Verify blocked connections in firewall logs
- Correlate timestamps with test results
Can I customize the sample sizes?
Can I customize the sample sizes?
- IP addresses: 15 (5 from each of 3 sources)
- Phishing URLs: 15
- TOR nodes: 15
- Malware URLs: 20
- Cryptomining: 15
- DGA domains: 14
- User agents: 15
- DoH queries: 5 domains × 2 providers = 10 requests
What do the result files contain?
What do the result files contain?
IP_Results.txt- Known bad IP connectionsURL_Results.txt- Phishing URL testsTOR_Results.txt- TOR exit node testsMalware_Results.txt- Malware distribution testsMining_Results.txt- Cryptomining testsDGA_Results.txt- DGA domain testsRAT_Results.txt- Remote access tool testsAgent_Results.txt- Bad user agent testsDoH_Results.txt- DNS-over-HTTPS tests
How do I increase timeout values?
How do I increase timeout values?
Security & Compliance
Will running Somnium get me blacklisted?
Will running Somnium get me blacklisted?
- Your IP being logged by threat actors
- Blacklist inclusion on reputation services
- ISP abuse complaints if running on shared hosting
- Cloud provider suspension if violating acceptable use policies
- Use dedicated testing IP addresses
- Run from isolated lab environments
- Use VPN/proxy for testing (check provider ToS)
- Coordinate with network administrators
- Document testing activities for security audit trails
Does Somnium download or execute malware?
Does Somnium download or execute malware?
- Downloads text-based threat feed lists
- Makes HTTP GET requests to URLs (receives responses)
- Opens TCP socket connections to test ports
- Sends ping packets
- Download malware binaries
- Execute malicious code
- Exploit vulnerabilities
- Participate in botnets
- Send spam or attack traffic
Is Somnium compliant with security policies?
Is Somnium compliant with security policies?
- Security validation testing in lab environments
- Authorized penetration testing activities
- Red team exercises with proper approval
- Unauthorized testing on production networks
- Testing without security team knowledge
- Running on shared/public networks
- Obtain written approval before testing
- Document all test activities
- Use isolated test environments
- Coordinate timing with security operations
- Notify SOC team before generating alerts
What data does Somnium collect?
What data does Somnium collect?
- Timestamps of connection attempts
- IP addresses/URLs tested
- Success/failure status
- Port numbers tested
- Personal information
- Network credentials
- Sensitive data from your environment
- All results stored in local text files
- No external transmission of test results
- No telemetry or analytics sent to third parties
Troubleshooting
Why aren't my security tools detecting the tests?
Why aren't my security tools detecting the tests?
- Security tool placement - Tool not inline with test traffic
- Outdated signatures - Threat intelligence feeds not current
- Configuration issues - Detection rules not enabled
- Encrypted traffic - HTTPS/TLS bypassing inspection
- Log retention - Events not being logged or already rotated
- Confirm security tool is actively monitoring test network segment
- Verify threat feeds are updated on security appliances
- Check if SSL inspection is configured for HTTPS tests
- Review logs during exact timestamp of test execution
- Test with known-good detection (e.g., EICAR test file)
Tests are failing to download threat feeds
Tests are failing to download threat feeds
- Network connectivity issues - No internet access
- Firewall blocking - Outbound HTTP/HTTPS blocked
- Proxy configuration - Corporate proxy not configured
- DNS resolution failure - Cannot resolve feed URLs
- Feed provider downtime - External service unavailable
How do I test only specific threat types?
How do I test only specific threat types?
Can I use Somnium with a VPN or proxy?
Can I use Somnium with a VPN or proxy?
- Socket-based tests (IP port scanning) may not respect HTTP proxies
- VPN providers may block malicious traffic
- Proxy logs will show all connection attempts
- Some proxies block suspicious User-Agent headers
Data Sources
How current are the threat intelligence feeds?
How current are the threat intelligence feeds?
- Real-time: URLhaus malware distribution (API)
- Hourly: OpenPhish phishing URLs
- Daily: OpenDBL IP lists, TOR exit nodes
- Weekly: Bad user agent lists
- Static: Remote desktop tool domains
Can I add my own threat feeds?
Can I add my own threat feeds?
- Text-based format (one indicator per line)
- Publicly accessible URL
- Valid IP addresses or URLs matching regex patterns
- HTTP/HTTPS accessible (no authentication)
Are the test URLs actually dangerous?
Are the test URLs actually dangerous?
- OpenPhish: Active phishing campaigns
- URLhaus: Live malware distribution sites
- Cryptomining: Actual cryptojacking domains