09/04/2025 | Press release | Distributed by Public on 09/03/2025 17:58
Synoptic chart of hackers. Generated with AI.
In this episode of PING, Adli Wahid, APNIC's Senior Internet Security Specialist, explores the APNIC honeypot network, an initiative with more than 400 collectors across the Asia Pacific region that gathers data on attempts to compromise systems for malware, Distributed Denial-of-Service (DDoS) attacks, and command-and-control operations within the broader malicious traffic ecosystem.
Adli explains how APNIC Members can access honeynet traffic data originating from their network address ranges and Autonomous Systems (ASes) in Border Gateway Protocol (BGP) via DASH, and highlights planned enhancements to expand the coverage of the APNIC honeynet systems.
In addition to publishing reports on the APNIC Blog and presenting at NOG meetings and conferences, Adli has coordinated information sharing from the collector network with international partners, including the Shadow Server Foundation. He continues to provide training and technical support in security for the APNIC community and collaborates with CERTs, CSIRTs, and the wider FIRST community.
Read more about honeypots, bad traffic, and systems security on the APNIC Blog and the web:
You can stream and subscribe to PING via the following channels:
If you're interested in sharing your insights or research, please get in touch - we're always looking for great stories from the community. Please let us know what you think of the podcast and the APNIC Blog so we can keep improving.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.