An end-to-end cyber threat intelligence pipeline using Cowrie, Wazuh, and OpenSearch to capture, normalize, and visually track live SSH brute-force attacks.
visualization linux open-source cloud dashboard ubuntu honeypot cybersecurity siem soc cowrie threat-intelligence cowrie-ssh wazuh-agent wazuh-manager cowrie-honeypot wazuh-rules wazuh-dashboard
-
Updated
Apr 9, 2026 - Shell