Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Bash vs. Python: The Epic Battle of JSON Log Parsing!
My DShield honeypot logs reveal global mischief-makers, but sorting JSON by hand? No thanks. Python hit memory roadblocks, so BASH saved the day! From combining files to filtering AWS noise, I’ve got scripts for it all. Check out my GitHub for the whole shebang!

Hot Take:
Who knew cyber sleuthing could be so satisfying? Justin Leibach’s log-parsing adventure is basically the Avengers: Endgame of honeypot data wrangling. Except, instead of Thanos, it’s a bunch of JSON files, and instead of superheroes, it’s Python and BASH. Spoiler alert: BASH wins!
Key Points:
- Justin processed a whopping 163,510,310 lines of JSON spread over 31 log files.
- The logs revealed interactions from 76 different countries.
- BASH scripting was more efficient than Python for combining and filtering large JSON files.
- Python was used for WHOIS lookups and generating graphical outputs.
- Future improvements include better filtering and reverse DNS lookups for enhanced threat intelligence.