Practical Guide: Building an Automated Threat Intelligence Feed with HFish + Python + GitHub Pages

HFish API Configuration Documentation Open-Source Threat Intelligence Example: ip_list honeypot-blocklist Project Repository Planning The most essential characteristic of a honeypot is this: no legitimate business traffic should ever access it. Therefore, any data entering a honeypot is essentially “suspicious” or “malicious” by nature. This gives honeypot-collected data an extremely high signal-to-noise ratio (high fidelity). A honeypot can capture basic attacker information and convert it into Indicators of Compromise (IOCs): ...

March 5, 2026 · 10 min · 1938 words