source of compromise

The IP address associated with a honeypot breach. The IP address could be the actual IP address of the attacker or could be an IP address spoofed for the purpose of concealing the real address of the attacker.