
SSH honeypots are cybersecurity tools that help gather information about attackers, identify weaknesses in server security, and slow down attacks. They are useful for monitoring activity, analyzing attack methods, and improving your defense strategy.
A medium-level SSH and Telnet honeypot that captures brute force attempts and works as a proxy or UNIX emulator with a fake file system.
A simple SSH honeypot that allows anyone to connect. It records all user actions but does not execute any commands or requests.
SSH and TCP honeypot that works as a MITM. The tool allows you to closely observe the actions of attackers in real time and analyze their methods.
A lightweight honeypot that stores logins and passwords entered during attacks. All data is recorded in JSON format for further analysis and monitoring.
A basic attack data recording tool. Records IP addresses, logins, and passwords used by attackers when connecting.
A low-interaction, dockerized SSH honeypot that logs login attempts but always reports that the password entered is incorrect.
A lightweight Docker honeypot for logging authentication attempts. It runs quickly, uses minimal resources, and is convenient for quick deployment.
A simple honeypot that logs all login attempts in JSON format. It does not interact with attackers, it only stores their activity.
A minimalist honeypot written in C. Designed to record data about connection attempts, it works efficiently even on limited resources.
SSH honeypot on Go, focused on collecting logins and passwords. Easy-to-use tool for monitoring attacker activity.
A unique honeypot that responds slowly to attackers. Keeps them connected for hours, slowing down bots and scanners.