kippo_detect

Honeypot detector

Detects and alerts on the presence of a Kippo SSH honeypot instance externally

Quick proof of concept to detect a Kippo SSH honeypot instance externally

GitHub

56 stars
8 watching
12 forks
Language: Python
last commit: almost 10 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,623
gregcmartin/kippo_junos A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. 10
jedie/django-kippo An integration layer for the kippo SSH honeypot with Django's administrative interface 12
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
andrewmichaelsmith/manuka A Docker-based honeypot setup script to simulate network attacks and detect malware 24
mdp/honeypot.go A tool to detect and track unauthorized SSH attempts on a public machine 28
mfontani/kippo-stats A web application that displays statistics about Kippo SSH honeypot usage and connections. 18
kryptoslogic/rdppot A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. 62
morian/blacknet A honeypot system designed to detect and log SSH attempts on multiple IP addresses. 21
phin3has/mailoney A honeypot solution that detects and logs suspicious SMTP traffic 254
phype/telnet-iot-honeypot Detects and analyzes Botnet connections to identify malware patterns and networks 305
run41/honey_ports A honeypot solution to detect port scanning on networks by imitating common ports and logging suspicious activity. 7
cymmetria/strutshoneypot A honeypot designed to detect and prevent exploitation of a specific Apache Struts vulnerability 72
alexbredo/honeypot-ftp A system to detect and analyze malicious activity on FTP connections. 28
rshipp/slipm-honeypot A simple honeypot system designed to detect port monitoring attacks by analyzing network traffic and triggering notifications when potential threats are detected. 17