ssh-honeypot
SSH trap
A honeypot program that logs IP addresses, usernames, and passwords of incoming SSH connections.
Fake sshd that logs ip addresses, usernames, and passwords.
631 stars
29 watching
242 forks
Language: C
last commit: 4 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| An SSH honeypot designed to detect and record brute-force login attempts by recording commands executed in a fake shell environment. | 11 |
| An SSH honeypot that logs activity without executing commands or making network requests | 1,562 |
| An SSH honeypot designed to detect and prevent unauthorized access attempts | 15 |
| A honeypot system designed to detect and log SSH attempts on multiple IP addresses. | 22 |
| An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
| A simple honeypot system to detect and respond to potential security threats. | 16 |
| A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. | 10 |
| An SSH honeypot project designed to log and monitor unauthorized SSH connection attempts | 32 |
| Automated logging and rejection of brute-force SSH login attempts | 12 |
| A tool to detect and track unauthorized SSH attempts on a public machine | 28 |
| An SSH honeypot designed to detect brute force attacks and log attacker interactions | 1,633 |
| A Flask-based web application that displays data collected from an SSH honeypot | 3 |
| A high-interaction SSH honeypot framework in Go that emulates limited shell functionality to attract and detect malicious actors | 39 |
| A middleware that inserts a trap into responses to detect and prevent spam bot attempts. | 23 |
| A simple SSH honeypot in Go to detect and prevent unauthorized access | 35 |