honeyntp

NTP logger

A system designed to detect and log NTP-based DDoS attacks by logging first-seen and last-seen information about incoming ntp packets into a Redis database.

NTP logger/honeypot

GitHub

53 stars
4 watching
12 forks
Language: Python
last commit: over 10 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
xlfe/cowrie2neo A tool that processes and stores cowrie honeypot logs in a graph database. 7
torque59/nosqlpot An open-source honeypot framework for detecting attackers in NoSQL databases 102
naorlivne/dshp A simple honeypot system designed to detect and respond to unauthorized access attempts 16
alexbredo/honeypot-ftp A system to detect and analyze malicious activity on FTP connections. 28
grantgmiller/micropython_ntpserver An NTP server implementation written in Python for microcontrollers. 3
desaster/kippo An SSH honeypot designed to detect brute force attacks and log attacker interactions 1,623
qeeqbox/honeypots A comprehensive package of 30 different honeypots in Python that can monitor network traffic and detect malicious activities 693
christophe77/node-ftp-honeypot A Node.js application that simulates an FTP server to attract and track potential attackers 5
kryptoslogic/rdppot A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. 62
gregcmartin/kippo_junos A honeypot designed to log and track brute force SSH attacks, allowing for the analysis of attacker interactions. 10
phype/telnet-iot-honeypot Detects and analyzes Botnet connections to identify malware patterns and networks 305
ntop/ntopng A web-based application for monitoring and analyzing network traffic in real-time. 6,277
betheroot/pghoney A low-interaction Postgres honeypot designed to detect and respond to potential security threats by simulating a Postgres database 18
aelth/ddospot A platform for tracking and monitoring UDP-based Distributed Denial of Service attacks 50
fnzv/yafh A honeypot designed to detect and study malicious activity via SSH and TELNET connections 9