t-pot-attack-map
Event Visualizer
Visualizes honeypot events in real-time using data from T-Pot and Elasticsearch
T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.
23 stars
1 watching
7 forks
Language: JavaScript
last commit: 3 months ago aiohttpaioredisasyncioattack-mapelasticsearchhoneypotredist-potthreat-map
Related projects:
Repository | Description | Stars |
---|---|---|
| Captures attempts to exploit a known vulnerability in Elasticsearch by monitoring incoming requests and sending responses to a configured endpoint. | 27 |
| A honeypot project designed to detect and capture remote file inclusion (RFI) and local file inclusion (LFI) attacks by serving fake URLs that mimic vulnerable website paths. | 17 |
| A Node.js application that simulates an FTP server to attract and track potential attackers | 5 |
| An application that mimics Tomcat manager endpoints to detect and log potential attacks | 11 |
| A honeypot tool designed to detect and analyze the Log4Shell vulnerability in web applications | 91 |
| A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
| An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
| A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| A Docker-based honeypot system for detecting and analyzing network attacks | 148 |
| A system to detect and analyze malicious activity on FTP connections. | 30 |
| A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 63 |
| Automates analysis and visualization of network security incident data from various honeypot systems. | 62 |
| A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
| A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
| A simple honeypot system to detect and respond to potential security threats. | 16 |