t-pot-attack-map
Event Visualizer
Visualizes honeypot events in real-time using data from T-Pot and Elasticsearch
T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.
23 stars
1 watching
7 forks
Language: JavaScript
last commit: 12 months ago aiohttpaioredisasyncioattack-mapelasticsearchhoneypotredist-potthreat-map
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Captures attempts to exploit a known vulnerability in Elasticsearch by monitoring incoming requests and sending responses to a configured endpoint. | 27 |
| | A honeypot project designed to detect and capture remote file inclusion (RFI) and local file inclusion (LFI) attacks by serving fake URLs that mimic vulnerable website paths. | 17 |
| | A Node.js application that simulates an FTP server to attract and track potential attackers | 5 |
| | An application that mimics Tomcat manager endpoints to detect and log potential attacks | 11 |
| | A honeypot tool designed to detect and analyze the Log4Shell vulnerability in web applications | 91 |
| | A multi-service honeypot solution for real-time threat detection and network security monitoring | 28 |
| | An SSH honeypot solution that captures terminal activity and uploads to asciinema.org, allowing for analysis and storage of attacker interactions. | 96 |
| | A honeypot tool to detect and track network attacks by simulating a compromised system's interface | 2 |
| | A Docker-based honeypot system for detecting and analyzing network attacks | 148 |
| | A system to detect and analyze malicious activity on FTP connections. | 30 |
| | A RDP honeypot system that mimics a vulnerable RDP endpoint to detect and analyze potential attacks. | 63 |
| | Automates analysis and visualization of network security incident data from various honeypot systems. | 62 |
| | A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
| | A high-interaction honeypot solution for detecting Redis protocol exploitation | 22 |
| | A simple honeypot system to detect and respond to potential security threats. | 16 |