SSH honeypots


SSH honeypots
ToolTypeDescriptionLatest releaseRelease dateScore
CowrieSSH/telnet honeypotCowrie is a honeypot to emulate SSH and telnet services. It can be used to learn attack methods and as an additional layer for security monitoring.1.3.0May 10, 201893
DockpotSSH honeypot based on DockerDockpot uses Docker containers and HonSSH to create on-demand SSH honeypots. It forwards traffic for analysis and learning about attack patterns.UnknownUnknown56
HonSSHSSH honeypotHonSSH is a high-interaction SSH honeypot to collect information about attackers that target the SSH service.1.1.2April 4, 201888
KippoSSH honeypotKippo is a honeypot for SSH connections and written in Python. It can be used to learn about the scripts and attacks that are commonly used against SSH.UnknownUnknown44
Kojoney2SSH honeypotKojoney2 is an SSH honeypot based on Kojoney by Jose Antonio Coret. It can be used to learn about threats by mimicking an SSH service.UnknownUnknown56
sshesameSSH honeypotThe sshesame tool provides an SSH honeypot. It accepts connections and then logs any commands that are tried to be executed on the host system.UnknownUnknown64
SSHHiPotHigh-interaction SSH honeypotSSHHiPot is a high-interaction SSH honeypot. It captures connections and commands that are to be performed, for the purpose of learning about possible threats.UnknownUnknown64
SSH HoneypotSSH honeypotSSH Honeypot is as the name implies a honeypot to emulate the SSH service. It can be used to learn about threats and commands used by attackers.UnknownUnknown64