SSH Honeypot

LSE toolsLSE toolsSSH Honeypot (287)SSH Honeypot (287)

Tool and Usage

SSH Honeypot is as the name implies a honeypot to emulate the SSH service. It can be used to learn about threats and commands used by attackers.

Usage and audience

SSH Honeypot is commonly used for learning or threat discovery. Target users for this tool are security professionals and system administrators.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + The source code of this software is available

Author and Maintainers

SSH Honeypot is under development by Daniel Roberson.

Installation

Supported operating systems

SSH Honeypot is known to work on Linux and macOS.

SSH Honeypot alternatives

Similar tools to SSH Honeypot:

78

Cowrie

Cowrie is a honeypot to emulate SSH and telnet services. It can be used to learn attack methods and as an additional layer for security monitoring.

56

Dockpot

Dockpot uses Docker containers and HonSSH to create on-demand SSH honeypots. It forwards traffic for analysis and learning about attack patterns.

89

HonSSH

HonSSH is a high-interaction SSH honeypot to collect information about attackers that target the SSH service.

See all alternatives tools for SSH Honeypot »

Found an improvement? Become an influencer and submit an update.
Project details
Latest releaseNo release found
LicenseMIT

Project health

64
This score is calculated by different factors, like project age, last release date, etc.

Links

GitHub iconGitHub project

Categories

This tool is categorized as a honeypot and SSH honeypot.

Related terms