Loading...

sshd-honeypot is a free Honeypots & Deception tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to sshd-honeypot, including their key features and shared capabilities.
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
Shares 3 capabilities with sshd-honeypot: SSH, Attack Detection, Brute Force
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
Shares 3 capabilities with sshd-honeypot: SSH, Attack Detection, Brute Force
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.
Shares 3 capabilities with sshd-honeypot: SSH, Attack Detection, Brute Force
Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.
AI-based deception platform for collecting cyber threat intelligence
Deception platform using external-facing decoys for threat intel & recon detection
Medium interaction SSH honeypot for logging brute force attacks and shell interactions.
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.
Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.
AI-based deception platform for collecting cyber threat intelligence
Deception platform using external-facing decoys for threat intel & recon detection
Active Directory deception technology for threat detection and response
Network deception tool deploying lures to detect & analyze advanced threats.
Cyber deception platform for early threat detection, attacker engagement & response.
Fake protocol server simulator supporting 50+ network protocols for deception
TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.
SaaS cyber deception platform deploying decoy sensors to detect attackers.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A Go-based honeypot server for detecting and logging attacker activity
SSH Honeypot written in Go that records commands and IP addresses of attempted logins.
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
DDoSPot is a plugin-based honeypot platform that tracks UDP-based DDoS attacks and generates daily blacklists of potential attackers and scanners.
Ensnare is a Ruby on Rails gem that deploys honey traps and automated responses to detect and interfere with malicious behavior in web applications.
A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.
A script for setting up a dionaea and kippo honeypot using Docker images.
Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.
A command-line tool for analyzing Cowrie honeypot log files over time, generating statistics and visualizations from local or remote log data.
Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.
Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.
A network responder supporting various protocols with minimal assumptions on client intentions.
An easy to set up SSH honeypot for logging SSH connections and activity.
A simple honeypot that collects credentials across various protocols
A Python-based honeypot service for SSH, FTP, and Telnet connections
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
A low-interaction SSH honeypot tool for recording authentication attempts.
Fake SSH server that sends push notifications for login attempts
A webapp for displaying statistics about your kippo SSH honeypot.
Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.
Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
A honeypot that simulates an exposed networked printer using PJL protocol to capture and log attacker interactions through a virtual filesystem.
Common questions security professionals ask when evaluating alternatives and competitors to sshd-honeypot.
The most popular alternatives to sshd-honeypot include Hudinx, Kippo, SSH Honeypot, Troje, and honeyssh. These Honeypots & Deception tools offer similar capabilities and are frequently compared by security professionals evaluating their options.