Very simple but effective docker deployed honeypot to detect port scanning in your environment. Configure ports to be exposed Edit or add ports within the brackets on line 14 of honey_ports.sh for p in {80,3306}; do Also expose corresponding ports in line 17 of dockerfile EXPOSE 80 3306 Build container image docker build -t honey_ports . Run honey_ports container sudo docker run -d -v /var/log:/logs_out honey_ports By default logs of attempted connections will be written to "hp_connections.log" which is stored on a mounted volume on the host.
Common questions about Honey Ports including features, pricing, alternatives, and user reviews.
Honey Ports is A simple Docker-based honeypot to detect port scanning. It is a Security Operations solution designed to help security teams with Port Scanning.
Honey Ports is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/run41/honey_ports/ for download and installation instructions.
Popular alternatives to Honey Ports include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Honey Ports is for security teams and organizations that need Port Scanning. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks