Honey Ports Logo

Honey Ports

0
Free
Updated 11 March 2025
Visit Website

Very simple but effective docker deployed honeypot to detect port scanning in your environment. Configure ports to be exposed Edit or add ports within the brackets on line 14 of honey_ports.sh for p in {80,3306}; do Also expose corresponding ports in line 17 of dockerfile EXPOSE 80 3306 Build container image docker build -t honey_ports . Run honey_ports container sudo docker run -d -v /var/log:/logs_out honey_ports By default logs of attempted connections will be written to "hp_connections.log" which is stored on a mounted volume on the host.

FEATURES

SIMILAR TOOLS

Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

A technique to associate applications with TLS parameters for identifying malware and vulnerable applications.

A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.

A powerful and extensible framework for reconnaissance and attacking various networks and devices.

A tool for classifying packets into flows based on 4-tuple without additional processing.

Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.

A fast and flexible web fuzzer for identifying vulnerabilities in web applications

TCPFLOW is a tool for capturing data transmitted over TCP connections.

A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved