HoneyMap is a web application that visualizes a live stream of GPS locations on an SVG world map using honeypot captures from hpfeeds. The front-end is written in CoffeeScript and utilizes SockJS, jQuery, jVectorMap, and jQuery Transit, while the back-end is written in Go and uses sockjs-go and go-hpfeeds.
Common questions about HoneyMap including features, pricing, alternatives, and user reviews.
HoneyMap is Web application for visualizing live GPS locations on an SVG world map using honeypot captures. It is a Security Operations solution designed to help security teams with Visualization.
HoneyMap is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/fw42/honeymap/ for download and installation instructions.
Popular alternatives to HoneyMap include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
HoneyMap is for security teams and organizations that need Visualization. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A command-line tool for analyzing Cowrie honeypot log files over time, generating statistics and visualizations from local or remote log data.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.