Honeyntp Logo

Honeyntp

Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.

55
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Honeyntp Description

Honeyntp is an NTP-based honeypot and logging tool that captures and analyzes Network Time Protocol (NTP) traffic for security monitoring purposes. The tool functions as both a scanner logger and honeypot, recording all incoming NTP packets into a Redis database for storage and analysis. It maintains detailed tracking information including first-seen and last-seen timestamps for each unique IP address and port combination. Built on the ntplib library, Honeyntp has been tested and verified to work on both Linux and Windows 7 operating systems. The tool provides cross-platform compatibility for deployment in various network environments. One of the primary use cases for Honeyntp is detecting Distributed Denial of Service (DDoS) attacks that leverage NTP amplification techniques. The tool is particularly effective at identifying malicious traffic patterns where attackers commonly use port 80 as the source port for their attacks. The Redis database backend enables efficient storage and retrieval of captured NTP traffic data, allowing security analysts to perform historical analysis and identify trends in attack patterns over time.

Honeyntp FAQ

Common questions about Honeyntp including features, pricing, alternatives, and user reviews.

Honeyntp is Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.. It is a Security Operations solution designed to help security teams with DDOS, Redis, Attack Detection.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

CatchProbe SmartDeceptive Logo

AI-based deception platform for collecting cyber threat intelligence

0
Acalvio ShadowPlex Logo

Deception platform using external-facing decoys for threat intel & recon detection

0
AD Tripwires Logo

Active Directory deception technology for threat detection and response

0
Sesame IT LOKI: Threat Deception Logo

Network deception tool deploying lures to detect & analyze advanced threats.

0
Deception Platform Logo

Cyber deception platform for early threat detection, attacker engagement & response.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox