Medpot is a honeypot that emulates HL7 / FHIR protocols. Installation requires go 1.17 or newer. Dependencies can be installed using bash scripts/dependencies.sh. You can run the tool using bash scripts/run_medpot.sh or go run go/*.go, compile it using bash scripts/compile_medpot.sh or go build -o medpot go/*.go, create a copy on disk and necessary files using make and make install, or create a Docker container with bash scripts/compile_docker.sh. Medpot listens on port 2575 by default and supports arguments such as setting a logo, port, and log location.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.
A web-based visualization tool that displays statistics and generates charts from Shockpot honeypot data stored in PostgreSQL databases.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A plugin repository that extends the Honeycomb honeypot framework with additional features and capabilities for enhanced threat detection and analysis.