- Home
- Security Operations
- Honeypots & Deception
- mysql-honeypotd
mysql-honeypotd
Low interaction MySQL honeypot with various configuration options.

mysql-honeypotd
Low interaction MySQL honeypot with various configuration options.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
mysql-honeypotd Description
Low interaction MySQL honeypot written in C. Dependencies: libev. Usage: mysql-honeypotd [options]... Mandatory arguments to long options are mandatory for short options too. -b, --address ADDRESS the IP address to bind to (default: 0.0.0.0). Can be specified several times. -p, --port PORT the port to bind to (default: 3306). -P, --pid FILE the PID file. -n, --name NAME the name of the daemon for syslog (default: mysql-honeypotd). -u, --user USER drop privileges and switch to this USER (default: daemon or nobody). -g, --group GROUP drop privileges and switch to this GROUP (default: daemon or nogroup). -c, --chroot DIR chroot() into the specified DIR. -s, --setver VER set MySQL server version to VER (default: 5.7.19). -d, --delay DELAY Add DELAY seconds after each login attempt. -f, --foreground do not daemonize (forced if no PID file specified). -x, --no-syslog log errors to stderr only; ignored if -f is not specified. -h, --help display this help and exit. -v, --version output version information and exit. Notes: --user, --group, and --chroot options are honored only if mysql-honeypotd is run as root. PID file can be outside of chroot. When using --name and/or --group, please make su
mysql-honeypotd FAQ
Common questions about mysql-honeypotd including features, pricing, alternatives, and user reviews.
mysql-honeypotd is Low interaction MySQL honeypot with various configuration options.. It is a Security Operations solution designed to help security teams with Mysql, Network Security, Honeypot.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox