- Home
- Security Operations
- Honeypots & Deception
- mysql-honeypotd
mysql-honeypotd
Low interaction MySQL honeypot with various configuration options.

mysql-honeypotd
Low interaction MySQL honeypot with various configuration options.
mysql-honeypotd Description
Low interaction MySQL honeypot written in C. Dependencies: libev. Usage: mysql-honeypotd [options]... Mandatory arguments to long options are mandatory for short options too. -b, --address ADDRESS the IP address to bind to (default: 0.0.0.0). Can be specified several times. -p, --port PORT the port to bind to (default: 3306). -P, --pid FILE the PID file. -n, --name NAME the name of the daemon for syslog (default: mysql-honeypotd). -u, --user USER drop privileges and switch to this USER (default: daemon or nobody). -g, --group GROUP drop privileges and switch to this GROUP (default: daemon or nogroup). -c, --chroot DIR chroot() into the specified DIR. -s, --setver VER set MySQL server version to VER (default: 5.7.19). -d, --delay DELAY Add DELAY seconds after each login attempt. -f, --foreground do not daemonize (forced if no PID file specified). -x, --no-syslog log errors to stderr only; ignored if -f is not specified. -h, --help display this help and exit. -v, --version output version information and exit. Notes: --user, --group, and --chroot options are honored only if mysql-honeypotd is run as root. PID file can be outside of chroot. When using --name and/or --group, please make su
mysql-honeypotd FAQ
Common questions about mysql-honeypotd including features, pricing, alternatives, and user reviews.
mysql-honeypotd is Low interaction MySQL honeypot with various configuration options.. It is a Security Operations solution designed to help security teams with Mysql, Network Security, Honeypot.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox