ssh-auth-logger Logo

ssh-auth-logger

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

26
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

ssh-auth-logger Description

A low/zero interaction ssh authentication logging honeypot. Structured logging ssh-auth-logger logs all authentication attempts as json making it easy to consume in other tools. No more ugly openssh log parsing vulnerabilities. This is normally logged on one line { "client_version": "SSH-2.0-libssh2_1.4.3", "destinationServicename": "sshd", "dpt": "22", "dst": "192.168.1.2", "duser": "root", "level": "info", "msg": "Request with password", "password": "P@ssword1", "product": "ssh-auth-logger", "server_version": "SSH-2.0-OpenSSH_5.3", "spt": "38624", "src": "192.168.1.4", "time": "2017-11-17T19:16:37-05:00" }

ssh-auth-logger FAQ

Common questions about ssh-auth-logger including features, pricing, alternatives, and user reviews.

ssh-auth-logger is A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.. It is a Security Operations solution designed to help security teams with SSH.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

fofapro fapro Logo

Fake protocol server simulator supporting 50+ network protocols for deception

0
Hudinx Logo

Medium interaction SSH honeypot for logging brute force attacks and shell interactions.

0
gohoney Logo

SSH Honeypot written in Go that records commands and IP addresses of attempted logins.

0
sshd-honeypot Logo

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

0
Kippo Detect Logo

Detects Kippo SSH honeypot instances externally

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox