ssh-auth-logger Logo

ssh-auth-logger

0
Free
Updated 11 March 2025
Visit Website

A low/zero interaction ssh authentication logging honeypot. Structured logging ssh-auth-logger logs all authentication attempts as json making it easy to consume in other tools. No more ugly openssh log parsing vulnerabilities. This is normally logged on one line { "client_version": "SSH-2.0-libssh2_1.4.3", "destinationServicename": "sshd", "dpt": "22", "dst": "192.168.1.2", "duser": "root", "level": "info", "msg": "Request with password", "password": "P@ssword1", "product": "ssh-auth-logger", "server_version": "SSH-2.0-OpenSSH_5.3", "spt": "38624", "src": "192.168.1.4", "time": "2017-11-17T19:16:37-05:00" }

FEATURES

SIMILAR TOOLS

A mini webserver with FTP support for XXE payloads

A modular web application honeypot framework with automation and logging capabilities.

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

Find domains and subdomains related to a given domain

Python telnet honeypot for catching botnet binaries

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved