
A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.

A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.
Telnetlogger is a lightweight program designed to log login attempts on Telnet port 23, specifically created to track activity from the Mirai botnet. The tool captures both IP addresses attempting connections and the passwords being used in brute force attacks. It was developed as an alternative to traditional telnetd installations, which the Mirai botnet reportedly does not interact with properly. Key features include: - Real-time logging of Telnet login attempts to stdout - Optional file output for passwords and IP addresses using -p and -i flags - Configurable port listening with -l option for testing purposes - Built-in parsing capabilities to extract usernames and passwords from connection attempts The program requires elevated privileges (sudo) on many systems when binding to ports below 1024. It provides a simple compilation process using make and is particularly useful for security researchers studying botnet behavior and attack patterns targeting IoT devices.
Common questions about Telnetlogger including features, pricing, alternatives, and user reviews.
Telnetlogger is A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity. It is a Security Operations solution designed to help security teams with Botnet, Raspberry Pi, Telnet.
Telnetlogger is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/robertdavidgraham/telnetlogger/ for download and installation instructions.
Popular alternatives to Telnetlogger include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Telnetlogger is for security teams and organizations that need Botnet, Raspberry Pi, Telnet, Attack Detection, Brute Force. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A Python telnet honeypot that emulates shell environments to capture and analyze IoT malware and botnet binaries through automated detection mechanisms.
A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.