Home / Threat Defense / Honeypots

Honeypots

Discover honeypots for advanced threat defense and early detection of malicious activity.

Try these 162 AI Honeypots Tools

Tomcat Manager Honeypot
Free

Tomcat Manager Honeypot

Bluetooth Honeypot with monitoring capabilities

Tracebit
Free

Tracebit

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

Trapster Community
Free

Trapster Community

A medium interaction printer honeypot that simulates a standard networked printer

Troje
Free

Troje

Python telnet honeypot for catching botnet binaries

Twisted Honeypots
Free

Twisted Honeypots

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

URO
Free

URO

A powerful tool for finding and exploiting subdomain takeover vulnerabilities

VerySimpleHoneypot
Free

VerySimpleHoneypot

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

vnclowpot
Free

vnclowpot

A correlated injection proxy tool for XSS Hunter

WebLogic Honeypot
Free

WebLogic Honeypot

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.

WhiteFace HoneyPot
Free

WhiteFace HoneyPot

A correlated injection proxy tool for XSS Hunter

Whonow
Free

Whonow

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

xss2png
Free

xss2png

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

xsshunter_client
Free

xsshunter_client

An easy to set up SSH honeypot for logging SSH connections and activity.

xxeserv
Free

xxeserv

Uploader honeypot designed to look like poor website security.

YALIH YALIH
Free

YALIH YALIH

A simple honeypot that collects credentials across various protocols

KFSensor
Free

KFSensor View KFSensor

KFSensor is an intelligent honeypot system engineered for robust intrusion and insider threat detection within Windows environments. It proactively lures and identifies malicious actors by emulating vulnerable system services and trojans, effectively acting as a decoy. Pre-configured to monitor all TCP, UDP, and ICMP traffic, KFSensor provides immediate post-installation network visibility and offers easy customization for simulating additional bespoke services.

Advanced honeypot for intrusion and insider threat detection
Simulates vulnerable services and trojans to attract attackers
Monitors all TCP, UDP, and ICMP ports
Snare
Free

Snare View Snare

Snare is a robust suite of event monitoring and analysis tools engineered to satisfy stringent auditing and security mandates. It excels at collecting, filtering, and analyzing IT event data, providing essential capabilities for real-time security monitoring, deep-dive analysis, comprehensive auditing, and secure archiving. By delivering actionable insights from your IT infrastructure's events, Snare empowers organizations to proactively identify and mitigate threats, ensure compliance, and maintain a secure operational posture.

Comprehensive IT event collection and filtering
Real-time security monitoring and threat detection
In-depth event analysis for forensic investigations
Tracebit
Free

Tracebit View Tracebit

Tracebit redefines cloud intrusion detection by transforming security challenges into opportunities. Instead of complex rule sets that adversaries can evade, Tracebit deploys unique, anomaly-based decoys designed to be inherently difficult to bypass. This innovative approach generates highly actionable alerts, empowering security teams to detect and respond to threats more effectively while actively hindering adversary progress.

Anomaly-based decoy deployment
Actionable, high-fidelity alerts
Environment-specific decoy profiling