HONEYPOT_ARRAY
What happens when you leave a server on the internet
A T-Pot honeypot sits on my home network and pretends to be a vulnerable server. Bots and attackers find it within minutes, try default passwords, drop malware, and probe for web exploits. This page visualizes that traffic as it happens.
Cowrie
Emulates SSH and Telnet services. Captures every username, password, and shell command attackers try.
Dionaea
Mimics services like SMB, FTP, and HTTP to lure in malware droppers. Saves every binary that lands.
Tanner / Snare
A fake web application that classifies incoming requests — SQL injection, XSS, path traversal, and more.
Total attacks
10,000
No change since last update
Unique source IPs
384
Distinct attacker addresses seen in the current window.
Top targeted service
SMB (50%)
Port 445 via DIONAEA
Malware captures
0
Malware binaries caught by Dionaea in the current window.
Credential attempts
2,038
Login attempts caught across SSH, Telnet, FTP, and other exposed services.
Web attack events
410
Hostile web requests classified by Tanner in the current window.
Attack timeline
Hourly event counts over the past week.
LAST_168_HOURS
Sensor status
Attacker origins
Where the attacks are coming from, based on source IP geolocation.
GEO_DENSITY
Top source countries
| # | Country | Attacks | IPs |
|---|---|---|---|
| 1 | Vietnam | 3,163 | 4 |
| 2 | Russia | 2,919 | 13 |
| 3 | India | 1,627 | 25 |
| 4 | South Korea | 1,357 | 20 |
| 5 | United States | 1,162 | 97 |
| 6 | China | 1,133 | 74 |
| 7 | Brazil | 970 | 10 |
| 8 | Romania | 512 | 9 |
| 9 | Germany | 402 | 11 |
| 10 | Netherlands | 402 | 12 |
Protocol and service breakdown
Which services attackers are going after the most.
SERVICE_MIX
Protocol and service breakdown: Horizontal bar chart showing the most targeted services and ports in the current honeypot snapshot.
Web attack categories
Types of web exploits attempted against the fake application.
WEB_SIGS
Web attack categories: Horizontal bar chart showing the most common classified web attack categories in the current snapshot.
Credential attempts
The most common username and password combinations attackers try across all exposed services.
AUTH_PRESSURE
| # | Username | Password | Attempts |
|---|---|---|---|
| 1 | root | admin | 363 |
| 2 | 345gs5662d34 | 345gs5662d34 | 264 |
| 3 | root | 3245gs5662d34 | 245 |
| 4 | postgres | 3245gs5662d34 | 18 |
| 5 | admin | admin | 7 |
| 6 | ubuntu | ubuntu | 6 |
| 7 | admin | ftpuser | 4 |
| 8 | ftpuser | Ftpuser28! | 4 |
| 9 | postgres | postgres6 | 4 |
| 10 | root | 1qaz2wsx@# | 4 |
| 11 | sol | 123 | 4 |
| 12 | sol | 1234 | 4 |
| 13 | sol | sol | 4 |
| 14 | test | test6 | 4 |
| 15 | vpn | Vpn1234 | 4 |
| 16 | vpn | vpn!@# | 4 |
| 17 | ftpuser | 112233 | 3 |
| 18 | ftpuser | 123 | 3 |
| 19 | test | webmaster | 3 |
| 20 | admin | 0l0ctyQh243O63uD | 2 |
Malware captures
Binaries that attackers dropped onto the honeypot. Each hash links to VirusTotal for analysis.
PAYLOAD_INDEX
| SHA-256 | Type | Captures | First seen |
|---|---|---|---|
| No malware samples captured yet. | |||
What's happening
AI-generated summary of the latest 24-hour window of honeypot activity.
AI_SUMMARY
Over the last 24 hours, 10,000 attacks were recorded from 384 unique source IPs, with the top source countries being Vietnam, Russia, India, South Korea, and the United States. The most targeted services were SMB on port 445 with 3,234 events, SSH on port 22 with 2,100 events, and HTTP on port 80 with 410 events, with attackers trying 2,038 credential combinations, primarily focusing on 5 unique username/password pairs with a top attempt count of 363. No malware captures were recorded during this period.
Generated by Llama 4 Scout via Cloudflare Workers AI