HONEYPOT_ARRAY
What happens when you leave a server on the internet
A T-Pot honeypot sits on my home network and pretends to be a vulnerable server. Bots and attackers find it within minutes, try default passwords, drop malware, and probe for web exploits. This page visualizes that traffic as it happens.
Cowrie
Emulates SSH and Telnet services. Captures every username, password, and shell command attackers try.
Dionaea
Mimics services like SMB, FTP, and HTTP to lure in malware droppers. Saves every binary that lands.
Tanner / Snare
A fake web application that classifies incoming requests — SQL injection, XSS, path traversal, and more.
Total attacks
10,000
No change since last update
Unique source IPs
455
Distinct attacker addresses seen in the current window.
Top targeted service
SMB (90%)
Port 445 via DIONAEA
Malware captures
0
Malware binaries caught by Dionaea in the current window.
Credential attempts
1,089
Login attempts caught across SSH, Telnet, FTP, and other exposed services.
Web attack events
535
Hostile web requests classified by Tanner in the current window.
Attack timeline
Hourly event counts over the past week.
LAST_168_HOURS
Sensor status
Attacker origins
Where the attacks are coming from, based on source IP geolocation.
GEO_DENSITY
Top source countries
| # | Country | Attacks | IPs |
|---|---|---|---|
| 1 | Egypt | 5,973 | 3 |
| 2 | Mexico | 3,199 | 3 |
| 3 | Mongolia | 3,151 | 1 |
| 4 | Pakistan | 3,122 | 3 |
| 5 | Poland | 749 | 4 |
| 6 | China | 590 | 78 |
| 7 | Vietnam | 542 | 7 |
| 8 | United States | 509 | 99 |
| 9 | Romania | 411 | 7 |
| 10 | Thailand | 352 | 4 |
Protocol and service breakdown
Which services attackers are going after the most.
SERVICE_MIX
Protocol and service breakdown: Horizontal bar chart showing the most targeted services and ports in the current honeypot snapshot.
Web attack categories
Types of web exploits attempted against the fake application.
WEB_SIGS
Web attack categories: Horizontal bar chart showing the most common classified web attack categories in the current snapshot.
Credential attempts
The most common username and password combinations attackers try across all exposed services.
AUTH_PRESSURE
| # | Username | Password | Attempts |
|---|---|---|---|
| 1 | root | admin | 109 |
| 2 | 345gs5662d34 | 345gs5662d34 | 98 |
| 3 | root | 3245gs5662d34 | 97 |
| 4 | admin | admin | 12 |
| 5 | root | root | 7 |
| 6 | support | support | 5 |
| 7 | ubnt | ubnt | 5 |
| 8 | user | user | 4 |
| 9 | support | 111111 | 3 |
| 10 | admin | 00 | 2 |
| 11 | admin | 111 | 2 |
| 12 | debian | 00000 | 2 |
| 13 | debian | 111111 | 2 |
| 14 | debian | 222 | 2 |
| 15 | support | 0000 | 2 |
| 16 | test | 0 | 2 |
| 17 | ubnt | 000 | 2 |
| 18 | ubnt | 2222222 | 2 |
| 19 | user | 0 | 2 |
| 20 | user | 66666 | 2 |
Malware captures
Binaries that attackers dropped onto the honeypot. Each hash links to VirusTotal for analysis.
PAYLOAD_INDEX
| SHA-256 | Type | Captures | First seen |
|---|---|---|---|
| No malware samples captured yet. | |||
What's happening
AI-generated summary of the latest 24-hour window of honeypot activity.
AI_SUMMARY
In the last 24 hours, 10,000 attacks were recorded from 455 unique source IPs. The top source countries were Egypt, Mexico, Mongolia, and Pakistan, accounting for 15,445 attacks, with Egypt alone contributing 5,973 attacks from just 3 IPs. The most targeted services were SMB on port 445 with 15,515 events, followed by SSH on port 22 with 887 events, and HTTP on port 80 with 537 events, with the top credential attempt count being 109 for a single username/password pair.
Generated by Llama 4 Scout via Cloudflare Workers AI