HONEYPOT_ARRAY
What happens when you leave a server on the internet
A T-Pot honeypot sits on my home network and pretends to be a vulnerable server. Bots and attackers find it within minutes, try default passwords, drop malware, and probe for web exploits. This page visualizes that traffic as it happens.
Cowrie
Emulates SSH and Telnet services. Captures every username, password, and shell command attackers try.
Dionaea
Mimics services like SMB, FTP, and HTTP to lure in malware droppers. Saves every binary that lands.
Tanner / Snare
A fake web application that classifies incoming requests — SQL injection, XSS, path traversal, and more.
Total attacks
10,000
No change since last update
Unique source IPs
250
Distinct attacker addresses seen in the current window.
Top targeted service
SMB (80%)
Port 445 via DIONAEA
Malware captures
0
Malware binaries caught by Dionaea in the current window.
Credential attempts
2,139
Login attempts caught across SSH, Telnet, FTP, and other exposed services.
Web attack events
392
Hostile web requests classified by Tanner in the current window.
Attack timeline
Hourly event counts over the past week.
LAST_168_HOURS
Sensor status
Attacker origins
Where the attacks are coming from, based on source IP geolocation.
GEO_DENSITY
Top source countries
| # | Country | Attacks | IPs |
|---|---|---|---|
| 1 | India | 4,528 | 7 |
| 2 | Bolivia | 4,329 | 1 |
| 3 | Vietnam | 3,154 | 2 |
| 4 | The Netherlands | 3,044 | 17 |
| 5 | United Kingdom | 2,633 | 9 |
| 6 | United States | 2,593 | 98 |
| 7 | Australia | 2,135 | 6 |
| 8 | Romania | 504 | 7 |
| 9 | Singapore | 435 | 10 |
| 10 | Canada | 357 | 4 |
Protocol and service breakdown
Which services attackers are going after the most.
SERVICE_MIX
Protocol and service breakdown: Horizontal bar chart showing the most targeted services and ports in the current honeypot snapshot.
Web attack categories
Types of web exploits attempted against the fake application.
WEB_SIGS
Web attack categories: Horizontal bar chart showing the most common classified web attack categories in the current snapshot.
Credential attempts
The most common username and password combinations attackers try across all exposed services.
AUTH_PRESSURE
| # | Username | Password | Attempts |
|---|---|---|---|
| 1 | root | admin | 42 |
| 2 | root | 123456 | 18 |
| 3 | root | password | 18 |
| 4 | ubuntu | ubuntu | 16 |
| 5 | admin | admin | 15 |
| 6 | admin | 123456 | 11 |
| 7 | admin | password | 11 |
| 8 | user | user | 7 |
| 9 | guest | guest | 6 |
| 10 | centos | 123456 | 5 |
| 11 | centos | P@ssw0rd | 5 |
| 12 | centos | centos | 5 |
| 13 | guest | 123456 | 5 |
| 14 | guest | P@ssw0rd | 5 |
| 15 | oracle | 123456 | 5 |
| 16 | oracle | oracle | 5 |
| 17 | oracle | password | 5 |
| 18 | test | test | 5 |
| 19 | ubuntu | 123456 | 5 |
| 20 | ubuntu | 12345678 | 4 |
Malware captures
Binaries that attackers dropped onto the honeypot. Each hash links to VirusTotal for analysis.
PAYLOAD_INDEX
| SHA-256 | Type | Captures | First seen |
|---|---|---|---|
| No malware samples captured yet. | |||
What's happening
AI-generated summary of the latest 24-hour window of honeypot activity.
AI_SUMMARY
Over the last 24 hours, 10,000 attacks were recorded from 250 unique source IPs, with top source countries being India, Bolivia, Vietnam, The Netherlands, and the United Kingdom. The most targeted services were SMB on port 445 with 10,787 events, SSH on port 22 with 2,142 events, and HTTP on port 80 with 392 events. The top credential attempts involved 5 unique username/password pairs, with the highest having 42 attempts, and no malware captures were recorded.
Generated by Llama 4 Scout via Cloudflare Workers AI