Apps with 'Honeypot' feature

All apps in Apps with 'Honeypot' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Cowrie icon
     1 like

    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Linux
    10 alternatives
  2. Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    Thinkst Canary screenshot 1
    10 alternatives
  3. Whatoblock icon
     1 like

    Whatoblock is a real-time cybersecurity threat intelligence platform with global botnet tracking, scanner detection, interactive threat search, and a live threat map.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    Whatoblock screenshot 1
    Whatoblock screenshot 1
    Whatoblock screenshot 2
    +3
    Whatoblock screenshot 3
    17 alternatives
  4. Blumira icon
     8 likes

    Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    5 alternatives
  5. SikkerAPI icon
     1 like

    SikkerAPI is an IP reputation provider powered by its own proprietary honeypot telemetry and community reports. SikkerAPI is free to use with a free API key.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    SikkerAPI screenshot 1
    SikkerAPI screenshot 1
    SikkerAPI screenshot 2
    3 alternatives
  6. psad is a collection of three lightweight system daemons (two main daemons and one helper daemon) that run on Linux machines and analyze iptables log messages to detect port scans and other suspicious traffic.

    Cost / License

    Application type

    Platforms

    • Linux
    psad: Port Scan Attack Detector screenshot 1
  7. Tina is a network security appliance that is developed for detection and prevention of contemporary cyber threats. Having aa hybrid design, Tina consists of various technologies; DPI, cyber intelligence, cloud technologies, honeypot and sandbox.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
  8. Beelzebub icon
     Like

    Beelzebub is an advanced honeypot framework designed to provide a highly secure environment for detecting and analyzing cyber attacks. It offers a low code approach for easy implementation and uses AI to mimic the behavior of a high-interaction honeypot.

    Cost / License

    Platforms

    • Online
    Beelzebub screenshot 1
  9. Kippo icon
     Like

    Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

    Cost / License

    • Free
    • Open Source

    Alerts

    • Discontinued

    Platforms

    • Linux
    6 alternatives
  10. Hellpot icon
     Like

    HellPot is an endless honeypot based on Heffalump that sends unruly HTTP bots to hell.

    Cost / License

    • Free
    • Open Source (MIT)

    Platforms

    • Windows
    • Linux
    • Self-Hosted
    Hellpot screenshot 1
    4 alternatives
  11. Honeypots icon
     Like

    30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc).

    Cost / License

    Platforms

    • Online
    • Linux
    Honeypots screenshot 1
  12. Tracebit icon
     1 like

    Tracebit detects and contains security incidents using cloud canaries. Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    7 alternatives