π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯
π₯ βββ βββ βββββββ ββββ ββββββββββββββ ββββββββββ βββββββ βββββββββ π₯
π§ βββ βββββββββββββββββ βββββββββββββββ ββββββββββββββββββββββββββββββ π§
π¨ βββββββββββ βββββββββ βββββββββ βββββββ βββββββββββ βββ βββ π¨
π© βββββββββββ βββββββββββββββββββ βββββ βββββββ βββ βββ βββ π©
π¦ βββ βββββββββββββββ ββββββββββββββ βββ βββ βββββββββ βββ π¦
πͺ βββ βββ βββββββ βββ βββββββββββββ βββ βββ βββββββ βββ πͺ
π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯π₯
A comprehensive honeypot system for detecting, trapping, and analyzing unauthorized access attempts
Flask-Honeypot Framework is a comprehensive cybersecurity deception platform that automatically redirects over 500+ common penetration testing paths and vulnerability scan attempts to a sophisticated network of 20+ realistic-looking fake admin dashboards and login portals. The system meticulously records 100% of attacker interactionsβcapturing every keystroke, mouse movement, and form submissionβwhile collecting 30+ data points including IP address, geolocation (accurate to city level), ASN information, device fingerprints, and behavioral patterns to build detailed threat intelligence profiles. Built on a Flask/React/MongoDB/Redis stack, the framework features a stunningly designed admin dashboard with 15+ interactive visualizations, real-time threat intelligence, and comprehensive filtering capabilities that can process and display data from thousands of attack sessions. Deployment requires just 2-3 commands with Docker support, making it exceptionally easy to integrate into existing security infrastructure while providing enterprise-grade protection and intelligence gathering capabilities against common web attack vectors.
Flask-Honeypot is a security monitoring tool designed to detect and analyze unauthorized access attempts by creating convincing decoys that attract and trap potential attackers.
- Multiple honeypot trap types - 20+ pre-built decoys including admin panels, WordPress, phpMyAdmin, file managers, and more
- Interactive deceptive elements - Clickable buttons, forms, fake file downloads, and simulated errors to keep attackers engaged
- Rich attacker profiling - Collect IPs, user agents, GeoIP data, ASN info, and behavioral patterns
- Real-time Tor/proxy detection - Identify attackers attempting to hide their true location
- Advanced security analytics - Visual dashboards showing attack patterns, geographic distribution, and threat levels
- Auto-blocking capabilities - Rate limiting and IP blocking with configurable thresholds
- Detailed interaction logging - Every click, form submission, and interaction attempt is recorded
- Containerized deployment - Quick setup with Docker and docker-compose
- Scalable architecture - MongoDB for storage and Redis for session management
- MaxMind GeoIP integration - Optional geographic and ASN tracking
Features β’ Quick Start β’ Installation β’ Configuration β’ Technical Overview β’ Honeypot Traps β’ Admin Dashboard β’ Integration β’ Docker Deployment β’ Security β’ License
Flask-Honeypot is a security monitoring tool designed to detect and analyze unauthorized access attempts by creating convincing decoys that attract and trap potential attackers.
- Multiple honeypot trap types - 20+ pre-built decoys including admin panels, WordPress, phpMyAdmin, file managers, and more
- Interactive deceptive elements - Clickable buttons, forms, fake file downloads, and simulated errors to keep attackers engaged
- Rich attacker profiling - Collect IPs, user agents, GeoIP data, ASN info, and behavioral patterns
- Real-time Tor/proxy detection - Identify attackers attempting to hide their true location
- Advanced security analytics - Visual dashboards showing attack patterns, geographic distribution, and threat levels
- Auto-blocking capabilities - Rate limiting and IP blocking with configurable thresholds
- Detailed interaction logging - Every click, form submission, and interaction attempt is recorded
- Containerized deployment - Quick setup with Docker and docker-compose
- Scalable architecture - MongoDB for storage and Redis for session management
- MaxMind GeoIP integration - Optional geographic and ASN tracking
git clone https://github.com/CarterPerez-dev/flask-honeypot.git
cd honeypot-framework
chmod +x setup_honeypot.sh
./setup_honeypot.sh
- Check dependencies (Python, Docker, Docker Compose)
- Create a Python virtual environment
- Install Flask-Honeypot
- Generate a secure configuration in
.env
- Prompt for optional MaxMind license key
docker-compose up --build -d
http://your-server/honey/login
https://your-server/honey/login
Use the admin password from your .env
file (generated by the setup script, you can always change it).
pip install flask-honeypot=0.1.1
from honeypot import create_honeypot_app
app = create_honeypot_app()
if __name__ == "__main__":
app.run()
- Python 3.8+
- MongoDB 4.0+
- Redis 5.0+ (for session management)
- Docker & Docker Compose (for containerized deployment)
- (Optional) MaxMind GeoIP database license key
Configuration options can be set via:
- Environment variables
- The
.env
file - Direct parameters to
create_honeypot_app()
Option | Description | Default |
---|---|---|
SECRET_KEY |
Secret key for sessions | Randomly generated |
MONGO_URI |
MongoDB connection URI | mongodb://localhost:27017/honeypot |
REDIS_HOST |
Redis host | localhost |
REDIS_PORT |
Redis port | 6379 |
REDIS_PASSWORD |
Redis password | None |
HONEYPOT_ADMIN_PASSWORD |
Admin dashboard password | Required |
HONEYPOT_RATE_LIMIT |
Max requests per period | 15 |
HONEYPOT_RATE_PERIOD |
Rate limit period in seconds | 60 |
MAXMIND_LICENSE_KEY |
MaxMind GeoIP license key | None |
HONEYPOT_DATA_DIRECTORY |
Directory for data storage | /app/data |
FLASK_ENV |
Environment (development /production ) |
production |
Example .env
file:
SECRET_KEY="f926dfdd9fffdafedd195ab8b30e60aa8157736475be9646c41b9b1994e47089"
MONGO_USER="supersecretstrongpassword123!"
MONGO_PASSWORD="Bigstrongpasswordyea112"
REDIS_PASSWORD="Ih9zfuUrgoxnir5qz"
HONEYPOT_ADMIN_PASSWORD="2WW6TUhgfdu3BkuApLA"
HONEYPOT_RATE_LIMIT=5
HONEYPOT_RATE_PERIOD=60
FLASK_ENV=production
HONEYPOT_DATA_DIRECTORY=/app/data
Flask-Honeypot uses a Flask backend to serve deceptive content that appears legitimate to attackers while logging all interactions for security analysis.
.
βββ LICENSE
βββ MANIFEST.in
βββ README.md
βββ examples
βΒ Β βββ App-js.py
βΒ Β βββ enhanced_admin_security.py
βΒ Β βββ example_flask_integration.py
βββ honeypot
βΒ Β βββ __init__.py
βΒ Β βββ _version.py
βΒ Β βββ backend
βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βββ app.py
βΒ Β βΒ Β βββ helpers
βΒ Β βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βΒ Β βββ db_utils.py
βΒ Β βΒ Β βΒ Β βββ geoip_manager.py
βΒ Β βΒ Β βΒ Β βββ proxy_detector.py
βΒ Β βΒ Β βΒ Β βββ unhackable.py
βΒ Β βΒ Β βββ middleware
βΒ Β βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βΒ Β βββ csrf_protection.py
βΒ Β βΒ Β βββ routes
βΒ Β βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βΒ Β βββ admin.py
βΒ Β βΒ Β βΒ Β βββ honeypot.py
βΒ Β βΒ Β βΒ Β βββ honeypot_pages.py
βΒ Β βΒ Β βΒ Β βββ honeypot_routes.py
βΒ Β βΒ Β βββ templates
βΒ Β βΒ Β βββ honeypot
βΒ Β βΒ Β βΒ Β βββ admin-dashboard.html
βΒ Β βΒ Β βΒ Β βββ admin-login.html
βΒ Β βΒ Β βΒ Β βββ cloud-dashboard.html
βΒ Β βΒ Β βΒ Β βββ cms-dashboard.html
βΒ Β βΒ Β βΒ Β βββ cpanel-dashboard.html
βΒ Β βΒ Β βΒ Β βββ database-dashboard.html
βΒ Β βΒ Β βΒ Β βββ debug-console.html
βΒ Β βΒ Β βΒ Β βββ devops-dashboard.html
βΒ Β βΒ Β βΒ Β βββ ecommerce-dashboard.html
βΒ Β βΒ Β βΒ Β βββ filesharing-dashboard.html
βΒ Β βΒ Β βΒ Β βββ forum-dashboard.html
βΒ Β βΒ Β βΒ Β βββ framework-dashboard.html
βΒ Β βΒ Β βΒ Β βββ generic-login.html
βΒ Β βΒ Β βΒ Β βββ generic-page.html
βΒ Β βΒ Β βΒ Β βββ iot-dashboard.html
βΒ Β βΒ Β βΒ Β βββ mail-dashboard.html
βΒ Β βΒ Β βΒ Β βββ mobile-api.html
βΒ Β βΒ Β βΒ Β βββ monitoring-dashboard.html
βΒ Β βΒ Β βΒ Β βββ phpmyadmin-dashboard.html
βΒ Β βΒ Β βΒ Β βββ remote-access-dashboard.html
βΒ Β βΒ Β βΒ Β βββ shell.html
βΒ Β βΒ Β βΒ Β βββ wp-dashboard.html
βΒ Β βΒ Β βββ redirection
βΒ Β βΒ Β βββ step1.html
βΒ Β βΒ Β βββ step10.html
βΒ Β βΒ Β βββ step11.html
βΒ Β βΒ Β βββ step12.html
βΒ Β βΒ Β βββ step13.html
βΒ Β βΒ Β βββ step14.html
βΒ Β βΒ Β βββ step15.html
βΒ Β βΒ Β βββ step2.html
βΒ Β βΒ Β βββ step3.html
βΒ Β βΒ Β βββ step4.html
βΒ Β βΒ Β βββ step5.html
βΒ Β βΒ Β βββ step6.html
βΒ Β βΒ Β βββ step7.html
βΒ Β βΒ Β βββ step8.html
βΒ Β βΒ Β βββ step9.html
βΒ Β βββ cli.py
βΒ Β βββ config
βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βββ settings.py
βΒ Β βββ database
βΒ Β βΒ Β βββ models.py
βΒ Β βΒ Β βββ mongo-init.js
βΒ Β βΒ Β βββ mongodb.py
βΒ Β βββ deploy_templates
βΒ Β βΒ Β βββ Dockerfile.backend.template
βΒ Β βΒ Β βββ Dockerfile.nginx.template
βΒ Β βΒ Β βββ __init__.py
βΒ Β βΒ Β βββ dev-nginx.conf.template
βΒ Β βΒ Β βββ docker-compose.dev.yml.template
βΒ Β βΒ Β βββ docker-compose.yml.template
βΒ Β βΒ Β βββ dot_env.example
βΒ Β βΒ Β βββ nginx
βΒ Β βΒ Β βββ nginx.conf.template
βΒ Β βΒ Β βββ sites-enabled
βΒ Β βΒ Β βββ proxy.conf.template
βΒ Β βββ frontend
βΒ Β βΒ Β βββ README.md
βΒ Β βΒ Β βββ package-lock.json
βΒ Β βΒ Β βββ package.json
βΒ Β βΒ Β βββ src
βΒ Β βΒ Β βββ App.js
βΒ Β βΒ Β βββ components
βΒ Β βΒ Β βΒ Β βββ JsonSyntaxHighlighter.js
βΒ Β βΒ Β βΒ Β βββ LoadingPlaceholder.js
βΒ Β βΒ Β βΒ Β βββ csrfHelper.js
βΒ Β βΒ Β βββ index.css
βΒ Β βΒ Β βββ index.js
βΒ Β βΒ Β βββ reportWebVitals.js
βΒ Β βΒ Β βββ static
βΒ Β βΒ Β βΒ Β βββ css
βΒ Β βΒ Β βΒ Β βΒ Β βββ HoneypotTab.css
βΒ Β βΒ Β βΒ Β βΒ Β βββ HtmlInteractionsTab.css
βΒ Β βΒ Β βΒ Β βΒ Β βββ JsonSyntaxHighlighter.css
βΒ Β βΒ Β βΒ Β βΒ Β βββ LoadingPlaceholder.css
βΒ Β βΒ Β βΒ Β βΒ Β βββ admin.css
βΒ Β βΒ Β βΒ Β βΒ Β βββ login.css
βΒ Β βΒ Β βΒ Β βββ js
βΒ Β βΒ Β βΒ Β βΒ Β βββ admin.js
βΒ Β βΒ Β βΒ Β βΒ Β βββ login.js
βΒ Β βΒ Β βΒ Β βββ tabs
βΒ Β βΒ Β βΒ Β βββ HoneypotTab.js
βΒ Β βΒ Β βΒ Β βββ HtmlInteractionsTab.js
βΒ Β βΒ Β βΒ Β βββ OverviewTab.js
βΒ Β βΒ Β βββ utils
βΒ Β βΒ Β βββ dateUtils.js
βΒ Β βββ utils
βΒ Β βββ generate_config.py
βββ mongo-init.js
βββ pyproject.toml
βββ setup_honeypot.sh
π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦π¦
π¦ π¦
π¦ ββββ¦ βββββββ¦ββ β¦ β¦ββββββββββ¦ β¦ββββββββ¦β π¦
π¦ β β£ β β ββ£ββββ β©β β ββ£β ββββββ£ ββ¦ββ βββ β β π¦
π© β β©βββ© β©ββββ© β© β© β©βββββββββ β© β© βββ β© π©
π© π©
π© βοΈ Trap β’ Monitor β’ Analyze βοΈ π©
π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©π©
- Flask Backend: Serves honeypot pages and logs interactions
- MongoDB: Stores interaction data, attacker profiles, and logs
- Redis: Manages secure sessions for the admin interface
- GeoIP Detection: Identifies attacker locations (requires MaxMind)
- Proxy Detector: Identifies Tor exit nodes and known proxies
The Flask-Honeypot framework includes a sophisticated collection of deceptive web interfaces designed to attract, engage, and monitor potential attackers. These traps not only collect credentials but track every interaction, mouse movement, and keyboard input to build comprehensive profiles of attacker behavior.
--
The admin login portal (admin-login.html
) serves as the first line of defense and intelligence gathering:
- Adaptive Authentication Challenges: The portal presents initially simple login forms that become increasingly complex with each failed attempt, introducing impossible CAPTCHAs after the second failure
- Credential Harvesting: All submitted credentials are logged along with metadata about the user's session
- Behavioral Analysis Features: The system tracks mouse movements, typing patterns, and interaction frequency
- SQL Injection Detection: Real-time analysis of input fields for SQL patterns like
' OR '1'='1
with warnings that make attackers believe they've been detected - Impossible CAPTCHA System: After multiple failures, the CAPTCHA text purposely moves around the screen or uses unreadable characters from the set of pre-defined patterns like
l1Il1lI1l1Il
or0oO0oO0oO0o
- Fake System Alerts: Security notifications appear randomly to create pressure and encourage hasty behavior
- Password Reset Trap: A password reset option that simulates email sending but never completes, harvesting additional information
- Two-Factor Authentication Simulation: Offers 2FA that always fails after collecting the verification code
- Keyboard Input Scrambling: Randomly maps keyboard input to different characters while displaying fake "keylogger protection" messages
The admin dashboard honeypot (admin-dashboard.html
) is designed to resemble legitimate system administration interfaces:
- Interactive Statistics Panels: Displays fake system statistics with real-time updating values that never complete their processes
- User Management System: Presents tables of fictitious users with sensitive-looking data
- Security Alert Section: Shows fake security notifications that highlight the current session as suspicious
- Command Terminal Emulation: Provides a simulated terminal that accepts and responds to commands while logging everything
- Crypto Mining Simulation: A fake cryptocurrency miner that appears to be running in the background
- Popup Storm Trigger: Actions that generate multiple difficult-to-close popup windows
- Fake File Downloads: Options to download "sensitive" data that actually contain tracking content
- BSOD (Blue Screen) Simulation: System crash scenarios triggered by certain actions
- Admin Chat Simulation: A chat interface where fictitious administrators discuss the "intrusion" in real-time
- Vanishing UI Elements: Buttons that move away from the cursor when approached
- Screen Flicker Effects: Random screen glitches to create tension and urgency
- Encryption Ransom Simulation: A sequence that simulates ransomware encryption of system files
- Impossible Verification Puzzles: Mathematical challenges that increase in difficulty and are designed to be unsolvable
The e-commerce dashboard honeypot (ecommerce-dashboard.html
) targets attackers looking for payment processing systems:
- Store Performance Metrics: Fake sales data, revenue figures, and customer statistics
- Payment Gateway Integration: Seemingly functional payment processing controls
- Customer Database Access: Tables of fictional customers with options to view payment details
- Order Processing System: Simulated order management with transaction logs
- Payment Security Verification: CAPTCHA systems and security checks for accessing payment data
- Cryptocurrency Payment Portal: Bitcoin wallet integration that logs entered wallet addresses
- Fraud Detection System: Interactive scanning tools that simulate security processes
- Sales Analytics: Graphs and metrics showing store performance
- API Key Management: Exposed payment gateway API keys that log when they're copied
- Customer Account Management: Password reset and account modification options
- Store Settings Panel: Configuration options for the fake store
The shell honeypot (shell.html
) creates a convincing terminal environment:
- Virtual File System: Complete simulated Linux directory structure with realistic paths and permissions
- Command Recognition: Responds to over 40 standard Linux commands including
ls
,cd
,cat
,pwd
,grep
, and more - Sensitive File Placement: Strategic placement of files like
.bash_history
, SSH keys, and configuration files with fake credentials - Command History Tracking: All entered commands are recorded with timestamps and session data
- Password Files: Accessible
/etc/passwd
with restricted/etc/shadow
access to appear authentic - Nested Directory Mazes: Deep directory structures that encourage exploration while monitoring navigation patterns
- System Logs: Fake log files in
/var/log/
containing login attempts and system events - Web Server Configuration: Apache configuration files and access logs
- Backup Scripts: Seemingly useful backup and security scan scripts
- Matrix Visual Effect: An interactive "matrix" command that creates engaging visual effects
- Easter Eggs: Hidden commands like
cowsay
andfortune
that encourage prolonged interaction
The multi-step redirection system (step1.html
through step15.html
) creates a convincing security gauntlet:
- Sequential Security Layers: A series of verification steps that simulate increasing levels of system access
- Biometric Authentication Simulation: Fake fingerprint scanning with progress indicators
- Security Code Entry: Emergency backup codes that never actually work
- Progress Trackers: Visual indicators showing verification progress that never fully completes
- Session Timeout Features: Simulated security timeouts that reset progress
- Hardware Security Key Verification: Requests for physical security key insertion
- Executive Approval Simulation: Fake waiting for administrator approval
- Critical Warning Banners: Red alert notifications about restricted system areas
- Redirection Chains: Each successful step leads to another security challenge
- Verification Failure Scenarios: Programmed to eventually fail regardless of input
- IP Address Logging: Displays the visitor's actual IP address to create urgency
These honeypot traps are engineered with sophisticated JavaScript and CSS to create convincing interactive experiences:
- Real-Time Input Analysis: Every keystroke in form inputs is monitored and analyzed
- Mouse Tracking: Records mouse movements, hesitations, and interaction patterns
- Randomized Responses: System responses vary to appear more authentic and prevent pattern recognition
- Selective Failure Points: Strategic points where the system always fails regardless of input
- Timing Analysis: Monitors time spent on pages and between interactions
- Browser Fingerprinting: Collects detailed browser, device, and system information
- WebSocket Simulations: Fake real-time connections that appear to be communicating with servers
- Local Storage Manipulation: Creates persistent tracking even after page refreshes
- CSS Animation Effects: Visual cues that create urgency or induce specific behaviors
- Mobile Responsiveness: Traps work on all device types with adaptive interfaces
- Keyboard Event Interception: Captures all keyboard inputs including keyboard shortcuts
- HTTP Request Logging: Tracks all network requests made during interaction
Beyond the core traps detailed above, the framework includes specialized honeypots for various targets:
-
Database Administration Interfaces:
- MySQL, PostgreSQL, and MongoDB admin panels with query execution capabilities
- Database browsing interfaces with fake tables and records
- Backup and restore functionality that logs all interaction
-
Content Management Systems:
- WordPress, Joomla, Drupal admin panels with plugin installation pages
- Theme customization interfaces with file upload capabilities
- User management and content editing sections
-
Network Device Interfaces:
- Router configuration pages with network settings
- Firewall management interfaces with rule editing
- Switch and access point dashboards
-
Development Tools:
- Jenkins CI/CD pipelines with build histories
- GitLab/GitHub repository browsers with commit logs
- Deployment management interfaces
-
Remote Access Systems:
- VPN administration portals with user management
- RDP/VNC connection interfaces
- SSH key management pages
The actual administrator dashboard (for security teams monitoring the honeypots) provides extensive analytical capabilities:
- Real-Time Activity Monitor: Live feed of all honeypot interactions across all traps
- Interaction Timeline: Chronological view of attacker actions with playback capabilities
- Geographic Attribution: IP-based location mapping with ASN information
- Behavioral Analysis: Pattern recognition of common attack methodologies
- Credential Collection: Database of attempted username/password combinations
- Command Analysis: Statistics on most frequently attempted commands
- Session Replays: Full visual reconstruction of attacker sessions
- Attacker Profiling: Machine learning-based categorization of attack patterns
- Threat Intelligence Integration: Cross-reference with known threat actor TTPs
- Alert Configuration: Customizable triggers for specific high-risk behaviors
- Export Capabilities: Data export in multiple formats for further analysis
- Tor Exit Node Detection: Identification of connections from anonymizing networks
The combination of these deceptive interfaces with comprehensive monitoring creates an effective system for detecting, analyzing, and understanding unauthorized access attempts while gathering actionable threat intelligence. Each interaction is timestamped, geolocated, and stored for analysis.
- Database Admin: MySQL, MongoDB, Redis interfaces
- File Managers: Cloud storage and file sharing
- Email Systems: Webmail interfaces
- CMS Systems: Joomla, Drupal, and other CMS platforms
- E-commerce: Shopify, WooCommerce admin panels
- Network Devices: Router configuration panels
- Remote Access: SSH, RDP, VNC interfaces
- Development Tools: Jenkins, GitLab, etc.
- API Endpoints: Simulated REST APIs
The admin dashboard provides security staff with detailed insights:
- Overview: Summary of recent activity
- Detailed Stats: In-depth analysis of attack patterns
- Geographic View: Map showing attack origins
- Threat Analysis: Categorization of attack types
- Raw Logs: Complete interaction records
- System Health: Monitoring of honeypot operation
from flask import Flask
from werkzeug.middleware.dispatcher import DispatcherMiddleware
from honeypot import create_honeypot_app
# Create your main application
main_app = Flask(__name__)
@main_app.route('/')
def index():
return "My secure application"
# Create the honeypot application
honeypot_app = create_honeypot_app()
# Mount the honeypot at a specific URL prefix
application = DispatcherMiddleware(main_app, {
'/security': honeypot_app # Maps to /security/* URLs
})
# For direct Flask execution
if __name__ == "__main__":
# Create a WSGI app wrapper
from werkzeug.serving import run_simple
run_simple('localhost', 5000, application, use_reloader=True)
For more advanced integration options (such as selective blueprint registration or frontend integration), see the examples/
directory.
For production deployments, use the Docker configuration:
# Generate deployment files (if you haven't run setup_honeypot.sh)
python -m honeypot.cli init
# Start in production mode
docker-compose up --build -d
# For development mode with hot reloading
docker-compose -f docker-compose.dev.yml up --build -d
The Docker deployment includes:
- Nginx web server
- Flask backend
- MongoDB database
- Redis for session management
- Access Restriction: Limit admin dashboard access to trusted IPs
- Strong Authentication: Use complex passwords for the admin interface
- HTTPS: Always use SSL/TLS in production, refer to documentation for HTTPS
- Regular Rotation: Change admin credentials frequently
- VPN Access: Consider placing the admin interface behind a VPN
- Segregation: Run honeypots on separate infrastructure from production systems
- Firewall Rules: Implement strict firewall rules for honeypot traffic
- Resource Limits: Prevent honeypots from being used for further attacks
- Legal Compliance: Ensure your honeypot deployment complies with local laws
For additional security, consider using the enhanced security module (refer to examples documentation):
from honeypot import create_honeypot_app
from examples.enhanced_admin_security import setup_enhanced_security
app = create_honeypot_app()
app = setup_enhanced_security(app)
This provides:
- IP whitelisting
- Enhanced brute force protection
- Security headers
- Advanced session protection
This project is licensed under the MIT License - see the LICENSE file for details.
__ __ __
/ / / /___ ____ ___ __ ______ ____ ____/ /_
/ /_/ / __ \/ __ \/ _ \/ / / / __ \/ __ \/ __ __/
/ __ / /_/ / / / / __/ /_/ / /_/ / /_/ / /_/ /_
/_/ /_/\____/_/ /_/\___/\__, / .___/\____/\__/\__/
/____/_/
π― CATCH THE HACKERS π―
For questions, contributions, or support, please open an issue on GitHub.
βββββββββββββββββββββββββββββββββββββββββββββββ
β β
β [π΄] HONEYPOT v1.0.2 β
β βββββββββββββββββββββββββββββββββββββββββ β
β β β β βββ ββ β βββ βββ βββ βββ βββ β β
β β βββ β β β ββ βββ β βββ β β β β β
β β β β βββ β β βββ β β βββ β β β
β βββββββββββββββββββββββββββββββββββββββββ β
β β
β [*] SERVICE STARTED β
β [*] LISTENING FOR CONNECTIONS... β
β β
βββββββββββββββββββββββββββββββββββββββββββββββ
@CarterPerez-dev