The DShield Honeypot is a low interaction honeypot that allows us to collect data for research purposes. The honeypot by default runs the following clients:
- Collecting SSH and Telnet usernames and passwords via Cowrie
- An HTTP honeypot collecting full http requests
- We also collect firewall logs from the honeypot
The honeypot can be installed on a Raspberry Pi using Raspbian OS or a system running Ubuntu 20.04 LTS. For more details and up to date instructions, see our GitHub repository.
Complete Install Video via YouTube (long / thorough)
- Will running a honeypot increase my risk of an attack?
It should not. This is not an actual vulnerable system. But instead, we are using scripts like Cowrie to simulate a vulnerable system.
- Is it useful to DShield to have a honeypot on a residential DSL/Cable connection or do you need data from large networks?
Absolutely. We need a large number of diverse participants to make this project useful. Even a normal home connection will likely see several attacks a day.
- Can I run the honeypot on a free AWS instance (or other cloud service)?
Yes. The honeypot uses little resources. It should work well on a minimum cloud instanace. It needs only little disk storage. Logs are sent to DShield every 30 minutes and no longer term log storage is needed.
- Can the honeypot be hacked? Can it be used to attack others?
We hope not. The honeypot uses scripts to simulate vulnerable services. This is not a vulnerable machine or "full interaction" honeypot.
- How do I report a problem or ask for help?
Report any problems as an "issue" via GitHub. This is the best way for us to track any problems. Or use our Slack channel.