# Honeypot

The moment a system is exposed to the internet, it begins attracting attention. Most of that attention isn’t targeted, rather it’s automated scanning, credential stuffing, and opportunistic probing performed at massive scale.

To observe this behavior firsthand, I deployed [T-Pot](https://github.com/telekom-security/tpotce), an open-source, multi-honeypot platform that simulates vulnerable services and aggregates attack data into a centralized dashboard. By intentionally exposing emulated services in AWS, I was able to capture and analyze real-world attack traffic, providing a clear view into the constant background noise of the internet.

#### Launch Instance

1. Log into AWS console and Launch an EC2 Instance

I chose a t3.xlarge to ensure sufficient CPU and memory for:

* Elastic Stack (ELK)
* Cowrie (SSH/Telnet honeypot)
* Dionaea (malware capture)
* Suricata (IDS)
* Other T-Pot integrated sensors

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FioWVnBcU3rDz26R0fCuF%2Fimage.png?alt=media&#x26;token=7c46e7bd-bfbb-43ae-950a-40d7b6ee26fa" alt=""><figcaption></figcaption></figure>

2. Select AMI (I selected Debian)

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fkm81EnXlLjHPsMWifv14%2Fimage.png?alt=media&#x26;token=cb4b2ef3-51c8-45bd-a30b-5de838e84a5a" alt=""><figcaption></figcaption></figure>

2. Configure storage

I only configured my storage for 40GB since I planned to only let it run for a short time. You can choose more if you want to keep it running for a longer duration. T-Pot recommends 128GB.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FN0AVmVZfFVEdfdb09PCW%2Fimage.png?alt=media&#x26;token=0d8e5f06-f18e-4911-b8c6-60d2883f9458" alt=""><figcaption></figcaption></figure>

3. Security Group Configuration

We will allow inbound connections for ports 64294, 64295, and 64297 only from our IP, these ports will later used as T-Pot management ports. For the ports between 1 to 64000, we will allow inbound access from anywhere for both IPV4 and IPV6, these will used to lure the attackers in.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FdETZF7mf2b3GsvduJwGl%2Fimage.png?alt=media&#x26;token=5aa440e6-06ee-4646-b750-6143adcc0458" alt=""><figcaption></figcaption></figure>

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FSaJpeeBgWkCT9IxKvZxz%2Fimage.png?alt=media&#x26;token=a4f91b15-58d0-4840-a014-8c70e35062a1" alt=""><figcaption></figcaption></figure>

4. Create a Key Pair

Generate an SSH key pair to connect to the EC2 instance.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fe04NkDoCSRazPhspwCUy%2Fimage.png?alt=media&#x26;token=4c0fb073-b247-4b0f-95c4-2f97055283e3" alt=""><figcaption></figcaption></figure>

5. Allocate Elastic IP Address

Create an elastic IP for the instance so that the IP remains the same even if the instance is restarted.

&#x20;![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FuTkyAMe3o56W3uDuYRCy%2Fimage.png?alt=media\&token=97f1aa29-cea0-48ba-ac8c-0227b2d81c26)

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FsuvuO6Q56dc2wSNbSeA3%2Fimage.png?alt=media&#x26;token=2d241c21-f8c4-4ebe-bbec-de303207293a" alt=""><figcaption></figcaption></figure>

6. Confirm that the EC2 instance is running

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FnrZI4I5MMo1L7jjTlMdR%2Fimage.png?alt=media&#x26;token=45811f9b-e297-456c-a436-ee90e19a2bf2" alt=""><figcaption></figcaption></figure>

Connect to Instance

1. Select your instance and naviage to the SSH Client tab. This tab will provide the Public DNS used to connect to the instance.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FK2PZGC2gOIXbxN6hbbTG%2Fimage.png?alt=media&#x26;token=f23409f5-2b53-43e1-8012-8fdb194ad682" alt=""><figcaption></figcaption></figure>

2. Go to your terminal and SSH into the instance

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FHXCcrHK4Otxca4zMaBjZ%2Fimage.png?alt=media&#x26;token=9e90f35f-9829-4de1-8f67-7a71bbd0145a" alt=""><figcaption></figcaption></figure>

3. Run the following commands to update the packages and install git.

```
sudo apt update -y 
sudo apt install git -yome code
```

4. Clone the T-Pot repo from Github

```
git clone https://github.com/telekom-security/tpotce
```

5. Navigate to the installer

```
cd tpotce/iso/installer/
```

6. Run the T-Pot installation script

```
sudo ./install.sh --type=user
```

![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FW2Aleo0vQRX0RFkkoYzq%2Funknown.png?alt=media\&token=7e4ba99e-2c1b-4d5c-a2aa-e43b8eebbadf)

![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FqSPTcdyHMqffIYlr9pFo%2Funknown.png?alt=media\&token=d4d1a021-b0bc-4b3a-bc2d-7f202dee0814)

7. Select STANDARD install

![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FETBXtjVlOVNEtO7FFKGX%2Funknown.png?alt=media\&token=b87fa78b-ab4f-426a-b806-146719f183c3)

8. Next, you will be prompted to create a username and password
9. The installation process will complete after a few minutes. You will notice that port 22 is not longer available. We will need to SSH from port 64295 (previously set up in the SG). Notice the note at the bottom says: "Please reboot and re-connect via SSH on tcp/64295.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F4HiVQb0x59LqYQQUSii2%2Fimage.png?alt=media&#x26;token=02294bba-e82c-4d26-b832-0c6fe5063093" alt=""><figcaption></figcaption></figure>

10. Reboot the instance

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FKPjT3LStpd3GySYNfV7n%2Fimage.png?alt=media&#x26;token=e77e3035-5dfa-4ddd-be9e-acfbf84a4415" alt=""><figcaption></figcaption></figure>

11. Log back into the instance

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FdjXySqaoARVUGwjDoDHC%2Fimage.png?alt=media&#x26;token=6eaf9adb-0d78-4f20-9d80-0efa143821c2" alt=""><figcaption></figcaption></figure>

12. You can check the status of the T-Pot service by using:

```
sudo systemctl status tpot
```

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fj5QNbkfaM790Opt4ieIR%2Fimage.png?alt=media&#x26;token=0690d3be-fd91-4e9e-ae2d-cfd22b589bbe" alt=""><figcaption></figcaption></figure>

13. Navigate to the UI

![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FZmHGAO1QHTj6oSEzteQ5%2Funknown.png?alt=media\&token=d761ffa1-600c-4711-8a7c-6e114b2e8476)

14. Login to the console using the username and password created earlier.

![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FQqBwpgwMnLm8mmiNllx5%2Funknown.png?alt=media\&token=8cf10e6e-55cd-4e69-8b35-412e477fcc70)

15. After successful login, you will be greeted by the T-Pot homepage

&#x20;![](https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FmQoZeN4uRhZqpEZLwM77%2Fimage.png?alt=media\&token=f226b67e-9411-41c5-a017-41c2b35b7e99)

#### Scanning T-Pot

1. Just for fun, let's scan our T-Pot instance and see what we find. We can see that there are numerous ports open.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FgPKMsqXCa7Z7CymAIhhC%2Fimage.png?alt=media&#x26;token=f0188dfc-fb32-4bef-bdba-667c5ef4db68" alt=""><figcaption></figcaption></figure>

2. Let's try and connect to the instance using telnet. We successfully connect and prompted for a username and password. In reality, it is presenting a fake login shell using Crowie and records the attempts.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F5TZIsz77SWulczemHpag%2Fimage.png?alt=media&#x26;token=f34a73d0-9dbe-458a-af34-3818a1e213b0" alt=""><figcaption></figcaption></figure>

#### T-Pot

Here's a screenshot of the Attack Map.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FiGz7YSnL4n8txG5XnXGJ%2Fimage.png?alt=media&#x26;token=dfaf8b7b-e59b-4997-a54f-4c3c2df49061" alt=""><figcaption></figcaption></figure>

I let T-Pot run for a 24 hours and here's what I saw:

Within a 24-hour period, the environment recorded over 13,500 attack interactions across multiple services and protocols.&#x20;

| Sensor         | Attack Count | What It Monitors           |
| -------------- | ------------ | -------------------------- |
| Honeyptrap     | 6,025        | Generic port/service traps |
| Dionaea        | 5,402        | Malware & exploit attempts |
| Cowrie         | 1,067        | SSH/Telnet brute force     |
| SentryPeer     | 313          | SIP/VoIP attacks           |
| Tanner         | 277          | HTTP interaction logging   |
| ConPot         | 128          | ICS/SCADA emulation        |
| Redishoneypot  | 86           | Redis attacks              |
| Mailoney       | 69           | SMTP traps                 |
| Adbhoney       | 47           | Android Debug Bridge       |
| CitrixHoneypot | 43           | Citrix exploit emulation   |

The dashboard revealed:

* Continuous automated scanning activity
* Thousands of credential brute-force attempts
* High targeting of ports
  * 445 (SMB)
  * 23 (Telnet)
  * 22 (SSH)
  * 80 (HTTP)
  * 5060 (SIP)
* Globally distributed source IPs
  * Highest concentration
    * United States
    * Philippines
    * China
    * France
    * Egypt

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fr1WmB3Ngkbp5HTbTyNto%2Fimage.png?alt=media&#x26;token=d27f847f-83fa-4680-9d1f-ef31abb916a1" alt=""><figcaption></figcaption></figure>

Attempted usernames and passwords that were captures

* The most commonly attempted usernames were admin and root, indicating automated brute-force activity targeting default administrative accounts.
* Other usernames such as guest, pi, sa, and anonymous suggest attacks against common IoT, database, and Linux device defaults.
* Password attempts were dominated by weak credentials like admin, 1234, 123456, and 12345678, reflecting credential stuffing and dictionary attacks.
* Variations such as Admin123, password, qwerty, and numeric-only passwords confirm use of standard brute-force wordlists. Picture 2 contains some NSFW passwords.
* Some attempts included device-specific credentials like raspberry, pointing to scanning for exposed Raspberry Pi systems.
* The repetition and clustering of common credentials strongly suggest automated botnet-driven attacks rather than manual intrusion attempts.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FBhaoBjQ7P0q0gpaMmAEC%2Fimage.png?alt=media&#x26;token=4083cb6f-e9ee-41e3-abc8-2a643200a823" alt=""><figcaption></figcaption></figure>

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F0NcHO6qOjKfkrZnsp87b%2Fimage.png?alt=media&#x26;token=91e79d86-c550-49a4-9dd1-487f465f0f02" alt=""><figcaption></figcaption></figure>

**Cowrie (SSH and Telnet honeypot)**

* 1,069 total SSH/Telnet authentication attempts were recorded within the selected time window.
* 303 unique source IPs attempted to authenticate, indicating broad distributed scanning activity.
* Only 4 unique password hashes were observed, reinforcing repetitive use of common credential lists.
* Geographic distribution of source IPs was global, with concentration across North America, Europe, and Asia.
* The ratio of attempts to unique IPs suggests coordinated bot-driven credential stuffing rather than manual intrusion attempts.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FjPKAQXmmLmZZsby6zHiR%2Fimage.png?alt=media&#x26;token=5b6f4078-fcd0-4e2b-9295-8f67fab3d5f0" alt=""><figcaption></figcaption></figure>

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FlRUa8yLQr6Koh1M3a2Cz%2Fimage.png?alt=media&#x26;token=fe14c2f5-ebda-4039-904b-97edd2bec8d7" alt=""><figcaption></figcaption></figure>

**Redis Honeypot (Redis database server)**

* 86 total Redis interaction attempts were recorded from 27 unique source IPs.
* All source IPs were classified as known attackers or mass scanners.
* Top attacking ASNs included Alibaba Cloud, Tencent, Amazon, Microsoft, and other major hosting providers.
* Geographic distribution was concentrated in China and the United States, with smaller volumes from South Korea and Belize.
* Most observed actions were connection attempts (NewConnect) followed by immediate closure, suggesting reconnaissance rather than successful exploitation.
* A small number of commands such as PING and INFO were issued, consistent with automated Redis probing scripts.
* The traffic pattern reflects opportunistic scanning for exposed or misconfigured Redis instances.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FftL4TOETqDW5Ng6AgTXb%2Fimage.png?alt=media&#x26;token=0072e6b3-2c90-4333-b2f4-54f945af470f" alt=""><figcaption></figcaption></figure>

**Ciscoasa (emulates Cisco Adaptive Security Appliance (ASA) firewall)**

* Cisco ASA honeypot recorded 19 total attack attempts from 8 unique source IP addresses.
* Activity levels were relatively low compared to other honeypots, suggesting targeted probing rather than mass scanning.
* Geolocation data indicates traffic originating from multiple international regions, including Europe and North America.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F1Yvkl2yq3wJLILd7Tliu%2Fimage.png?alt=media&#x26;token=4f8e1507-3f1e-45ce-904d-57ff0848994e" alt=""><figcaption></figcaption></figure>

**Adbhoney (Android Debug Bridge honeypot)**

* 47 total Android Debug Bridge (ADB) interaction attempts were recorded from 7 unique source IPs.
* The majority of activity originated from infrastructure associated with China Telecom and other large hosting providers.
* All source IPs were classified as known attackers, indicating scanning infrastructure rather than random traffic.
* Observed command inputs included attempts to download and execute files from `/data/local/tmp/`, consistent with automated Android malware deployment scripts.
* Commands such as `chmod 0755`, `nohup`, and references to `trinity` suggest attempts to install or run crypto mining malware.
* Sample artifacts were captured, demonstrating successful emulation of file transfer attempts within the honeypot environment.
* The traffic pattern reflects opportunistic scanning for exposed ADB services, commonly targeted in IoT and misconfigured Android-based devices.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fj6DRhbh8I2QQoMzZQrtH%2Fimage.png?alt=media&#x26;token=51081cb2-538c-4eb0-8db9-7a632a552f88" alt=""><figcaption></figcaption></figure>

**ConPot (ICS/SCADA honeypot)**

* 128 total industrial protocol interaction attempts were recorded from 15 unique source IPs.
* All source IPs were classified as known attackers or automated scanners.
* Attack activity showed brief spikes rather than sustained interaction, consistent with reconnaissance scanning.
* Most traffic originated from the United States, with smaller volumes from Vietnam, China, Australia, and the United Kingdom.
* Observed protocols included ICS-related services such as IEC104 and other simulated industrial control interfaces.
* Event types were primarily new connection attempts followed by connection loss, suggesting probing rather than full exploitation.
* The activity reflects opportunistic scanning for exposed ICS/SCADA systems rather than targeted operational technology attacks.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F2BicYoHXlqxfXZH2tALg%2Fimage.png?alt=media&#x26;token=7e2c7986-debd-48dc-8f47-4b02bcc32521" alt=""><figcaption></figcaption></figure>

**HoneyTrap (low-interaction network honeypot)**

* Honeytrap recorded 5,812 total connection attempts from 1,467 unique source IPs, indicating continuous internet-wide scanning activity.
* The majority of source IP reputation classifications were identified as known attackers or mass scanners, reinforcing the automated nature of the traffic.
* Most activity originated from large cloud and hosting providers including Google Cloud Platform, Akamai, DigitalOcean, Alibaba, Microsoft, and Amazon, which are commonly abused for large-scale scanning operations.
* Destination port analysis shows concentration on common service ports such as SSH (22), HTTP/HTTPS (80/443), and other high-value exposed services, indicating reconnaissance behavior.
* Geographic distribution highlights activity primarily from the United States, France, United Kingdom, Netherlands, India, and China, reflecting globally distributed scanning infrastructure.
* The heatmap visualization demonstrates persistent probing across time intervals, with no prolonged quiet periods.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F7cSARY02vKRsjuvaFQgQ%2Fimage.png?alt=media&#x26;token=d4b5d3b6-64eb-461b-a4d2-5aab809a677f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FV2SmOnP6ZgmgW6ZeHrAN%2Fimage.png?alt=media&#x26;token=60a1e263-e80d-4e09-8cc6-4fbab7eef782" alt=""><figcaption></figcaption></figure>

**Tanner (HTTP interaction honeypot)**

* 275 total HTTP interaction attempts were recorded from 41 unique source IPs.
* The majority of source IPs were classified as known attackers or mass scanners.
* Traffic originated globally, with notable activity from Indonesia, China, and parts of Europe.
* Most HTTP requests targeted generic paths such as `/` or `/index`, with some references to `wp-content`, suggesting WordPress-focused scanning.
* Attack patterns showed brief spikes followed by low sustained activity, typical of automated web crawler behavior.
* The majority of HTTP requests used the GET method, consistent with automated reconnaissance and directory enumeration.
* User-Agent strings were largely generic browser identifiers, indicating simple scripted scanning rather than specialized tooling.
* Top requested URIs included `/`, `/env`, `/favicon.ico`, and `/.git/HEAD`, suggesting probing for exposed configuration files and source repositories.
* Requests for `.env` and `.git` paths indicate attempts to locate sensitive application configuration data or version control artifacts.
* Additional probes targeted common administrative paths such as `phpmyadmin` and `MyAdmin`, reflecting automated database management interface scanning.
* Top attacking ASNs were primarily large telecom and hosting providers, reinforcing use of VPS/cloud infrastructure for scanning.
* A small number of high-volume source IPs accounted for a disproportionate share of traffic, consistent with automated scanning nodes.
* The overall pattern reflects broad web enumeration rather than application-specific exploitation.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F2LnpBKDI6rhfGo7ycmQj%2Fimage.png?alt=media&#x26;token=6a7036c3-1de1-41a4-bbcf-caecc71a0d90" alt=""><figcaption></figcaption></figure>

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2F6BJwgwMerNWL5LxQ2vW9%2Fimage.png?alt=media&#x26;token=953e3496-21c2-4253-9d62-9c2330c644e3" alt=""><figcaption></figcaption></figure>

<mark style="color:$primary;">**\*\*\*NOTE: I left the instance on longer than 24 hours for the data below here\*\*\***</mark>

**Suricata IDS**&#x20;

* 106,272 Suricata events were recorded within the selected time window.
* Activity originated from 5,298 unique source IPs and 712 unique JA3 TLS fingerprints.
* Event volume significantly exceeded individual honeypot interaction counts, reflecting broader network-layer visibility.
* Traffic patterns showed sustained background scanning with periodic spikes consistent with automated campaigns.
* Geographic distribution of source IPs was global, with concentrated activity across North America, Europe, and Asia.
* The diversity of JA3 fingerprints indicates multiple scanning toolsets rather than a single coordinated actor.
* Suricata detections captured malformed packets, protocol anomalies, and exploit signature matches beyond direct honeypot interactions.
* The data demonstrates the value of combining deception telemetry with network intrusion detection for layered visibility.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FOzITZEFC7ZqEFoZEwVFm%2Fimage.png?alt=media&#x26;token=56a864b3-8a02-4336-ba7c-2274b8e8afb9" alt=""><figcaption></figcaption></figure>

* The majority of alerts were categorized as generic protocol communication, miscellaneous attacks, and attempted administrative access.
* High-volume destination ports included 445 (SMB), 21 (FTP), 23 (Telnet), and several high-numbered ephemeral ports.
* Most source IPs were classified as mass scanners or known attacker infrastructure.
* HTTP analysis showed heavy use of GET requests with common browser-style User-Agent strings, indicating automated enumeration.
* Probing activity targeted common web paths and administrative endpoints.
* SSH client fingerprinting revealed scanning tools such as ZGrab and other automated reconnaissance utilities.
* File type and content analysis reflected simple probing rather than complex payload delivery.
* Top alert signatures included malformed TCP stream behavior, Nmap scanning detection, and exploit framework indicators such as DoublePulsar.
* Geographic distribution remained globally dispersed, with concentrated activity from major internet infrastructure regions.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2Fp6uW32XmLPQhWgta1sPR%2Fimage.png?alt=media&#x26;token=391a6f8f-5fbd-40f2-a83b-4748a020584c" alt=""><figcaption></figcaption></figure>

* The highest volume of traffic originated from major cloud providers, including Google Cloud, Amazon, Alibaba Cloud, and Akamai.
* Several individual source IPs generated thousands of events, indicating high-frequency automated scanning.
* Activity clustered around hosting and telecom infrastructure rather than residential networks.
* Suricata mapped traffic to multiple known CVEs, including recent and legacy vulnerabilities.
* CVE references spanned web application, protocol, and service-level weaknesses, suggesting broad exploit probing.
* The mix of older and newer CVEs possibly indicates automated exploit kits scanning indiscriminately rather than targeted vulnerability exploitation.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FXtv29pwGhDckgiSiseDy%2Fimage.png?alt=media&#x26;token=2bfb2eee-e42c-4267-94ac-4852fdc10b05" alt=""><figcaption></figcaption></figure>

**Fatt (fingerprinting/HTTP enumeration)**

* 8,683 total interactions were recorded from 184 unique source IPs.
* Activity included 30 unique HTTP client fingerprints and 12 unique JA3 TLS fingerprints.
* No RDP fingerprinting activity was observed during the selected time window.
* The majority of source IPs were classified as mass scanners.
* Traffic originated primarily from hosting providers such as OVH, DigitalOcean, Microsoft, and Google Cloud.
* Requested paths included `/`, `/.env`, `/.git/config`, and `/favicon.ico`, indicating attempts to locate exposed configuration and repository files.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FyM3Ukr94zHy48GxhAQaf%2Fimage.png?alt=media&#x26;token=6a5d022f-1c9d-4a38-a642-aefacb8ff359" alt=""><figcaption></figcaption></figure>

* Destination port activity was dominated by HTTPS (443), with additional probing on HTTP (80) and other service ports.
* Traffic volume remained steady throughout the observation period, consistent with automated scanning behavior.
* The majority of source IPs were classified as mass scanners, with a smaller portion identified as known attacker infrastructure.
* Geographic distribution showed concentrated activity from Germany and the United States, with smaller volumes from Indonesia, China, and Portugal.
* Protocol distribution was heavily weighted toward TLS, indicating encrypted service probing and fingerprinting.
* SSH client fingerprinting identified common automated tools such as ZGrab and generic SSH libraries.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FXzQVBolCNWdi5R6zH2zk%2Fimage.png?alt=media&#x26;token=5874d07d-5f59-4f14-828f-2f4fc77856a2" alt=""><figcaption></figcaption></figure>

* HTTP request methods were overwhelmingly GET, consistent with automated enumeration and content discovery.
* User-Agent strings were largely generic browser identifiers and common scanning libraries, indicating scripted reconnaissance.
* HTTP client header hashes show repeated patterns, suggesting reuse of automated scanning toolsets.
* Port distribution remained heavily concentrated on HTTPS (443), with minimal interaction on alternate service ports.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FXRbE1BKs1ysd5UUTzive%2Fimage.png?alt=media&#x26;token=8291d7de-17eb-4bad-9201-17a33f1ab4e1" alt=""><figcaption></figcaption></figure>

* The highest-volume traffic originated from large cloud and hosting providers, including Google Cloud, Amazon, DigitalOcean, Akamai, and Cloudflare.
* T-Systems International GmbH generated the largest single ASN count in this view, indicating concentrated scanning from specific infrastructure.
* A small number of source IPs accounted for a disproportionate share of total events, consistent with automated scanning nodes.
* One internal IP (172.31.0.40) appears in the top list, reflecting local or internal system activity rather than external threat traffic.
* Most activity originated from data center or telecom networks rather than residential IP space.
* The concentration of traffic within major cloud ASNs reinforces the use of VPS and hosted infrastructure for large-scale reconnaissance.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FfAPecqrGxtycDnz8CymA%2Fimage.png?alt=media&#x26;token=cb22ba62-32e1-4cf0-9321-ac764bf95c9d" alt=""><figcaption></figcaption></figure>

**Mailoney (SMTP honeypot)**

* 69 total SMTP interactions observed from 26 unique source IPs.
* Activity shows steady low-volume probing with occasional small spikes.
* Majority of source IPs classified as known attackers or mass scanners.
* Traffic primarily originated from the United States, with additional activity from France, Hong Kong, and Japan.
* Top autonomous systems included Akamai Connected Cloud and Google Cloud Platform, indicating cloud-hosted scanning infrastructure.
* Most active individual source IPs generated 5–6 connection attempts each.
* Captured email activity included common spam-related sender and receiver addresses (e.g., scanner and spam accounts).
* Geographic visualization highlights concentrated activity from cloud-hosted infrastructure rather than residential networks.

<figure><img src="https://450836410-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fgns9cN7UvH1POIBCfrRn%2Fuploads%2FqfDalLZyWRuG77s93ip9%2Fimage.png?alt=media&#x26;token=6813d4cf-c09f-47a5-ba37-2b95b73430f9" alt=""><figcaption></figcaption></figure>

#### Reflecting on T-Pot

Deploying T-Pot in AWS quickly demonstrated a fundamental reality of the modern internet: the moment a system becomes publicly accessible, it is discovered and probed. Within hours, the honeypot began receiving automated scans, credential stuffing attempts, protocol probing, and exploit traffic originating from cloud providers and globally distributed infrastructure.

What stood out most was not sophistication, but persistence and scale. The overwhelming majority of activity was automated. Services like SSH, Redis, HTTP, and industrial protocols were continuously targeted. Weak usernames and passwords dominated attempts, reinforcing how much of today’s internet-wide activity is driven by botnets cycling through known credential lists and exposed services.

Each honeypot component provided a different lens into attacker behavior. Cowrie showed brute-force login attempts and post-authentication command execution. Honeytrap revealed broad network reconnaissance. Suricata surfaced exploit signatures and protocol anomalies. Redis, ADB, Mail, and other service emulations highlighted how attackers hunt for misconfigurations at scale. Together, the data paints a picture that most attacks are opportunistic, automated, and indiscriminate.

This experiment reinforces a critical security principle where exposure equals attention. Any publicly reachable service will be scanned, any weak credential will eventually be tested, and any misconfiguration will likely be discovered.

Honeypots like T-Pot do more than collect logs, they provide visibility into the constant background noise of the internet. This information provides shows how security risks can turn into into measurable, observable behavior.
