Honeypot
A deliberately vulnerable or decoy system deployed on a network to attract attackers so their tools, techniques, and source IPs can be observed.
Last updated:
What is a honeypot?
A honeypot is a system deployed specifically to be attacked. It has no legitimate users, runs no production workloads, and exposes deliberately vulnerable services so that any interaction with it is — by definition — hostile. The operator watches what the attacker does, collects the tools they drop, and records their source IP for sharing with the defensive community.
Types of honeypots
- Low-interaction — scripts that emulate a service (fake SSH, fake Telnet, fake SMB) just well enough to capture the attacker's first few commands. Cowrie, Dionaea, and Kippo are long-running examples used to harvest SSH-scanning credentials and brute-force patterns.
- High-interaction — a real OS running real services, carefully contained. Captures more attacker behavior but needs much more care to run safely.
- Client honeypot — a browser-like agent that visits attacker-controlled sites to capture drive-by exploit kits.
- Canary tokens — credentials, documents, or API keys placed where only an intruder would find them; any use of the token fires an alert. Widely used inside enterprise networks today.
Honeypots in IP reputation
Large networks of honeypots — the Shadowserver sensors, GreyNoise, Team Cymru, SANS ISC dshield — form the backbone of modern IP-reputation feeds. When an IP connects to dozens of honeypots in a short window, it gets flagged as an active scanner and lands on public blocklists within hours. Almost every "seen scanning the internet" signal on IP reputation pages ultimately comes from honeypot telemetry. Botnet recruitment traffic is one of the largest sources of that noise.
Check whether an IP has been seen scanning or attacking honeypots with our IP abuse report checker.