Skip to content

a fake SSH honeypot written in Python that simulates a Linux login shell over TCP/Telnet. This beginner tool is designed for analysts and researchers to simulate monitoring and logging unauthorized access attempts in a safe, controlled environment.

Notifications You must be signed in to change notification settings

aRageQueen/dionaea

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

dionaea

a fake SSH honeypot written in Python that simulates a Linux login shell over TCP/Telnet. This beginner tool is designed for analysts and researchers to simulate monitoring and logging unauthorized access attempts in a safe, controlled environment.

Features

  • Simulates a basic SSH login prompt (SSH-2.0-OpenSSH_7.6p1)
  • Accepts any username/password and logs them
  • Provides a fake Linux shell with basic commands:
    • ls, whoami, pwd, cat /etc/passwd, exit, netstat -tuln, top
  • Supports backspace during input (realistic interaction)
  • Logs:
    • IP address
    • Login credentials
    • Commands issued
  • Clean line formatting for smooth Telnet sessions

Technologies

  • Python
  • Socket API (raw TCP)
  • Telnet-compatible interface

Project Structure

dionaea/
├── dionaea.py # Main honeypot logic
├── logger.py # Centralized logging utility
├── responses/
│ └── commands.py # Fake commands
  └── __init__.py
├── logs/
│ └── activity.log # All connection activity
└── README.md

About

a fake SSH honeypot written in Python that simulates a Linux login shell over TCP/Telnet. This beginner tool is designed for analysts and researchers to simulate monitoring and logging unauthorized access attempts in a safe, controlled environment.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages