🔍 Overview
This project simulates a decoy login interface to attract and track malicious visitors. It logs detailed information about access attempts and login behaviors, helping analyze potential threats.
🧰 Technologies Used
- Languages: Python 3, HTML, CSS
- Framework: Flask
- Concepts: Honeypot, Logging, Regex, JSONL
- Platforms: Kali Linux, WSL2
✨ Features
- Interactive fake admin login page
- Logs all access and form submissions
- Captures IP, user-agent, path, and credentials
- Separate JSONL logs for access and login attempts
- Modular and easy to extend with alerts or dashboards
📁 Project Structure
honeypot/
├── honeypot.py
├── requirements.txt
├── templates/
│ ├── admin_login.html
│ └── access_denied.html
├── static/
│ └── style.css
├── logs/
│ ├── access_logs.jsonl
│ └── login_attempts.jsonl
└── README.md
🚀 Getting Started
1. Clone the Repository
$ git clone https://github.com/chandruthehacker/honeypot.git
2. Set Up a Virtual Environment
$ python -m venv venv
On Windows
$ venv\Scripts\activate
On Linux / Mac OS
$ source venv/bin/activate
Intall Requirements
$ pip install -r requirements.txt
3. Run the Honeypot
$ python honeypot.py
📊 Example Log Entry
{
"timestamp": "2025-06-10T10:33:00.458694",
"ip": "172.23.192.1",
"user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)...",
"method": "POST",
"path": "/admin",
"username": "admin",
"password": "123456"
}
💻 Source Code
👨💻 Author Info
Created by Chandraprakash C – BSc Computer Science |
Cybersecurity Enthusiast
cyberchandru87@gmail.com |
GitHub
|
LinkedIn