Honeypot Decoys and Protocol Coverage

30 protocol surfaces with high-interaction deception coverage.

Deploy believable service-level decoys across exposed attack surfaces. With 30 protocol profiles, teams can detect reconnaissance, credential abuse, and lateral movement attempts earlier with interaction-rich telemetry.

30
Protocol Types
21
High Interaction
23
Adaptive Profiles

Honeypot Protocol Coverage

Comprehensive honeypot protocols organized by interaction level

High Interaction Protocols

21 protocols
CWMP honeypot protocol icon

CWMP

7547/TCP

AI

Detect unauthorized CWMP/TR-069 requests, authentication attempts, and suspicious CPE management actions

Captures
Device infoConfiguration attemptsFirmware requestsSession data
Docker API honeypot protocol icon

Docker API

2375-2376/TCP

AI

Detect unauthorized Docker daemon API access and suspicious container/image operation requests

Captures
API requestsContainer operationsImage pullsCredentials
Elasticsearch honeypot protocol icon

Elasticsearch

9200/TCP

AI

Detect unauthorized API queries, index enumeration, and exposed search-cluster access attempts

Captures
Query attemptsIndex enumerationAPI callsSearch queries
FTP honeypot protocol icon

FTP

21/TCP

AI

Detect FTP credential attacks and suspicious upload/download activity on decoy file services

Captures
CredentialsSession transcriptFile Capture
Git honeypot protocol icon

Git

9418/TCP

AI

Detect repository enumeration and unauthorized clone/fetch activity against decoy Git services

Captures
Repo pathHostVersionCommand typeRepository files
IMAP honeypot protocol icon

IMAP

143/TCP

AI

Detect IMAP authentication attempts and suspicious mailbox-command activity

Captures
CredentialsSession transcriptEmail commands
Kubernetes API honeypot protocol icon

Kubernetes API

6443/TCP

AI

Detect unauthorized token use, API discovery, and suspicious Kubernetes resource operations

Captures
API callsAuthentication attemptsResource queriesK8s operations
LDAP honeypot protocol icon

LDAP

389/TCP

AI

Detect LDAP bind attempts, directory enumeration, and suspicious search activity

Captures
CredentialsDirectory queriesLDAP entries
Memcached honeypot protocol icon

Memcached

11211/TCP

AI

Detect unauthorized cache commands, key enumeration, and amplification-abuse probing

Captures
Cache operationsKey/value pairsCommands
MongoDB honeypot protocol icon

MongoDB

27017/TCP

AI

Detect MongoDB authentication attempts, command/query activity, and unauthorized access behavior

Captures
CredentialsQuery/session transcriptDatabase operations
MQTT honeypot protocol icon

MQTT

1883/TCP

AI

Detect MQTT broker authentication attempts, topic abuse, and suspicious publish/subscribe activity

Captures
Topic subscriptionsMessagesClient IDsPub/Sub operations
POP3 honeypot protocol icon

POP3

110/TCP

AI

Detect POP3 authentication attempts and suspicious message-retrieval commands

Captures
CredentialsSession transcriptEmail retrieval commands
PostgreSQL honeypot protocol icon

PostgreSQL

5432/TCP

AI

Detect PostgreSQL authentication attempts, SQL execution, and suspicious database operations

Captures
CredentialsQuery/session transcriptSQL commands
Redis honeypot protocol icon

Redis

6379/TCP

AI

Detect Redis authentication attempts and suspicious command execution on decoy instances

Captures
CredentialsSession transcriptRedis commands
S3 Bucket honeypot protocol icon

S3 Bucket

443/TCP

AI

Detect unauthorized S3 bucket/object enumeration and access attempts with credential artifacts

Captures
Access attemptsObject enumerationCredentialsS3 operations
SMB honeypot protocol icon

SMB

445/TCP

AI

Detect SMB authentication attempts, share enumeration, and suspicious file operation behavior

Captures
CredentialsFile access attemptsShare enumerationFile operations
SMPP honeypot protocol icon

SMPP

2775/TCP

AI

Detect SMPP bind/login attempts and suspicious message-gateway command traffic

Captures
CredentialsSMS messagesSession commandsSystem ID
SNMP honeypot protocol icon

SNMP

161/UDP

AI

Detect SNMP community-string probing, OID enumeration, and network device reconnaissance

Captures
Community stringOIDs/valuesDevice information
SSH honeypot protocol icon

SSH

22/TCP

AI

Detect SSH brute-force/login attempts and interactive command activity on decoy hosts

Captures
CredentialsSession transcriptFile CaptureCommands
Telnet honeypot protocol icon

Telnet

23/TCP

AI

Detect Telnet weak-credential attacks and interactive command activity common in IoT scanning

Captures
CredentialsSession transcriptFile CaptureCommands
VNC honeypot protocol icon

VNC

5900/TCP

AI

Detect VNC authentication attempts and capture interactive session behavior on decoy desktops

Captures
CredentialsSession transcriptKeyboard/mouse eventsCommands

Medium Interaction Protocols

2 protocols
HTTP honeypot protocol icon

HTTP

80/TCP

AI

Detect web scanning, credential submission, and suspicious file-access behavior on decoy web endpoints

Captures
CredentialsFile CaptureUser AgentHeaders
HTTPS honeypot protocol icon

HTTPS

443/TCP

AI

Detect suspicious HTTPS requests, credential attempts, and probing against encrypted decoy web services

Captures
CredentialsFile CaptureUser AgentHeaders

Low Interaction Protocols

7 protocols
DNS honeypot protocol icon

DNS

53/TCP+UDP

Detect suspicious DNS queries, tunneling patterns, and resolver reconnaissance activity

Captures
Query/answer metadata
MSSQL honeypot protocol icon

MSSQL

1433/TCP

Detect MSSQL login attempts and suspicious TDS client interactions

Captures
CredentialsClient info
MySQL honeypot protocol icon

MySQL

3306/TCP

Detect MySQL login attempts and unauthorized client session activity

Captures
Credentials
NTP honeypot protocol icon

NTP

123/UDP

Detect NTP query abuse, amplification patterns, and time-service reconnaissance

Captures
Request metadata
RDP honeypot protocol icon

RDP

3389/TCP

Detect RDP credential attacks and remote-desktop reconnaissance activity

Captures
CredentialsMSTSHASH cookie
SIP honeypot protocol icon

SIP

5060/UDP

Detect SIP registration/invite probing, authentication attempts, and VoIP service reconnaissance

Captures
Request headers/metadata
TFTP honeypot protocol icon

TFTP

69/UDP

Detect TFTP read/write attempts for firmware and configuration files

Captures
FilenameModeRead/write attempts

Who Uses Honeypot Decoys Most

SOC analysts triaging suspicious access paths

Threat hunters mapping adversary behavior

Blue teams validating exposed protocol risk

Security engineering teams improving detection quality

What This Solves

Reconnaissance goes unnoticed

Service-level decoys expose probing behavior before attackers reach high-value production systems.

Credential and protocol abuse detection lags

Interactive decoy sessions provide stronger indicators when adversaries attempt authentication, enumeration, or command execution.

Limited visibility into attacker tradecraft

Session-level interactions reveal behavior patterns that improve detection tuning and response readiness.

What You Gain

Earlier warning on active adversaries

Detect adversary activity at the deception layer before compromise paths expand.

Higher confidence investigation inputs

Use captured interaction context to prioritize incidents and guide containment.

Actionable protocol exposure insights

Identify where adversaries are testing, probing, and attempting access in your environment.

Honeypot Capabilities

30 supported protocol profiles

Cover common enterprise service surfaces across network, web, data, and infrastructure pathways.

High-interaction service decoys

Present believable interactions that capture adversary behavior, not only connection metadata.

Protocol-aware telemetry capture

Collect session and interaction context useful for triage, detection engineering, and response.

Adaptive controls per honeypot and service

Tune behavior at the service level to match your policy and operational goals for each deployed decoy.

Campaign clusters from honeypot telemetry

Correlate recurring attacker behavior across events to reveal coordinated activity over time.

Stage-aware interaction intelligence

Understand how adversaries progress from probing to deeper interaction so teams can prioritize response.

How It Works (High-Level)

1. Choose protocol surfaces to emulate

Select service areas where attacker interest is most likely or most damaging.

2. Deploy believable decoys

Position decoys where probing and unauthorized access attempts are likely to occur.

3. Observe interaction behavior

Capture telemetry from sessions, commands, and protocol-specific actions in real time.

4. Route, triage, and iterate

Use high-signal events to investigate quickly and refine deception placement over time.

Deployment Options (High-Level)

Edge-facing exposure points

Place decoys where external reconnaissance and opportunistic scanning typically begin.

Internal segmentation boundaries

Detect lateral movement and credential misuse inside trusted zones.

Hybrid enterprise estates

Coordinate coverage across mixed infrastructure while keeping one operational view.

How Teams Use This

Edge reconnaissance trap

Place decoys on exposed protocol surfaces and route first-touch events into SOC triage to accelerate investigation start time.

Lateral movement watch

Deploy internal decoys at segmentation boundaries to reveal credential misuse and east-west probing before production impact.

Detection engineering feedback loop

Use stage-aware interaction intelligence from decoys to tune detections, then validate improvements with new attacker interactions.

Campaign-level visibility

Group repeated honeypot behavior into campaign clusters to prioritize recurring activity and reduce analyst noise.

  • Decoy placement should be aligned to your approved security architecture and monitoring policy.
  • Telemetry should be interpreted alongside broader security context for complete incident understanding.
  • High-interaction deception improves detection confidence but does not replace foundational controls.

Plan Protocol-Focused Deception Coverage

Map your highest-risk protocol surfaces, deploy decoys strategically, and convert attacker activity into high-confidence SOC signal.