EC2 Honeypot

Format

Amazon EC2 instance configured as a honeypot, designed to detect and log malicious activity. Issued as a CloudFormation script to install our image within your tenant, with configuration to select a personality from the following options:

- Windows server 2016 - ports 135, 139, 445, 3389

- Windows 10 workstation - ports 80, 137, 138, 443, 445, 3389, 5353

- Microsoft Active Directory Domain Controller 2019 - ports 21, 53, 69, 88, 135, 139, 389, 445, 464, 636, 3268, 3269, 3389

- Linux 5.0 - ports 22, 80, 443

- Printer - ports 80, 443, 515, 631, 9100

- FreeNAS storage device - ports 139, 445

- Siemens Simatic S7-300 PLC - port 102

- Cisco Catalyst 2950 Switch - port 22

Capabilities

  1. Activity Logging: Continuous logging and monitoring of all interactions with the EC2 honeypot, the seedata.io platform raises an event each time the EC2 honeypot is accessed. Each event includes detailed threat analysis of the accessing entity and their activities.

Usage

Deploy our EC2 honeypots within your AWS environment to attract and detect malicious actors, providing early warning and detailed insights into attack methods.

Last updated