# Virtual Machine Honeypot

## Format

A script to install our honeypot onto your existing Virtual Machine, configured to appear as a valuable asset but designed to detect and log malicious activity. Issued as a Curl command, with configuration to select a personality from the following options:

**-       Windows server 2016** - ports 135, 139, 445, 3389

**-       Windows 10 workstation** - ports 80, 137, 138, 443, 445, 3389, 5353

**-       Microsoft Active Directory Domain Controller 2019** - ports 21, 53, 69, 88, 135, 139, 389, 445, 464, 636, 3268, 3269, 3389

**-       Linux 5.0** - ports 22, 80, 443

**-       Printer** - ports 80, 443, 515, 631, 9100

**-       FreeNAS storage device** - ports 139, 445

**-       Siemens Simatic S7-300 PLC** - port 102

**-       Cisco Catalyst 2950 Switch** - port 22

## Capabilities

1. **Activity Logging**: Continuous logging and monitoring of all interactions with the VM honeypot, the seedata.io platform raises an event each time the VM honeypot is accessed. Each event includes detailed threat analysis of the accessing entity and their activities.

## Usage

Deploy our VM honeypots within your network to attract and detect malicious actors, providing early warning and detailed insights into attack methods.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.seedata.io/features/seeds/virtual-machine-honeypot.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
