Honeypots require a Pro plan or higher. Community and Solo plans do not include Trap functionality.
Start honeypots
Deploy one or more decoy services with a single command:
Honeypots bind to non-standard ports by default to avoid conflicts with real services. Use
--port-map to customize: panguard trap start --services ssh --port-map ssh:22.Choose service types
Panguard supports 8 honeypot service types:
Deploy all 8 at once:
| Service | Default Port | Emulates |
|---|---|---|
ssh | 2222 | OpenSSH server with fake authentication |
http | 8080 | Apache/Nginx web server with decoy pages |
ftp | 2121 | FTP server with fake file listings |
smb | 4450 | Windows file share (SMB/CIFS) |
mysql | 3307 | MySQL database with fake credentials |
rdp | 3390 | Remote Desktop Protocol handshake |
telnet | 2323 | Telnet login prompt |
redis | 6380 | Redis in-memory store |
View attacker profiles
Panguard automatically builds profiles of attackers based on their interactions:
Access threat intelligence
Aggregate attacker data into actionable threat intelligence:Export IoCs for use in other security tools:
What to do next
Honeypot types reference
Detailed documentation for each of the 8 service emulators.
Attacker profiling
How Panguard builds behavioral profiles from honeypot interactions.
Deploy Threat Cloud
Share threat intelligence across your fleet with a centralized Threat Cloud server.
Configure notifications
Get alerted when attackers interact with your honeypots.