Skip to main content
Panguard Trap supports 8 honeypot service types, each emulating a common network service that attackers frequently target. You can deploy any combination of services simultaneously.

Service Reference

SSH Honeypot

FieldDetails
Default Port2222
EmulatesOpenSSH server
ProtocolSSH-2.0
CapturesUsernames, passwords, post-login commands, client version strings
Use caseDetects brute force attempts, credential stuffing, and post-exploitation commands

HTTP Honeypot

FieldDetails
Default Port8080
EmulatesWeb server (Apache/Nginx)
ProtocolHTTP/1.1
CapturesRequest paths, headers, payloads, exploit attempts, web shell uploads
Use caseDetects web application attacks, directory traversal, SQL injection probes

FTP Honeypot

FieldDetails
Default Port2121
EmulatesFTP server
ProtocolFTP
CapturesLogin credentials, file listing requests, upload/download attempts
Use caseDetects anonymous access attempts, credential brute force

SMB Honeypot

FieldDetails
Default Port4450
EmulatesWindows file sharing (SMB)
ProtocolSMB/CIFS
CapturesAuthentication attempts, share enumeration, file access patterns
Use caseDetects EternalBlue-style exploits, lateral movement, ransomware propagation

MySQL Honeypot

FieldDetails
Default Port3307
EmulatesMySQL database server
ProtocolMySQL wire protocol
CapturesLogin credentials, SQL queries, database enumeration attempts
Use caseDetects database credential attacks, SQL injection follow-through

RDP Honeypot

FieldDetails
Default Port3390
EmulatesWindows Remote Desktop
ProtocolRDP
CapturesLogin credentials, connection metadata, NLA authentication attempts
Use caseDetects RDP brute force, BlueKeep-style exploits

Telnet Honeypot

FieldDetails
Default Port2323
EmulatesTelnet server
ProtocolTelnet
CapturesLogin credentials, post-login commands, IoT botnet enrollment attempts
Use caseDetects Mirai-style IoT attacks, legacy system exploitation

Redis Honeypot

FieldDetails
Default Port6380
EmulatesRedis cache server
ProtocolRESP (Redis Serialization Protocol)
CapturesCommands executed, configuration queries, unauthorized data access
Use caseDetects unauthenticated Redis exploitation, cron-based persistence

Summary Table

ServiceDefault PortReal Service PortProtocol
SSH222222SSH-2.0
HTTP808080/443HTTP/1.1
FTP212121FTP
SMB4450445SMB/CIFS
MySQL33073306MySQL
RDP33903389RDP
Telnet232323Telnet
Redis63806379RESP

Deployment Examples

# Deploy SSH and HTTP (most common)
panguard trap start --services ssh,http

# Deploy all 8 services
panguard trap start --services ssh,http,ftp,smb,mysql,rdp,telnet,redis

# Custom port for SSH honeypot
panguard trap start --services ssh --port 22222
Always use non-standard ports for honeypots. If your real SSH runs on port 22, the SSH honeypot should run on a different port (default: 2222). Running a honeypot on the same port as a real service will conflict.