Need help with HoneyPi?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

155 Stars 46 Forks GNU General Public License v3.0 47 Commits 0 Opened issues

Services available


Need anything else?

Contributors list


It is astonishingly easy as an attacker to move around on most networks undetected. Let's face it, unless your organization is big enough to have full packet capture with some expensive IDS, you will likely have no idea if there is an attacker on your network. What are the options for home users and small businesses?

What if there were a cheap Raspberry Pi device you could plug into your network that masquerades as a juicy target to hackers?

HoneyPi attempts to offer a reliable indicator of compromise with little to no setup or maintenance costs. There are tons of honeypot options out there, but we leveraged our experience in penetration testing to answer the question What sorts of activities could be flagged that we generally do when attacking an internal network?

That is why HoneyPi tries to keep it simple compared to other honeypots. HoneyPi only flags a few surefire triggers that would catch most attackers snooping around on an internal network: 1. Port Scanning Activities 2. FTP Connection Attempts 3. Telnet Connection Attempts 4. VNC Connection Attempts

Wrap up this simplicity in a way that is designed to be deployed on a RaspberryPi and you've got a simple honeypot that you can add to your network to get insight when you are under attack.


You'll need a Raspberry Pi running Rasbian.

From the Pi, do this: 1. wget 2. unzip 3. cd HoneyPi-master 4. chmod +x *.sh 4. sudo ./ 5. Follow the prompts.

Please note: Installing this will do some things to your Raspberry Pi. Most notably, it will change your iptables. Please proceed with caution if you are using this Raspberry Pi for other purposes.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.