Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

No.

This is an adorable project that assumes people who are familiar with nmap regularly scan whatever they can.

It’s cute, but I’d expect it to be pretty dull to watch.



https://zmap.io/ https://github.com/robertdavidgraham/masscan

it will be attacked within minutes, you should start a honeypot and see for yourselves


Eh, it depends on how it's exposed.

I used to run a Kippo[1] honeypot on port 22. I'd regularly see automated intrusion attempts, often followed up by users manually interacting with the server (and slowly coming to realize that it was fake). Nowadays I expect the exploitation process is typically much more automatic, so it'd be less interesting to watch.

[1]: https://github.com/desaster/kippo


The only place that I've ever seen this kind of honeypot regularly pick anything up is on college campuses.


never heard of the mirai botnet i take it https://en.wikipedia.org/wiki/Mirai_(malware)


I understand your misconceptions about this working. It really just depends on if it appears to be vulnerable enough to scanners, and whether people actually bother to take interest. I guess you could say that my "project" is more of and experiment in how hackers go about finding vulnerable devices. Who knows, maybe hackers don't take interest in vulnerable telnet services anymore (they probably don't), but thats okay, this was fun while it lasted. I'll leave the memes on the readme.


Hey- if you are the author, I want to say I support what you are doing. We need more projects like this. But when I read the source, looks pretty lean to me in terms of follow on functionality. Would love to help you expand on this.


I was kind of surprised and a little disappointed when I got a router with IPS monitoring and 9 months on there hasn't been a blip in the logs.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: