We Tracking Real Hackers
With HoneyPot, we track malicious attackers, and bots they create. With this service, we reveal dangerous agents. Use of HoneyPots can clarify the following questions;
- Who is Attacking?
- Why are they doing this?
- What is their goal?
- What are they doing?
- Where do they come from?
- How can we defend ourselves?
All honeypots can be customized to mimic the real-life system as close as possible. For example:
We can design a special interface prepared by Javascript and HTML5 for a Scada Honeypot and can put images based on the working method of a similar system (pressure gauge, heat meter, etc.). All Honeypots to be created can use dedicated IP addresses for each service or every service might work on different IP SubNets. Again, we can set these honeypots under a certain domain or subdomain on-demand. For instance, it might be set up to sub-domain like (https://ipv2-test.companyname.com) and can be presented as a working system. These honeypots can be customized further with different scenarios upon your request.
We will use methods to make our honeypots hard to detect by tools that can differentiate honeypots and simulate a working system.
We can establish honeypots anywhere in the world.
- United States
- United Kingdom
- Italy
- Germany
- France
- Japan
- Turkey
- Canada
- Other (Contact Us)
- Elasticsearch
- MySQL
- MongoDB
- Postgres
- Symfony2
- Laravel
- NodeJS
- PHP
- Perl
- Python(no Framework)
- Django
- Drupal
- WordPress
- phpMyAdmin
- Web App(Shell Shock)
- Tomcat
- Ruby
- Printer
- RDP(Python based)
- SMB
- Oracle Web Logic Server
- WhiteFace
- NTP
- Camera
- FTP
- Scada(ICS, PLC)
- UDP/DNS
- SSH
- VNC
- Telnet
- SMTP
- IMAP
- ICS
- IDS(Windows Based)
- GoLang