Why TPot?
Why Vultr?
TPot Deployment
After creating and configuring our Firewall group, we'll then apply it to the VM by selecting Update Firewall Group
Next we'll access our VM from the virtual console and begin the process of installing TPot by cloning the GitHub repository
We can then take our VM's public IP address and access TPot's web interface from our browser over port 64297
And success! We can access the front page for the TPot web interface. We'll allow our deployment to stay active and online for 30 days and return to analyze the threat data collected
After thirty days, we'll return to our TPot deployment and access the Kibana dashboard to find the consolidated threat data from the 10 deployed honeypots on our system
DATA REPORT
Top 10 Attacker Locations
The geographic breakdown of attacks collected by the honeypot highlights the global scale and distribution of malicious activity, with notable concentrations in Europe, North America, and Asia.
Countries
Cities
Highest Volume of Attacks by IP Address
189.28.184.88
Country: Brazil
Number of Attacks: 323,902
Type & Port: TCP/22 SSH Bruteforce Attack
ISP: ENGEPLUS INFO
Honeypot:
148.113.207.170
Country: Canada
Number of Attacks: 313,147
Type & Port: TCP/22 SSH Bruteforce Attack
ISP: OVH SAS
Honeypot:
133.242.149.220
Country: Japan
Number of Attacks: 125,740
Type & Port: TCP/22 SSH Bruteforce Attack
ISP: SAKURA Internet
Honeypot:
62.149.25.72
Country: Ukraine
Number of Attacks: 87138
Type & Port: TCP/22 SSH Brutefroce Attack
ISP:1 Cloud Lab (75,228 attacks)
7heaven LLC (11,910 attacks)
61.16.120.186
Country: Singapore
Number of Attacks: 86,727
Type & port: 445
Honeypot: Dionaea
ISP: SPTEL PTE.LTD.
2.57.121.207
Country: Romaina
Number of Attacks: 83,749
Type & Port: 5060
Honeypot: SentryPeer
ISP:Unmanaged Ltd.
45.249.8.86
Country: Pakistan
Number of Attacks: 82,408
Type & Port TCP/22 SSH Bruteforce Attack
Honeypot: Cowrie
ISP: Trans World Enterprise (Private) Limited
103.116.202.218
Country: Indonesia
Number of Attacks: 78,375
Type & Port: TCP/22 SSH Bruteforce Attack
Honeypot: Cowrie
ISP: PT Parsaoran Global Datatrans
193.37.69.157
Country: Netherlands
Number of Attacks: 68,377
Type & Port: 5900
Honeypot: Heralding
ISP: Nechaev Dmitry
79.124.49.154
Country: Bulgaria
Number of Attacks: 46,550
Type & Port: 5900
Honeypot: Heralding
ISP: Tamatiya EOOD
Key Observations
8 out of 10 attackers are using TCP/22 for brute force SSH attacks. This reflects a pervasive targeting for open SSH hosts, most likely though automated botnets
The top 2 addresses alone account for 637,000 attacks, nearly half of recorded traffic, indicating certain IP Ranges may be heavily misused or neglected in abuse handling
While SSH is the most common target, ports 445, 5060, and 5900 (SMB, VoIP, and VNC respectively) also appear, signifying the importance of hardening services beyond just SSH
Actionable Mitigation
Most frequent attackers should be the easiest, and most pertinent to utilize firewall rules against, blocking top offending IPs or CIDR blocks. Also considering blocking at the country level if these IPs fall within known regional ranges that aren't a part of our active user base.
Reporting repeat offenders to their respective ISPs/Abuse DBs. This helps broaden the communication regarding attackers in the current threat landscape to other analysts.
Integrating TPot log output into a SIEM or alerting system for better visibility.
Attacks by (Known) Attacker Source Reputation
Key Observations
The vast majority of attackers come from known sources making up over 230k of the attacks. This suggests that as an attacker you may be more likely to be flagged or draw attention by using a Tor node or Anonymizers.
Mass scanners make up a small, but significant portion of attacks. These are most often opportunistic attackers, looking for open ports or vulnerable services utilizing specialized tools such as Shodan, Masscan, or ZMap.
Top ASNs
ASN #: 401116
Hosting Company: NYBULA
Location: United States
Count: 453,862
ASN #: 16276
Hosting Company: OVH SAS
Location: France
Count: 405,913
ASN #: 28292
Hosting Company: ENGEPLUS INFORMATICA LTDA
Location: Brazil
Count: 323,902
ASN #: 211632
Hosting Company: Internet Solutions & Innovations LTD.
Location: Seychelles
Count: 244,344
ASN # 44477
Hosting Company: Stark Industries Solutions Ltd
Location: United Kingdom
Count: 182,746
ASN #: 14061
Hosting Company: DIGITALOCEAN-ASN
Location: United States
Count: 182,148
ASN #: 213194
Hosting Company: Nechaev Dmitry Sergeevich
Location: Russia
Count: 166,597
ASN #: 47890
Hosting Company: Unamanged LTD.
Location: United Kingdom
Count: 142,795
ASN #: 43350
Hosting Company: NForce Entertainment B.V.
Location: Netherlands
Count: 94,855
ASN #: 59425
Hosting Comapny: Chang Way Technologies Co. Limited
Location: Hong Kong
Count: 84,451
Top Commands
echo -e \x46\x49\x4e - 11,373 attempts
shell - 4,780 attempts
system - 4,794 attempts
cd ~; chattr -ia .ssh; lockr -ia .ssh - 3,767 attempts
lockr -ia .ssh - 3,767 attempts
uname -a - 3,729 attempts
cat /proc/cpuinfo | grep name | wc -l - 3,439 attempts
Key Observations
echo -e \x46\x49\\x4e
contains obfuscated hex output. The use of echo -e is common in malware stagers or obfuscated commands that download or initialize a second-stage payload.
shell and system commands reflect efforts to gain shell access on the honeypot or execute system-level commands. This suggesting attackers are seeking to elevate privileges.
uname -a
Attempted frequently, this is a reconnaissance technique that collects kernel and OS info.
Actionable Mitigation
We can setup detection rules for specific keywords used in commonly attempted commands. So for example, we could make a detection rule to alert based on the use of echo -e with \x values. This would be considered a high-confidence indicator of staging/obfuscated malicious activity
In the event of unauthorized shell access, the results could be catastrophic on our internal network. Therefore, we may want to add non-admin users to restricted shells (rbash, nologin, etc.)
Attempted Script Execution & Malware Downloads
Actionable Mitigation
If I was operating this machine from an on-premises location, these would be immediate indications to add offending IPs to denylists. Similarly, if I was hosting this machine on cloud-infrastructure, I would immediately want to move to configure network security groups, or ACLs to restrict connections from known-malicious geographies.
Capturing any of these payloads invites analysis via a Sandbox such as Cuckoo AnyRun, or VirusTotal.
Indicators of Compromise
TPot detected targeted exploitation attempts of multiple high-profile CVEs, including over 600 attempts to exploit CVE-2020-11910 and nearly 600 additional attempts against CVE-2020-11899—both vulnerabilities that impact widely used FTP and embedded networking stacks.
This activity reflects opportunistic and possibly automated scanning by actors targeting known vulnerabilities in legacy or misconfigured systems.
Additional activity involving a bundle of Ripple20-related CVEs underscores the importance of asset inventory and patch validation, particularly for embedded or IoT systems. Security teams should implement CVE-based alerting and network segmentation to reduce the attack surface of such vulnerable components.