Deploying T-Pot Honeypot for CCDC

Setting Up and Monitoring SSH Attack Attempts

Setting Up a Honeypot for CCDC

I was setting up some honeypots for the CCDC cybersecurity competition and discovered that shortly after activating them, I started seeing alerts of SSH login attempts, so I said, I have to see this in action and remembered this project.

Deploying T-Pot to Monitor SSH Attacks

  • 1

    Deploy Ubuntu 20 on Digital Ocean

    Start by deploying an Ubuntu 20 instance on Digital Ocean to host the honeypot.
  • 2

    Clone and Install T-Pot

    Run the following commands to install T-Pot:
    git clone https://github.com/telekom-security/tpotce
    cd tpotce/iso/installer/
    ./install.sh --type=user
  • 3

    Modify SSH Port for Security

    After installation, change the SSH port to prevent unauthorized access.

  • 4

    Check Running Services

    Use dps.sh to list the active T-Pot services.

  • 5

    Access T-Pot Web Interface and SSH

    - SSH: ssh user@ip -p 64295
    - Attack Map: https://IP:64297/map/
  • 6

    Adjust SSH Configuration

    Modify SSH settings:
    Port 64295
    Match Group tpotlogs
    PermitOpen 127.0.0.1:64305
    ForceCommand /usr/bin/false
  • Map




  • 7

    Monitor Attack Data (from T-mobile)

    Use T-Mobile Honeypot Dashboard to visualize attack patterns.