If you run any internet-facing services at home or in a small business, you already know that automated scanners, credential-stuffing bots, and opportunistic attackers probe your network around the clock. Instead of simply blocking them, a honeypot turns that constant noise into actionable intelligence. By deploying decoy services that appear vulnerable but are actually instrumented traps, you can observe attack patterns in real time, collect malware samples, and — most importantly — generate alerts that tell you when someone is actively targeting your infrastructure.
This guide compares the three most practical self-hosted honeypot platforms available in 2026: Cowrie, T-Pot, and OpenCanary. Each takes a different approach, and the right choice depends on whether you want deep SSH/Telnet interaction, a multi-sensor security platform, or a lightweight distributed deception framework.
Why Run a Self-Hosted Honeypot in 2026?
You might wonder why you would intentionally expose something that looks vulnerable on your own network. The answer comes down to visibility.
Detect Attacks Before They Hit Production Services
A honeypot is a canary in the coal mine. Because no legitimate user should ever connect to it, any interaction is suspicious by definition. When an IP address hits your honeypot, you get an immediate signal that there is active reconnaissance or an ongoing attack targeting your network. This zero-false-positive property makes honeypots uniquely valuable compared to traditional IDS/IPS systems that generate thousands of alerts daily.
Collect Real-World Threat Intelligence
Honeypots capture attacker behavior as it happens — the commands they type after gaining access, the payloads they try to execute, the malware binaries they attempt to download. This data is invaluable for understanding what’s targeting your specific infrastructure and for feeding threat intelligence feeds like MISP.
Divert Attackers Away from Real Assets
A well-configured honeypot can absorb automated scanning and brute-force attacks that would otherwise consume resources on your real services. When combined with firewall rules that auto-block honeypot-interacting IPs, you get a simple but effective defense layer.
Zero Licensing Costs, Full Data Ownership
Commercial deception platforms can cost thousands of dollars per year. The tools covered here are completely free, open source, and run on hardware you already own. Every byte of captured data stays under your control — no third-party cloud processing, no privacy concerns.
Cowrie: The SSH/Telnet Honeypot
Cowrie is a medium-interaction honeypot that emulates SSH and Telnet servers. It has been one of the most widely deployed open-source honeypots for over a decade and excels at capturing brute-force attacks and post-exploitation behavior.
Key Features
- Medium-interaction shell emulation: Attackers can log in with stolen credentials and interact with a fake filesystem. Their commands are logged, and Cowrie simulates realistic outputs for common commands like
ls,uname,wget, andcat. - Malware collection: When attackers attempt to download malicious binaries via
wgetorcurl, Cowrie saves the files for analysis. - Credential harvesting: Every username/password combination used during login attempts is recorded, building a picture of active credential-stuffing campaigns.
- Audit logging: Every keystroke is logged, providing a complete session replay.
- JSON output and MISP integration: Logs can be forwarded to Elasticsearch, Logstash, Splunk, or MISP for analysis.
Architecture
Cowrie runs as a Python application and supports two modes:
- Proxy mode: Forwards connections to a real SSH server, logging credentials in transit. This is useful for detecting compromised accounts on your own servers.
- Emulation mode (default): Presents a fully emulated environment with a fake filesystem, making attackers believe they have gained access to a real system.
docker Installation
| |
Create a minimal configuration:
| |
| |
Within hours, you’ll start seeing SSH brute-force attempts from around the world. The cowrie.json log file captures every interaction in structured JSON format.
Strengths and Limitations
| Strengths | Limitations |
|---|---|
| Excellent SSH/Telnet coverage | Only covers SSH and Telnet protocols |
| Realistic shell emulation | Sophisticated attackers may detect the fake environment |
| Built-in malware collection | No web application honeypot capability |
| Easy Docker deployment | Single-purpose — needs other tools for broader coverage |
| Active community and documentation | Manual output configuration for SIEM integration |
Cowrie is the right choice when you want a focused, lightweight SSH/Telnet honeypot that captures detailed interaction data without requiring significant resources.
T-Pot: The Multi-Sensor Honeypot Platform
T-Pot is an all-in-one honeypot platform built on Debian Linux. It bundles more than 20 individual honeypot sensors into a single deployment, each emulating a different service. Think of it as a Swiss Army knife of network deception.
Included Honeypots
T-Pot ships with a comprehensive collection of sensors, each targeting different attack vectors:
| Sensor | Protocol | What It Emulates |
|---|---|---|
| Cowrie | SSH/Telnet | Shell interaction, credential harvesting |
| Dionaea | SMB/HTTP/FTP | Malware download and analysis |
| Conpot | ICS/SCADA | Industrial control systems |
| Mailoney | SMTP | Email server attacks |
| Elasticpot | Elasticsearch | Database API probing |
| Glutton | Multiple | Protocol-agnostic TCP honeypot |
| Heralding | Auth proxy | Credential capture for various services |
| CitrixHoneypot | Citrix | Citrix Gateway eredistation attempts |
| Redishoneypot | Redis | Redis server attacks |
| Tanner | Web | Web application vulnerability scanning |
Security Stack
Beyond the honeypots, T-Pot includes:
- Elasticsearch: Log storage and search
- Kibana: Visualization dashboards with pre-built honeypot-specific panels
- Filebeat/Logstash: Log collection and processing
- Suricata: Network intrusion detection
- CyberChef: In-browser data decoding and analysis
System Requirements
T-Pot is resource-intensive because it runs multiple services simultaneously:
- Minimum: 4 CPU cores, 8 GB RAM, 128 GB SSD
- Recommended: 8 CPU cores, 16 GB RAM, 256 GB SSD
- Network: Must be directly internet-facing (not behind NAT)
Installation
T-Pot is designed to run on a dedicated Debian system. The installation script handles everything:
| |
The installer presents an interactive menu where you choose:
- T-Pot edition: Standard (all honeypots) or Industrial (ICS-focused sensors)
- Network interface: Select the interface connected to the internet
- Installer type: Standard install on existing Debian or ISO-based bare-metal install
After installation, the web dashboard is available at https://<your-ip>:64297 with Kibana dashboards showing real-time attack maps, credential statistics, and protocol breakdowns.
Docker-Based Quick Start
For a lighter setup, T-Pot also offers a Docker Compose configuration:
| |
| |
Web Dashboard and Monitoring
The Kibana interface provides several pre-configured dashboards:
- Overview: Geographic attack map, top attacking IPs, protocol distribution
- Cowrie: Session replays, command frequency, downloaded malware
- Dionaea: Malware hash analysis, connection graphs
- Suricata: Network-based detection alerts correlated with honeypot events
Strengths and Limitations
| Strengths | Limitations |
|---|---|
| 20+ honeypot sensors in one package | Resource-heavy — needs a dedicated machine |
| Pre-built Kibana dashboards | Complex to customize individual sensors |
| Includes Suricata IDS | Requires direct internet exposure |
| Active development by Deutsche Telekom | Overwhelming amount of data for small deployments |
| Covers SSH, HTTP, SMB, ICS, SMTP, and more | Not suitable for virtual machines with limited resources |
T-Pot is ideal when you want comprehensive network-wide visibility and have the hardware to support it. It’s the closest thing to a commercial deception platform in the open-source world.
OpenCanary: The Lightweight Distributed Honeypot
OpenCanary by Thinkst takes a fundamentally different approach. Instead of running one monolithic honeypot, it deploys lightweight “canaries” — small, protocol-specific monitors that you scatter across your network. Each canary watches for activity on a single protocol and sends alerts when triggered.
Key Features
- Modular design: Each protocol runs as an independent module. Enable only what you need.
- Distributed deployment: Run instances on multiple machines, Raspberry Pis, or containers.
- Alert flexibility: Notifications via email, Slack, webhooks, syslog, or SNMP traps.
- Low resource usage: Each instance uses minimal CPU and memory — a Raspberry Pi Zero can run several canaries.
- Custom banners and responses: Configure believable service banners that match your environment.
Supported Protocols
| Module | Port | Detects |
|---|---|---|
| SSH | 22 | Brute-force login attempts |
| HTTP | 80 | Web scanner probing, admin panel access |
| FTP | 21 | Anonymous login attempts, credential stuffing |
| SMB | 445 | Windows share enumeration, WannaCry-style scanning |
| RDP | 3389 | Remote Desktop brute-force |
| SNMP | 161 | SNMP community string guessing |
| NTP | 123 | NTP amplification scanning |
| MySQL | 3306 | Database credential probing |
| Redis | 6379 | Redis unauthorized access attempts |
| TCP Banner | Any | Custom TCP service emulation |
Installation and Configuration
| |
| |
Docker Deployment
| |
| |
For a multi-canary setup, deploy the same container on different machines with different OC_NODE_ID values. Each instance sends centralized alerts, giving you network-wide coverage from a single Slack channel or email inbox.
Strengths and Limitations
| Strengths | Limitations |
|---|---|
| Extremely lightweight — runs on Raspberry Pi | Low interaction — doesn’t capture detailed attacker behavior |
| Easy distributed deployment | No malware collection capability |
| Flexible alerting (Slack, email, webhook, syslog) | Less detailed session data than Cowrie |
| Customizable service banners | Requires manual setup on each target host |
| Low false-positive rate | No built-in analytics dashboard |
OpenCanary is the best fit when you want broad, lightweight coverage across many machines and prefer immediate alerts over deep forensic data.
Feature Comparison at a Glance
| Feature | Cowrie | T-Pot | OpenCanary |
|---|---|---|---|
| Interaction Level | Medium (shell emulation) | High (real services) | Low (banner/response) |
| Protocols Covered | SSH, Telnet | 20+ (SSH, HTTP, SMB, ICS, SMTP, etc.) | 10+ (modular) |
| Malware Collection | Yes | Yes (via Dionaea) | No |
| Credential Harvesting | Yes | Yes (via multiple sensors) | Yes (basic) |
| Dashboard | No (needs external ELK) | Yes (Kibana included) | No (log/alerts only) |
| Docker Support | Excellent | Good (official compose) | Good |
| Min. RAM | 512 MB | 8 GB | 256 MB |
| Installation Time | 5 minutes | 30–60 minutes | 10 minutes |
| Alert Integration | JSON/MISP/ELK | Kibana dashboards | Slack/email/webhook/syslog |
| Best Use Case | Focused SSH/Telnet monitoring | Comprehensive network deception | Lightweight distributed canaries |
| Development Status | Active | Active | Active |
Recommended Deployment Strategies
The Layered Approach
The most effective setup combines all three tools at different network layers:
- Perimeter layer: Deploy T-Pot on a dedicated internet-facing server to catch broad-spectrum scanning and collect malware samples.
- Service layer: Run Cowrie on port 2222 alongside your real SSH server (on port 22) to catch SSH-specific attacks targeting your infrastructure.
- Internal layer: Place OpenCanary instances on internal network segments — a canary on each subnet detects lateral movement if an attacker breaches your perimeter.
Quick-Start Single Machine
If you have limited hardware and want the most coverage from a single box:
| |
Auto-Blocking with Fail2ban
Regardless of which honeypot you choose, integrate it with fail2ban to automatically ban attacking IPs:
| |
With maxretry = 1, any IP that touches your honeypot gets banned for 24 hours — a simple but effective automated defense.
Analyzing Your Honeypot Data
The value of a honeypot is proportional to what you do with the data. Here are practical analysis approaches:
Credential Analysis: Export login attempts and check for patterns. Common findings include:
- Default credentials (
admin/admin,root/root) - Credential lists from known breaches
- Targeted username patterns that reveal attacker reconnaissance
Geographic Mapping: T-Pot’s Kibana dashboards provide built-in geo-IP mapping. For Cowrie, pipe JSON logs to a simple script:
| |
Malware Analysis: Files captured by Cowrie or Dionaea can be submitted to VirusTotal or analyzed locally with file, strings, and yara rules to identify threat families.
Final Recommendation
- Choose Cowrie if you want a focused, easy-to-deploy SSH/Telnet honeypot with detailed session logging and malware collection. It’s the best starting point for most self-hosters.
- Choose T-Pot if you have a dedicated machine, want comprehensive multi-protocol coverage, and value the built-in Kibana analytics. It’s the most powerful option but requires significant resources.
- Choose OpenCanary if you want lightweight, distributed coverage across many machines with immediate alert notifications. It’s ideal for detecting lateral movement on internal networks.
For the best results, deploy them together in layers — each tool covers different blind spots, and the combined intelligence gives you a far more complete picture of who’s targeting your infrastructure and how.
Frequently Asked Questions (FAQ)
Which one should I choose in 2026?
The best choice depends on your specific requirements:
- For beginners: Start with the simplest option that covers your core use case
- For production: Choose the solution with the most active community and documentation
- For teams: Look for collaboration features and user management
- For privacy: Prefer fully open-source, self-hosted options with no telemetry
Refer to the comparison table above for detailed feature breakdowns.
Can I migrate between these tools?
Most tools support data import/export. Always:
- Backup your current data
- Test the migration on a staging environment
- Check official migration guides in the documentation
Are there free versions available?
All tools in this guide offer free, open-source editions. Some also provide paid plans with additional features, priority support, or managed hosting.
How do I get started?
- Review the comparison table to identify your requirements
- Visit the official documentation (links provided above)
- Start with a Docker Compose setup for easy testing
- Join the community forums for troubleshooting