Open Source Telnet Honeypot
Switch branches/tags
Nothing to show
Clone or download
Latest commit c32d433 Mar 20, 2017


Cymmetria Research has released a new honeypot for the Apache Struts exploit, see more info here:


MTPot is a simple open source honeypot, released under the MIT license for the use of the community. Cymmetria Research, 2016. Please consider trying out the MazeRunner Community Edition, the free version of our cyber deception platform. Written by: Itamar Sher (@itamar_sher), Dean Sysman (@DeanSysman), Imri Goldberg (@lorgandon) Contact:


  • Python 2.7
  • pip install telnetsrv
  • pip install gevent


usage: [-h] [-v] [-o OUTPUT] config

positional arguments: config Path to a json config file, see README for all available parameters

optional arguments: -h, --help show this help message and exit -v, --verbose Increase MTPot verbosity -o OUTPUT, --output OUTPUT Output the results to this file

Config file keys

  • port - REQUIRED, The port MTPot will bind to.
  • commands - REQUIRED, A python dict containing the commands expected to receive from the scanner (Mirai e.g.) as the keys and the responses as values. IMPORTANT: at the moment commands are assumed to be run under /bin/busybox. (e.g. command="ps" means that the command that would actually get handled is "/bin/busybox ps")
  • ddos_name - REQUIRED, The name of the attack (Mirai e.g.) that will appear whenever a successful fingerprint has occured
  • ip - REQUIRED, The IP address MTPot will bind to.
  • syslog_address - OPTIONAL, Syslog IP address to send the fingerprinted IPs to.
  • syslog_port - OPTIONAL, Syslog PORT.
  • syslog_protocol - OPTIONAL, Protocol used by the syslog (TCP/UDP)

Also included are sample config files (mirai_conf.json, mirai_scanner_conf.json) built for fingerprinting mirai based on the code available from:

Important note on sample downloading

We had to stop debugging mirai at some point. An issue left open is that the remote mirai infector crashes when it receives an expected response to one of its commands.

We did not have the time to work on this last issue (which apparently some folks see as a feature), but happy to get the help of the community if anyone wants to take a stab at making that aspect of the honeypot work.

Known Issues

Some users reported to us that the telnetsrv library throws this exception:

Traceback (most recent call last): File "/usr/lib/python2.7/dist-packages/gevent/", line 327, in run result = self._run(*self.args, **self.kwargs) File "/usr/local/lib/python2.7/dist-packages/telnetsrv/", line 821, in inputcooker c2 = self._inputcooker_getc(block=False) File "/usr/local/lib/python2.7/dist-packages/telnetsrv/", line 774, in inputcooker> getc if not self.inputcooker_socket_ready(): File "/usr/local/lib/python2.7/dist-packages/telnetsrv/", line 44, in inputcooker_socket_ready return[self.sock.fileno()], [], [], 0) != ([], [], []) AttributeError: 'module' object has no attribute 'select' <Greenlet at 0x76600080: <bound method MyTelnetHandler.inputcooker of <main.MyTelnetHandler instance at 0x765f5e68>>> failed with AttributeError

This bug appears to be in the libtelnetsrv/gevent library, here's a temporary fix (at your own discretion and risk) to get rid of the exception: Open in telnetserv and add the following code to the beginning of the file -

import select

And replace line 44

return[self.sock.fileno()], [], [], 0) != ([], [], []):)


return[self.sock.fileno()], [], []) != ([], [], [])