This Python script is a tiny honeypot for Heartbleed(CVE-2014-0160) If you use this script by default port(443/tcp), you should run by root.
Usage: heartpot.py
Output format: Date/time, Source IP address, Protocol, Payload
Output example: [2014-04-13 01:59:23],192.168.1.22,SSL,1803000003014000
2014/Apr/13th http://www.morihi-soc.net/ Kazuaki Morihisa (@k_morihisa)