Skip to content

Hands-on honeypot deployment using T-Pot on Azure.Features include log collection, attacker geolocation, automated Python analysis, and visual dashboards.

License

Notifications You must be signed in to change notification settings

abiola-samuel/cowrie_analysis

Repository files navigation

T-Pot Dashboard Banner

Honeypot Lab (Azure) – Deployment & Analysis

In this project, I set up and analyzed a honeypot environment on Microsoft Azure to study real-world attacker behavior.

  • Part 1 – Deployment:
    I deployed a T-Pot Honeypot Lab in Azure, configured network security rules, and redirected exposed SSH traffic into the Cowrie honeypot for safe monitoring.

  • Part 2 – Analysis:
    I collected logs from Cowrie, built a Python-based analyzer to process attacker IPs, credentials, and executed commands, and visualized the findings in a SOC-style dashboard.

  • Part 3 – Project Structure & Repo Organization:
    I documented the repository structure, clearly separating sensitive raw outputs (analysis_output/, which is .gitignored) from safe demo files (demo/) and T-Pot screenshots (dashboards/).
    This ensures the project can be shared publicly while protecting sensitive attacker data, and also provides recruiters/researchers with sanitized examples of the outputs.

The objective was not only to demonstrate how to deploy honeypots in the cloud, but also to practice how a Security Operations Center (SOC) transforms raw logs into actionable security intelligence. This provided hands-on experience in both cloud security architecture and threat analysis.


📑 Project Sections


📜 License

This project is licensed under the MIT License.

About

Hands-on honeypot deployment using T-Pot on Azure.Features include log collection, attacker geolocation, automated Python analysis, and visual dashboards.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages