Mirror of a skiddy detector esp8266_honeypot
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
gbafana25 734e75838e added connection timeout, and edited the welcome banner 7 months ago
.github/ISSUE_TEMPLATE Update issue templates 8 months ago
images added a little status update for today 8 months ago
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 8 months ago
LICENSE added license 8 months ago
README.md fixed picture insertion 7 months ago
boot.py added ampy config file for unix systems 8 months ago
esp8266_honeypot.py added connection timeout, and edited the welcome banner 7 months ago
install.bat added easy installer scripts 8 months ago
install.sh added connection timeout, and edited the welcome banner 7 months ago
sys_messages.py added connection timeout, and edited the welcome banner 7 months ago



:stuck_out_tongue_winking_eye: :stuck_out_tongue_winking_eye: :stuck_out_tongue_winking_eye:

Version 1.0 out now!!

If you scan or try to find the location of the IP addresses logged, I am not responsible if you get caught, since port scanning and vulnerability scanning WITHOUT PERMISSION is illegal. Once again, thank you for all your suggestions, edits, and support on social media!! :grinning:


About this project

This is a honeypot programmed in Micropython for the ESP8266

The honeypot is set up to act as a telnet server owned by a fake bank. Port forwarding is needed to be configured in order for the microcontroller to be accessed from a public IP. The public IP will be your routers IP, port 23 (12.345.678.910:23). Make sure your router is secured since scanning the IP address of your router will also reveal your router’s login console and/or other open ports. Do this at your own risk!! I am not liable if you get hacked. Comments on the code are still in progress

Original inspiration for this came from the arduino-powered honeypot, found here.

The esp8266 handles all of the socket functions and the terminal prompt. The access point is disabled in the custom boot.py file. The boot.py file must have the WiFi SSID, Wifi password, static IP, subnet mask, router IP, and DNS server address changed as needed. The ampy config file (whichever one applies to your system) must be edited to point ampy to the right port (COMx for Windows, /dev/ttyUSB* for Linux, /dev/tty.* for Mac)

What is a honeypot

A honeypot is a device designed to lure/attract hackers into exploring your device as if it was a legitamte piece of infrastructure or private property that is unprotected. Many open source honeypots, such as the ones found here are designed to report attacks and gather information about hackers’ activity on your network


The ESP8266 in all of its glory: :ok_hand: The_hole_of_doom This honeypot started as a funny thing to do and see how many people still attack Telnet devices. This honeypot can not be as advanced as the ones linked above, since it is being run on a microcontroller. This is why it emulates Telnet. Telnet is a simple protocol that is easy to emulate on microcontroller, due to their being no encryption to worry about.

The hardware and software

  • An ESP8266 microcontroller (Adafruit Feather version pictured above)
  • A Windows, Linux, or MacOS computer :computer:
  • If you have the bare ESP8266 module, you will also need a USB to Serial converter board, and the additional drivers to go with it
  • If you have a board with the USB to Serial chip already on it, you still need the appropriate drivers and a micro USB cable :electric_plug:

Features :ok_hand:

  • Console interface has all-uppercase text
  • Fake database contents
  • Fake system information
  • Fake FDIC “get off my lawn” warnings

The attack sequence and mentality of the script kiddie


  1. Your ESP8266 honeypot found either with Shodan, Google Dorks, on accident, etc.
  2. The hacker scans your router, and finds port 23 open. An experienced hacker will know it is a honeypot (routers do not just have port 23 open randomly!!)
  3. The script kiddie will keep trying to guess the password for the router :confused:, until they decide to try the telnet port, and they get excited that no password is required to login to the server!! :grinning:
  4. They start entering commands, but after awhile, something doesn’t seem right…. UNTIL THEY TRY TO EXIT AND REALIZE THAT THEY WERE BEING WATCHED THE WHOLE TIME!!! MWHAHAHAHA :smiling_imp: :smiling_imp: :astonished: (not really, but their IP was logged)

Deploying the script

New!! installer scripts automate copying of files

  • clone this repository with git clone https://github.com/gbafana25/esp8266_honeypot
  • switch to the project directory with cd esp8266_honeypot/
  • Run install.bat if you are on Windows or install.sh if you are on a Unix system
  • Reset the microcontroller
  • Wait for those l33t h4x0rs :ok_hand:

You can verify that the ESP8266 is working by finding it on your network, log into it over telnet, and go to your unique link to see if it logged your IP.

Monitoring (optional)


  • set up Wireshark on a free computer to run all the time and capture packets
  • set a filter for Telnet ports
  • you will be able to see the plain ASCII text, since Telnet is not encrypted!!

Coming soon:

  • more comments on code (probably will always be here)
  • more commands available to hackers (suggestions welcome on ycombinator and reddit)
  • better readme (screenshots of nmap, dweet messages, etc., and memes possibly)

please star this repo if you found it useful and/or interesting