This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


External Tool
External Data Source
51 (lowest rank is 51)

Category & Restrictions

cyber defense, honeypots


Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

Choose to run as an emulated shell (default):
Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included
Possibility of adding fake file contents so the attacker can cat files such as /etc/passwd. Only minimal file contents are included
Cowrie saves files downloaded with wget/curl or uploaded with SFTP and scp for later inspection
Or proxy SSH and telnet to another system
For both settings:

Session logs are stored in an UML Compatible format for easy replay with the bin/playlog utility.
SFTP and SCP support for file upload
Support for SSH exec commands
Logging of direct-tcp connection attempts (ssh proxying)
Forward SMTP connections to SMTP Honeypot (e.g. mailoney)
JSON logging for easy processing in log management solutions

Additional Details

web scraping, internet mail protocols, curl, spamming, computer logging, upload, transport layer protocols, proxy server, wget, cryptographic protocol, clear text protocols, application layer protocols, file system, data serialization formats, transport layer security, external data source, cryptographic software, network performance, servers, 1356, history of the internet, telnet, json, internet protocol, replay attack, communication, email, cowrie, scp foundation, uniform resource identifier, cache, remote administration software, internet privacy, simple mail transfer protocol, brute force attack, inferlink corporation, transmission control protocol, honeypot, ssh communications security, history of computing, exec shield, secure shell, log management, cryptanalysis, exploit, operating system security