[tor-talk] Tor honeypot

krishna e bera keb at cyblings.on.ca
Wed Oct 12 01:04:04 UTC 2016


On 11/10/16 12:17 PM, Flipchan wrote:
> Hi *:)
> I have been playing around with some telnet and ssh honeypots lately and caught some malware to learn More about reverse Engineering. And i thought it would be cool to run a Tor honeypot , something that listens on port 9001 and is ofc not connected to the Tor Network.
>  So something that listens on port 9001 and logs all incoming request just to see if there is anything scanning for Tor ports and trying to hack them, has this been done? Would be cool to look at the data from that if anyone got a link. I cant be able to find something like this online:/

Try to ensure your research is compatible with
https://blog.torproject.org/blog/ethical-tor-research-guidelines
and the more general
https://blog.torproject.org/blog/tor-social-contract
and ofc if you see anything missing or needlessly restrictive in the 
guidelines feel free to suggest changes.

If you arent connected to the live Tor network it doesnt seem you would 
breach anything, but as someone else said the results would not be 
representative.


More information about the tor-talk mailing list