Use the right machine
- Dedicated VPS or VM only
- At least 8 GB RAM for a sensor-style install
- At least 128 GB SSD storage
- Clean supported Linux install with SSH available
I did this project to extend what I was learning in Networking Protocols class into a live, controlled lab. It shows how I set up a disposable T-Pot honeynet on a VPS, monitored the dashboards, collected a short evidence set, and shut the lab down cleanly.
The goal was not to hack anyone back. The goal was to watch what touched the exposed honeypot, learn from the logs, and document the behavior safely.
T-Pot is heavier than a normal beginner VPS project. Treat this as a dedicated lab box, not as a server that also hosts your website.
These steps follow the current T-Pot project install flow: start from a clean supported Linux host, install curl if needed, run the installer as a normal user from your home directory, reboot, then use the T-Pot management ports.
Use a fresh supported Linux image. Do not install Apache, Nginx, databases, panels, or extra services first.
Before exposing honeypot traffic, keep T-Pot management access limited to your IP.
64295/tcp64297/tcpIf SSH is still new, read the terminal and SSH guide first.
ssh username@YOUR_SERVER_IP
T-Pot uses a remote installer script, so the server needs curl.
sudo apt update
sudo apt install -y curl
Run this as your normal user from $HOME, not as root.
cd ~
env bash -c "$(curl -sL https://github.com/telekom-security/tpotce/raw/master/install.sh)"
Do not speed-click through the installer.
The official flow expects a reboot after the installer finishes.
sudo reboot
After reboot, T-Pot uses its management SSH port.
ssh -l username -p 64295 YOUR_SERVER_IP
Once T-Pot is running, use the web landing page to reach Kibana, the Attack Map, and other tools.
https://YOUR_SERVER_IP:64297A honeynet lab is not complete until it is stopped, exported, or destroyed.
sudo systemctl stop tpot
sudo systemctl disable tpot
docker ps
tar -czf tpot-logs.tar.gz ~/tpotce/data
Terminate the instance and check for leftover volumes, snapshots, public IPs, or firewall rules.
This page keeps the detailed results private, but the high-level pattern was worth documenting: exposed services attract automated attention quickly, including traffic that appears financially motivated.
T-Pot turns abstract networking topics into visible events: ports, protocols, sessions, source traffic, IDS alerts, and dashboard timelines.
One sanitized finding was a visible crypto-themed SSH credential pattern. The lesson is simple: attackers and bots are actively looking for weakly secured systems tied to valuable infrastructure.
The project required careful notes, screenshots, log handling, redaction, shutdown steps, and a clear separation between private analysis and public summary.
The current install commands, requirements, ports, first-start notes, dashboards, and maintenance details.
Use this first if students still need help creating a disposable Linux server.
Use this first if the commands, SSH tunnel, or headless-server workflow are still unfamiliar.