What is Trappot?

Trappot is a honeypot.

A honeypot informs you about an intrusion with high quality alerts. It provides you with the precious minutes and hours to respond to a fatal cyber attack and also it directs you to the right spots to analyze.

Trappot, Honeypot, work, office

Fast and high quality threat hunting

Sifting through a large amount of log data to detect possible intrusions takes a lot of time, skills and produces a considerable false positive leads.

Trappot can inform you about a suspicious activity in your network with a few alerts and you can focus on the right attack sources within minutes.


You can't afford not having a honeypot in your network

Threat hunting requires an advanced understanding of cyber attack techniques and their reflections on system and security logs. In addition to that a cyber security analyst must have the skills to effectively analyze those logs and create efficient alert rules. Needless to say a powerful SIEM platform is required to handle a huge amount of data and make it accessible for analysis.

A honeypot solution like Trappot can relieve you of the high costs of skill, time and infrastructure with its brilliant approach to detect attackers with a high precision.

Supported by the national technology fund

Trappot is funded by the national technology fund after careful scrutinization of the academic personnel and it is successfully developed.

Satisfied customers with high value threat detections

Since reputation is very critical for every organization we don’t share the success of Trappot in incident detection examples publicly. However, we can provide reference details to you to help you decide your Trappot purchase.

Technical Insights

The importance of the enumeration phase of an attack

In any attack the attacker would try to enumerate your infrastructure. Although these activities would seem benign in regular system logs if a honeypot is tried to be enumerated it is very likely that they are suspicious. It is amazingly effective and cheap to detect attacks at such an early phase with the Trappot solution. No serious organization should miss the chance of using such a useful tool in their detection infrastructure.

Detection of attack tools with high precision

Most if not all of enumeration and attack tools have certain characteristics and they would allow defenders to identify any scan or attack with high precision. Trappot can be configured to analyze client requests and other packets to positively differenciate some of the attack tools from the regular client applications.

Best in class search and dashboard infrastructure

Trappot has a very good log indexing infrastructure and a great search interface. You can create flexible dashboard widgets with the rich search grammar.

Central node image update infrastructure

You can potentially have many sensors in your Trappot infrastructure and some of them could be installed in remote locations. That’s why it is essential to be able to update the node images centrally and quickly.

Product Highlights

Easy deployment

An easy ISO installation for the master server and each node

Easy management

Instant enrollment of the nodes to the master server

Central configuration management and customization for each node

Central update of the node versions

Powerful query infrastructure

Easy and powerful query language

Create dashboard widgets using the same query statements used for search

Practical notification

Instant notification through email, sms and slack messages.

Easy integration with your SIEM

Forwarding honeypot event logs to any SIEM through Syslog

Procedure for installation

You can request a demo license from us and quickly install the Trappot server and a few sensor nodes within an hour or two. A single ISO image with streamlined installation process makes your lives easy to install such an effective incident detection solution.

    Request a demo