BlogSafe Honeypot is a ‚lite‘ version of our private research tool. It’s purpose is to track two types of information.
- Failed URL requests.
- Failed login attempts.
By analyzing data collected by BlogSafe Honeypot, you will gain an insight into attempts to access known vulnerabilities as well as emerging
threats. You’ll also be able to analyze which usernames and passwords brute-force agents are using in attempts to force their way into your site.
- Records information about connections incoming to your WordPress site that have no valid destination.
- Records failed username and password attempts. Useful for analyzing brute-force attacks.
- IP and URL White-listing to prevent known requests and logins from being recorded.
- Can be configured to detect incoming The Onion Router (TOR) connections.
- Can be configured to automatically delete requests and login attempts after 1 year.
Third Party Notice
If the optional TOR detection is enabled, BlogSafe Honeypot will make a 3rd party connection to the TOR exit node list maintained by TOR.
You can manually view this list here: TOR Exit List
- Upload the contents of the .zip file
- Activate the plugin through the ‚Plugins‘ menu in WordPress
Za tutón tykač pohódnoćenja njejsu.
Sobuskutkowarjo a wuwiwarjo
„BlogSafe Honeypot“ je softwara wotewrjeneho žórła. Slědowacy ludźo su k tutomu tykačej přinošowali.Sobuskutkowarjo
- Deactivating now removed all databases.
- Double underscore bug not allowing settings message to be displayed fixed.
- Added version to admin header.
- Initial WordPress release