SYS.INIT
001
PROTOCOL — 001
BAIT
SYSTEM
Deception-Based Intrusion Detection
& Attacker Analysis Platform
0
VECTORS
0
PORTS
0
ALERTS
GUARD ACTIVE
NET.MAP
002
NETWORK ARCHITECTURE
Deception Topology
HACKER
CLIENT
FIREWALL
MAIN SERVER
FAKE SERVER
LOG DB
PANEL
ALERTS
NORMAL
ATTACK
5
SERVICES
128
ATTACKS
12
ALERTS
47
COUNTRIES
ATK.FLOW
003
ATTACK LIFECYCLE
How The Trap Works
1
Attacker Enters
SSH, HTTP, or FTP access attempt
2
Redirected to Bait
Traffic routed to GUARD sandbox
3
Interaction Captured
Commands, logins, files all logged
4
JSON Logged
IP, country, timestamp, type stored
5
Alert Dispatched
Telegram notification with details
6
System Protected
Real assets behind actual firewall
Lure & Isolate
Safe sandbox environment
Record Everything
Commands, files & credentials
Real-time Detection
Instant intrusion alerts
Admin Alerts
Telegram API notifications
SSH.TRAP
004
SSH GUARD
handle_ssh(client, addr)
PORT 2222 — LISTENING
PYTHON // HANDLE_SSH
def
handle_ssh
(client, addr): ip = addr[0] country = get_ip_info(ip) client.send(b
"SSH-2.0-OpenSSH_8.2\r\n"
)
try
:
data = client.recv(1024).decode()
log_entry = {
"time"
: str(datetime.now()),
"ip"
: ip,
"country"
: country,
"type"
:
"SSH Attack"
,
"data"
: data } save_log(log_entry) send_alert(f
"🚨 SSH\nIP:{ip}"
)
except
:
pass
client.close()
TERMINAL SIMULATION
SSH SESSION
WEB.TRAP
005
WEB VECTOR — /login
Credential Trap & Geolocation
CAPTURED PAYLOAD
COUNTRY
—
CITY
—
IP
—
ISP
—
GEO TRACE — AWAITING DATA
LOADING MAP...
SRC.CODE
006
FULL SOURCE
main.py — Execution Flow
IMPORTS & CONFIG
import
socket, threading, datetime
import
requests, json
from
flask
import
Flask, request, jsonify LOG_FILE =
"logs.json"
TELEGRAM_TOKEN =
"YOUR_BOT_TOKEN"
CHAT_ID =
"YOUR_CHAT_ID"
def
save_log
(entry): data = json.load(open(LOG_FILE)) data.append(entry) json.dump(data,open(LOG_FILE,
"w"
),indent=2)
def
get_ip_info
(ip): res = requests.get( f
"http://ip-api.com/json/{ip}"
).json()
return
res.get(
"country"
)
MAIN ENTRY
if
__name__ ==
"__main__"
: threading.Thread( target=start_ssh, daemon=
True
).start() print(
"🔥 System Running"
) app.run(host=
"0.0.0.0"
, port=5000)
def
start_ssh
(): server = socket.socket() server.bind((
"0.0.0.0"
, 2222)) server.listen(5)
while True
: client, addr = server.accept() threading.Thread( target=handle_ssh, args=(client, addr) ).start()
SYS.ALERT
007
Bait System Alert
🚨
CRITICAL SYSTEM ALERT
Type:
SSH Brute Force Attack
Target:
GUARD-Alpha Core
Attacker IP:
—
Location:
—
Automatic mitigation protocol engaged. Attacker trapped in sandbox.
Awaiting attack...
CRITICAL
DASH.LIVE
008
LIVE TELEMETRY
/stats — /logs — /dashboard
0
TOTAL ATTACKS
0
SSH
0
LOGIN
7-DAY DISTRIBUTION
SSH
LOGIN
SCAN
LIVE LOG
‹
›
SYSTEM