TPOT's Cowrie to ISC Logs

Published: 2020-04-02
Last Updated: 2020-04-01 22:54:27 UTC
by Tom Webb (Version: 1)
1 comment(s)

Last year I did a post about a great tool; TPOT In short, it is a collection of different honeypots put together by Docker and Elastic stack. I promised to cover setting up cowrie to report to SANS ISC, and here it is. If you are not familiar with Docker, this config would take a while to figure out. 


Copy the cowrie config from the Docker and store it on the host for persistence in /data/cowrie/config

# mkdir /data/cowrie/config

#docker cp cowrie:/home/cowrie/cowrie/cowrie.cfg /data/cowrie/config


Now we need to map the local folder where we are creating the custom config into the Docker so that it will use ours.


#vi /opt/tpot/etc/tpot.yml

Look for the section #Cowrie Service. Add the below in a similar section. 


    - /data/cowrie/config/cowrie.cfg:/home/cowrie/cowrie/cowrie.cfg


Then we need to enable the Dshield portion. You need to remove ‘#’ from the part starting with the plugin name. You’ll also need your account info.


To get your ISC Dshield key:

Log into ISC, go to My Accounts -> My reports. 

Select Update info, and you’ll see your auth_key.


#vi /data/cowrie/config/cowrie.cfg



enabled = true

userid = 0123456789

auth_key = mysuperawesomekeycode

batch_size = 100


Once you saved the changes, restart tpot.

#systemctl restart tpot



You use to be able to search for dshield in the logs to make sure it was working. In the current version the Docker is using, this is not working. I would still check the log for errors in /data/cowrie/log/cowrie.log.

The best way to check to make sure this is working is by going to Check the last report section and see what the time stamp is. It may take a day to populate this data, so you might want to check the next day after setup. 


 ssh/kippo reports: 2020-03-28 17:54:12


Also dont forget about ISC own honeypot for Pi



Tom Webb


Keywords: Cowrie TPOT
1 comment(s)


Thanks for the hint, didn't noticed the "output_dshield" option of cowrie. For the last year I used a script on a remote machine to get the cowrie logs out of T-Pot, parse and report to dshield. I will give this direct approach a try.


Diary Archives