📧

SMTP Honeypot

Detect unauthorized access attempts targeting mail servers.

25/587
Default Ports
TCP
Protocol
AUTH
Detection
SMTP tripwire details

About SMTP

SMTP (Simple Mail Transfer Protocol) is the standard protocol for sending email. SMTP credentials are highly valuable to attackers for sending phishing emails, spam, or accessing email communications. Compromised mail servers can also be used for business email compromise (BEC) attacks.

What Gets Captured

When an attacker attempts to authenticate using your SMTP honeypot credentials, Tripwires captures:

  • Username - The AUTH LOGIN username
  • Source IP - The attacker's IP address
  • Timestamp - Exact time of the connection
  • Auth method - The authentication mechanism used

Connection String Formats

Standard SMTP URL

smtp://user:password@smtp-xxx.gettripwires.com:587

swaks (SMTP testing tool)

swaks --to test@example.com \
      --server smtp-xxx.gettripwires.com:587 \
      --auth LOGIN \
      --auth-user user \
      --auth-password password

Python (smtplib)

import smtplib
server = smtplib.SMTP('smtp-xxx.gettripwires.com', 587)
server.starttls()
server.login('user', 'password')

Node.js (nodemailer)

const nodemailer = require('nodemailer');
const transporter = nodemailer.createTransport({
    host: 'smtp-xxx.gettripwires.com',
    port: 587,
    auth: {
        user: 'user',
        pass: 'password'
    }
});

Strategic Placement Ideas

Application Email Config

Leave as "notification service" credentials in app config files.

CI/CD Notification Settings

Add as "alert email server" in deployment pipelines.

Internal Monitoring Tools

Include in monitoring system email alert configurations.

High-Impact Target

Compromised SMTP credentials enable attackers to send emails appearing to come from your organization, making them extremely dangerous for phishing and business email compromise attacks.