This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford’s ([email protected]) demo for CVE-2014-0160 ‘Heartbleed’. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.
You can download it from the following link: https://packetstormsecurity.com/files/download/126068/hb_honeypot.pl.txt
Source: https://packetstormsecurity.com/files/126068/Heartbleed-Honeypot-Script.html

