A SSH honeypot java based it emulates a linux command line over ssh system that is set up to act as a decoy to lure cyberattackers, and logs attempts to gain unauthorized access to information. this includes: log of password attepts to create a password black list. log ip of attck to create a log create a ip black list allow the attacket to enter the system to log its behavier to provide thurder indormation on attacker