About
Distributed honeypot sensors capture real attacker behavior across multiple continents. Every session, command, and credential on this site is observed โ never simulated.
// HOW IT WORKS
Sensors run Beelzebub, an open-source honeypot framework. SSH services use LLM-powered interactive responses that convince attackers they have access to a real server โ sustaining sessions long enough to capture full attack chains. HTTP services emulate AI infrastructure (Ollama, OpenAI-compatible APIs, MCP endpoints) to catch the wave of attackers now scanning for exposed models and agent gateways.
// PIPELINE
A custom classification engine processes sensor events in real time โ commands, credentials, and payloads mapped to MITRE ATT&CK techniques. All classification is deterministic pattern matching. No ML.
// ENRICHMENT
Each session is enriched from multiple external sources before publication: