Honeypot active

The sweetest
trap on the
internet.

Research-grade honeypot infrastructure for observing agentic attacks against MCP servers. Every probe logged. Every tool call traced. Zero mercy.

24/7
Active monitoring
<15s
Scrape interval
100%
Calls traced
honeypot.vip
Capabilities
Every attack surface is a data source

Dual-layer instrumentation captures everything from protocol transport events to individual tool handler invocations. Nothing escapes observation.

🕸

Protocol-layer tracing

Full MCP transport instrumentation. Every message, handshake, and session lifecycle event captured with OpenTelemetry spans.

🎭

Mimic success

Fake tool responses that look authentic. Attackers think they succeeded. We know exactly what they tried and how.

🏷

Aggressive tagging

Agent fingerprint, tool name, parameter patterns, anomaly flags. Every span gets the full attack taxonomy treatment.

📡

Real-time dashboards

Prometheus scrape ≤15s. Grafana auto-refresh at 10s. Live metrics with alerting rules from the first probe attempt.

🔬

Distributed tracing

Full trace propagation through Jaeger. Reconstruct any attack session end-to-end, correlate across tools and time.

📦

Deploy anywhere

Docker Compose for local dev. Helm chart for Kubernetes. One-command stand-up with zero infrastructure lock-in.

How it works
Three phases. Zero warnings given.

Deploy a convincing MCP server, observe every interaction in real time, and extract structured threat intelligence from each attack session.

01 — Lure

The trap is set

Fake MCP endpoints are exposed with realistic tool schemas. The honeypot presents as a fully operational server — tools that look real, respond real, and invite deep exploration.

MCP SDK · SSE transport
02 — Catch

Every move observed

Dual-layer OTel instrumentation captures the full interaction — protocol events, tool invocations, parameter shapes, timing, session IDs, and anomaly signals.

OpenTelemetry · Jaeger
03 — Analyse

Intelligence extracted

Prometheus aggregates attack patterns in real-time. Grafana surfaces the taxonomy. Every attacker session becomes a labelled, queryable data point.

Prometheus · Grafana
Stack
Built on boring, proven infrastructure
Python 3.12 MCP SDK OpenTelemetry OTel Collector Prometheus Jaeger Grafana Docker Compose Helm / K8s GitHub Actions

Ready to set
the trap?

docker compose up — that's it.