Methodology & Architecture
honeypot.observer is a distributed honeypot network that captures real attacker behavior across multiple continents. Every claim on this site traces back to raw session data. Here's how it works.
// METHODOLOGY
Sensors run Beelzebub, an open-source honeypot framework. SSH services use LLM-generated responses (GPT-4.1 mini) to keep attackers engaged โ they think they're on a real server, run more commands, and we capture everything. HTTP services emulate AI infrastructure (Ollama, OpenAI, MCP gateways) to attract emerging attack patterns.
// PIPELINE
A custom Go exporter processes raw events in real time โ parsing authentication attempts, commands, HTTP requests, and payloads into structured sessions. Each session is mapped to MITRE ATT&CK techniques, assigned an intent label, and checked against known campaign fingerprints. An automated intelligence pipeline (Python + LLM agents) runs daily analysis, produces threat briefs, writes detection rules, and tracks campaigns.
// DATA ETHICS
Malicious IPs are automatically reported to AbuseIPDB with evidence from the session. We contribute back to the community that helps protect the rest of the internet.