Server data from the Official MCP Registry
Query 90 days of honeypot probe data: IP reputation, scanners, CVE probing, TLS/SSH fingerprints.
Query 90 days of honeypot probe data: IP reputation, scanners, CVE probing, TLS/SSH fingerprints.
Remote endpoints: streamable-http: https://mcp.honeylabs.net/mcp
Valid MCP server (1 strong, 1 medium validity signals). No known CVEs in dependencies. Imported from the Official MCP Registry.
Endpoint verified · Requires authentication · 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Remote Plugin
No local installation needed. Your AI client connects to the remote endpoint directly.
Add this to your MCP configuration to connect:
{
"mcpServers": {
"net-honeylabs-mcp": {
"url": "https://mcp.honeylabs.net/mcp"
}
}
}From the project's GitHub README.
Honeypot threat intelligence as MCP tools. Query 90 days of probe data from our honeypot sensor network — IP reputation, scanner classification, CVE probing trends, TLS/SSH/JA4 fingerprints, attack timelines — straight from Claude, Cursor, Gemini, Cline, or any other Model Context Protocol client.
claude mcp add honeylabs \
--transport http \
https://mcp.honeylabs.net/mcp \
--header "Authorization: Bearer <your-key>"
Get a key at https://honeylabs.net/dashboard (magic-link sign-in, no password).
Add to your MCP config:
{
"mcpServers": {
"honeylabs": {
"url": "https://mcp.honeylabs.net/mcp",
"headers": {
"Authorization": "Bearer <your-key>"
}
}
}
}
Same JSON config as Claude Desktop / Cursor. Install via the MCP Marketplace listing or paste the config block above into your settings.
gemini /mcp add honeylabs https://mcp.honeylabs.net/mcp
gemini /mcp auth honeylabs # OAuth flow, no static key
OAuth 2.1 with PKCE + DCR is supported at /oauth/authorize. Any MCP
client that speaks standard OAuth (Gemini, MCP Inspector, Smithery,
Cline's OAuth flow) works out of the box.
| Tool | What it answers |
|---|---|
ioc_lookup | Is this IP / domain known to be probing? When was it last seen? What ports / paths does it hit? |
top_attackers | Ranked leaderboard of source IPs, ASNs, countries, ports, or user-agents over a time window. |
search_events | Raw honeypot events matching filters (IP, ASN, country, dest_port, protocol, http_method). |
attack_timeline | Hourly / daily attack volume over a window, with protocol / country / port filters. |
asn_enrich | Full profile for an ASN: total events, unique IPs, top ports, source countries, user-agents, org name. |
fingerprint_search | Search by TLS JA4 / HTTP JA4H / SSH HASSH fingerprint — find shared infrastructure. |
payload_search | Full-text URL-path + user-agent search across attack traffic. Pro tier. |
Each row in a response counts as one credit. Free tier gets 500 credits/day, Pro gets 50,000, Team gets 500,000. See https://honeylabs.net/docs#plans for the full breakdown.
HoneyLabs runs a fleet of honeypots that get probed by the public
internet all day. Every probe — every connection, every TLS
handshake, every HTTP request — is logged with the source IP, ASN,
geo, TLS/HTTP/SSH fingerprints, and full URL path. We retain the
last 90 days and expose it through this MCP server, a JSON API, a
public lookup web UI at /lookup/<ip>, and CSV / STIX exports.
What it is not: a CVSS database, a reputation feed copied from elsewhere, or generic threat indicators. It's our own ground-truth observations of what's actively scanning the internet right now.
Things to ask Claude / Cursor / Gemini once HoneyLabs is wired in:
More worked examples at https://honeylabs.net/mcp.
The honeypot fleet itself (Spip-Go) and the enrichment pipeline (Loom) are public. This repo (the MCP / API surface) is closed.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.