This PR implements honeypot detection functionality to identify and flag hosts that exhibit honeypot characteristics (unrealistic number of vulnerability matches).
Many hosts on Shodan and other search engines are configured as honeypots that match all vulnerability signatures to fool scanners. This creates noise in scan results and wastes time on false positives.
HoneypotDetector (pkg/protocols/common/honeypot/detector.go)
Integration (pkg/protocols/common/honeypot/integration.go)
honeypot, honeypot_score, honeypot_vuln_countCLI Flag (--honeypot-threshold, -ht)
{
"host": "example.com",
"template-id": "cve-2024-xxxx",
"honeypot": true,
"honeypot_score": 85,
"meta": {
"honeypot_detected": true,
"honeypot_score": 85,
"honeypot_vuln_count": 25
}
}
# Default threshold (10 vulns)
nuclei -u example.com
# Custom threshold
nuclei -u example.com --honeypot-threshold 15
# Only show non-honeypot results (filter externally)
nuclei -u example.com | jq select(.honeypot != true)
Fixes: #6403
/claim #6403
New Features
Tests
EthanHan
@EthanHan
ProjectDiscovery
@projectdiscovery