The Operational Brain of the Honey-Ecosystem
π¬π§ English β’ π©πͺ Deutsch β’ π©πͺ Einfache Sprache β’ πΊπ¦ Π£ΠΊΡΠ°ΡΠ½ΡΡΠΊΠ°
Note
Honey Cloud Intelligence (honey-api) is the centralized backend of the Honey-Ecosystem. It aggregates real-time attack data from distributed sensors (honey-scan), fuses it with global OSINT feeds, and exposes a high-performance Threat Intelligence API.
The Honey-Ecosystem consists of two primary components:
honey-scan(The Sensor): Runs on edge nodes (honeypots), detects attacks, and pushes raw logs to the API.honey-api(The Brain): This repository. It receives data, manages whitelists/blacklists, and serves reputation queries.
graph LR
subgraph Edge Nodes
A[honey-scan / HFish] -- POST /webhook --> B
A2[honey-scan / HFish] -- POST /webhook --> B
end
subgraph Core Cloud
B(Honey-API)
B -- Store --> C[(Redis Memory)]
D[OSINT Feeds] -- Fetch Loop --> B
end
subgraph Security Tools
E[Firewalls / SOAR] -- GET /v3/reputation --> B
end
style B fill:#7B2CBF,stroke:#333,stroke-width:2px,color:#fff
style C fill:#DC382D,stroke:#333,stroke-width:2px,color:#fff
| Feature category | Description |
|---|---|
| Central Aggregation | Acts as the hub for all honey-scan nodes, creating a unified intelligence database. |
| High Performance | Powered by FastAPI and Redis for sub-millisecond response times. |
| API Emulation | Fully compatible with the ThreatBook v3 API standard for easy integration. |
| Intelligent Filtering | Supports exact IP matches and CIDR ranges. Automatically purges old entries. |
| Advanced Logging | Structural logging with color-coded ANSI tags ([SYSTEM], [CLEAN:DB]) for ops visibility. |
| Robust Monitoring | Resilient socket-level checks and /health endpoints for orchestration. |
The bridge accepts data from honey-scan or HFish nodes via a webhook.
- Endpoint:
POST /webhook - Auth: IP-based whitelist (optional configuration via upstream proxy recommended)
- ContentType:
application/json
Expected Payload:
{
"attack_ip": "1.2.3.4"
}Security tools query this endpoint to check if an IP is malicious. It formats data to match the ThreatBook v3 standard.
- Endpoint:
GET /v3/scene/ip_reputation - Auth: Required (
apikeyquery parameter)
Request:
GET /v3/scene/ip_reputation?apikey=YOUR_KEY&resource=192.168.1.5
Response:
{
"code": 0,
"data": {
"192.168.1.5": {
"severity": "high",
"judgments": ["hfish honeypot"],
"update_time": "2026-01-13 09:00:00"
}
},
"message": "success"
}To connect a honey-scan node (or any HFish instance) to this API:
- Deploy Honey-API: Ensure this container is running and accessible (e.g.,
http://10.0.0.5:8080). - Configure Sensor: In your
honey-scanor HFish configuration, set the Webhook URL:(Note: Ensure network connectivity between the sensor and the API container/host).# Example HFish / honey-scan configuration WEBHOOK_URL="http://10.0.0.5:8080/api/v1/webhook"
Click to view Installation Steps
-
Clone the repository:
git clone https://github.com/lemueIO/honey-api.git cd honey-api -
Start services with Docker Compose:
docker compose up -d --build
-
Access the Dashboard:
- URL:
http://localhost:8080/login - Default Admin Password:
admin(Change immediately indocker-compose.yml!)
- URL:
| Component | Technology |
|---|---|
| Backend | |
| Database | |
| Frontend | |
| Deployment |
Maintained by the Honey-Scan Community and lemueIO β€οΈ