XMRPot is a Monero honeypot tool designed to simulate a Monero node and capture raw transaction details and source IP addresses from clients interacting with it. This is intended for research and monitoring purposes to better understand how Monero nodes are being accessed or misused.
- Simulates a functioning Monero node to attract traffic.
- Logs inbound requests and transactions.
- Extracts IP addresses and raw transaction data.
- Offers a simple monitoring dashboard and statistical overview.
git clone https://github.com/covertsecurity/xmrpot.git
cd xmrpot
python3 xmrpot.py
This screen shows the setup of the initial wallet environment to simulate node behavior and attract incoming transactions.
Displays the current configuration settings of the simulated node, including exposed ports and operational parameters.
A transaction has been sent to the honeypot node, demonstrating how malicious or unaware clients interact with it.
Captured transaction data is being monitored in real time, including metadata like size and source IP.
A visual dashboard summarizing recent node activity, transaction logs, and inbound connection attempts.
A breakdown of usage patterns, number of transactions, and source IP distribution over time.
xmrpot.py
— Main honeypot implementation script.request_log.json
— Stores logged incoming request data.img/
— Contains screenshots and illustrations.LICENSE
— Project license.README.md
— This documentation file.