Skip to content

Commit 62b403a

Browse files
committed
feat: Active Defense — tar pits, honeypots, deception, abuse reporting
- New feature card on landing page: 'Fight back' with tar pits, honeypots, deception, auto abuse reports - Added to pricing: 'Active defense — tar pits, honeypots, deception' - Hero terminal: honeypot triggered + tar-pitted stats - TUI mock: 'Tar pit engaged — slowing attacker' - PRD: 4 new core modules (tar-pit, honeypot, deception, abuse-reporter)
1 parent dafa62f commit 62b403a

2 files changed

Lines changed: 13 additions & 2 deletions

File tree

PRD.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,10 @@ threatcrush license # Show license status
114114
| `dns-monitor` | Watches DNS queries and responses | DNS tunneling, DGA detection, suspicious resolutions |
115115
| `firewall-rules` | Dynamic firewall management | Auto-blocks IPs after threshold, manages iptables/nftables |
116116
| `alert-system` | Notification routing | Slack, Discord, email, webhook, PagerDuty, syslog |
117+
| `tar-pit` | Connection slowdown | Wastes attacker time/resources by throttling malicious connections |
118+
| `honeypot` | Decoy services | Fake SSH, FTP, admin panels that log everything attackers try |
119+
| `deception` | Fake data serving | Serves fake /etc/passwd, fake DB dumps, fake API keys to attackers |
120+
| `abuse-reporter` | Automated reporting | Files abuse reports to attacker's ISP/hosting via AbuseIPDB, Spamhaus |
117121

118122
### Community/Paid Modules (marketplace)
119123

src/app/page.tsx

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,11 @@ const features = [
3131
title: "Real-time Alerts",
3232
desc: "Email, SMS, Slack, Discord, and webhook notifications the instant a threat is detected. Push alerts to your phone. Never miss an attack.",
3333
},
34+
{
35+
icon: "💢",
36+
title: "Active Defense",
37+
desc: "Fight back. Tar pits slow attackers down, honeypots trap them, deception serves fake data, and auto-reports file abuse complaints to their ISP.",
38+
},
3439
{
3540
icon: "⚙️",
3641
title: "systemd Daemon",
@@ -80,6 +85,7 @@ const included = [
8085
"Network monitor — all ports, all protocols",
8186
"Real-time email + SMS alerts",
8287
"Webhook support for custom integrations",
88+
"Active defense — tar pits, honeypots, deception",
8389
"systemd daemon — runs 24/7",
8490
"Full CLI, desktop & mobile apps",
8591
"All core modules + future updates",
@@ -251,7 +257,8 @@ export default function Home() {
251257
<p><span className="text-tc-text-dim">[12:03:47]</span> <span className="text-red-400"></span> <span className="text-red-400">SSH brute force</span> <span className="text-tc-text-dim">— :22 91.232.105.3 → 47 failed attempts</span></p>
252258
<p><span className="text-tc-text-dim">[12:03:50]</span> <span className="text-yellow-400"></span> <span className="text-yellow-400">Port scan</span> <span className="text-tc-text-dim">— 45.33.32.156 scanning :21-:8080 (SYN flood)</span></p>
253259
<p><span className="text-tc-text-dim">[12:03:52]</span> <span className="text-yellow-400"></span> <span className="text-yellow-400">DNS tunneling</span> <span className="text-tc-text-dim">— :53 suspicious TXT queries from 103.44.8.2</span></p>
254-
<p><span className="text-tc-text-dim">[12:04:01]</span> <span className="text-tc-green"></span> <span className="text-tc-text-dim">3,891 connections analyzed · 4 threats · 1 blocked</span></p>
260+
<p><span className="text-tc-text-dim">[12:03:55]</span> <span className="text-tc-green"></span> <span className="text-tc-text-dim">Honeypot triggered — logging attacker recon on :2222</span></p>
261+
<p><span className="text-tc-text-dim">[12:04:01]</span> <span className="text-tc-green"></span> <span className="text-tc-text-dim">3,891 connections · 4 threats · 1 blocked · 2 tar-pitted</span></p>
255262
</div>
256263
</div>
257264
</ScrollReveal>
@@ -397,7 +404,7 @@ export default function Home() {
397404
{ time: '14:23:07', type: 'crit', icon: '✗', msg: 'SSH brute — :22 91.232.105.3 (47 fails)', color: 'text-red-400' },
398405
{ time: '14:23:09', type: 'warn', icon: '⚠', msg: 'Port scan — 45.33.32.156 :21-:8080', color: 'text-yellow-400' },
399406
{ time: '14:23:12', type: 'warn', icon: '⚠', msg: 'DNS tunnel — :53 TXT from 103.44.8.2', color: 'text-yellow-400' },
400-
{ time: '14:23:15', type: 'info', icon: '✓', msg: 'Blocked 91.232.105.3 via iptables', color: 'text-tc-green' },
407+
{ time: '14:23:15', type: 'info', icon: '✓', msg: 'Tar pit engaged — 91.232.105.3 (slowing)', color: 'text-tc-green' },
401408
{ time: '14:23:18', type: 'crit', icon: '✗', msg: 'XSS attempt — :443 /search?q=<script>', color: 'text-red-400' },
402409
{ time: '14:23:22', type: 'info', icon: '✓', msg: 'Rate limited 45.33.32.156 (50 req/s)', color: 'text-tc-green' },
403410
].map((e, i) => (

0 commit comments

Comments
 (0)