Visibility of real attacks
Observe automated recon, credential spraying, and API abuse as it happens - against endpoints attackers believe are real.
API Deception Platform · Self-Hosted
NoctisAPI deploys honeypot API endpoints that capture attacker activity, fingerprint threat actors, and generate actionable telemetry - fully self-hosted on your own infrastructure.
Built for security teams, researchers, and corporate environments.
Product definition
// What it IS
// What it is NOT
Value
Observe automated recon, credential spraying, and API abuse as it happens - against endpoints attackers believe are real.
Collect attacker tools, techniques, and reconnaissance patterns. Build actor profiles from real hostile sessions.
Generate structured event data ready for SIEM ingestion, threat intelligence workflows, and security research.
Run entirely on infrastructure you control. No data leaves your environment. Suitable for regulated and corporate contexts.
Architecture
Internet / Attackers
Automated tools · Scanners · Threat actorsDedicated Domain
api.yourdomain.com · DNS pointing to your deploymentProxy / CDN Layer
Cloudflare (proxied or DNS-only) · F5 · Nginx · Reverse proxyHoneypot Engine
Decoy endpoints · Capture engine · Actor fingerprinting · Event pipelineUI · Storage · Licensing
Management dashboard · Event storage · JWT license validationUse cases
Publish decoy API endpoints on a dedicated domain and capture real hostile traffic without exposing production systems.
Study real threat actor behaviour, tooling, and reconnaissance patterns against realistic API surfaces.
Validate and tune SIEM detections and alerting rules using real attacker-generated events from controlled honeypots.
Deploy in isolated lab environments to train SOC analysts against realistic attack scenarios and telemetry.
Deploy internally and publish through F5 BIG-IP, Nginx, or any reverse proxy. Suitable for regulated corporate environments.
Generate structured IOC and TTP data from real attack sessions to feed threat intelligence programs.
Editions
Core
Free
No license required. Deploy and start capturing attacker signals immediately.
Pro
Offline JWT license - cryptographically signed. No connection to license servers required. License file delivered to your email after purchase.
Deployment
Deploy on any public VPS with Docker. Point a dedicated domain at the server IP. Suitable for internet-facing honeypot research.
Run on an internal machine and publish through F5 BIG-IP, Nginx, or any reverse proxy. Recommended for corporate environments.
Compatible with Cloudflare in both proxied mode and DNS-only mode. Use proxied for DDoS protection or DNS-only for direct exposure.
Deploy via Docker container. All components - API engine, UI, and storage - run in a single controlled environment.
The service is typically deployed on a dedicated domain used exclusively for honeypot endpoints. This domain should not share DNS with production services.
Interface
// Actor overview · Risk scores · Active campaigns · API health status
// Real-time actor list · Stage progression · Risk scores · Signal tags
// Decoy endpoint setup · Custom responses · Environment config
// Campaign clustering · Score breakdown · Stage flow · Actor grouping
Quickstart
Resources
FAQ
Core is free and requires no license. It provides decoy endpoints, actor dashboard, scoring, environment config, and health monitoring. Pro adds advanced investigation features - replay timelines, cases, campaign correlation, file pipeline, and custom API responses - enabled via an offline JWT license.
Yes. NoctisAPI runs entirely on infrastructure you control. No data is transmitted to external servers. All event capture, storage, and the management panel operate locally.
Yes. NoctisAPI works behind any reverse proxy or CDN, both in proxied mode and DNS-only mode. It is compatible with standard corporate network architectures.
Yes. Inbound internet access is required so that attackers and scanners can reach the honeypot endpoints through your dedicated domain. Outbound internet access from the server is not required - the service does not phone home or connect to external license servers.
Pro uses offline JWT licensing. Your license is a cryptographically signed JSON Web Token validated locally by the application. There is no connection to a license server - validation happens entirely on your machine using the embedded cryptographic signature.
If a Pro license is revoked, the application falls back to Core functionality. Since validation is local, suspension takes effect at the next validation cycle without requiring connectivity. You retain full access to Core features indefinitely.
NoctisAPI is designed for low resource consumption. A small VPS (1-2 vCPU, 1-2 GB RAM) is sufficient for most deployments. A dedicated domain pointing to your server is required. Docker must be available. No specific network egress rules are needed.
Yes, as long as telemetry is collected on assets you own or are authorised to monitor, and local regulations are respected. NoctisAPI is designed for authorised defensive use only.
Early Access
We are onboarding a limited number of security teams for early validation of Pro capabilities.
Core
Free
Deploy immediately. No license required. Ideal to start observing real attacker signals against your decoy endpoints.
Early Access Cohort
Pro capabilities during validation: Cases, Campaigns, Advanced Scoring, File Pipeline, Custom API Response, and offline JWT licensing. License file delivered to your email after purchase.
Get started
Start with Core for free or request Pro access for advanced investigation capabilities.
// Pro License
You will be redirected to Stripe's secure checkout page.