Honeypot — for research
Any interaction with this module logs attacker metadata (IP hash, UA hash, request path, payload preview) to the public Sniper honeypot feed. This module does NOT process real payments and does NOT capture user funds. It is a decoy designed to surface scanning bots, scraper rings, and exploitation attempts against MeterCall modules. Threat intel published at /v1/sniper/honeypot/stats.
Stripe Bait
A decoy module instrumented for MeterCall Sniper research. Looks like a Stripe replacement. Is not.
Fake "process payment" endpoint
Real scanners hit this URL. We log their fingerprint and publish aggregate counts to /v1/sniper/honeypot/stats.
POST /built/honeypot-stripe-bait/charge
What we log
IP hash (SHA-256, first 12 chars), user-agent hash, request path, first 200 bytes of payload. No cleartext IPs. No personal data. Published in aggregate only.