Honeypot — for research Any interaction with this module logs attacker metadata (IP hash, UA hash, request path, payload preview) to the public Sniper honeypot feed. This module does NOT process real payments and does NOT capture user funds. It is a decoy designed to surface scanning bots, scraper rings, and exploitation attempts against MeterCall modules. Threat intel published at /v1/sniper/honeypot/stats.

Stripe Bait

A decoy module instrumented for MeterCall Sniper research. Looks like a Stripe replacement. Is not.

Fake "process payment" endpoint

Real scanners hit this URL. We log their fingerprint and publish aggregate counts to /v1/sniper/honeypot/stats.

POST /built/honeypot-stripe-bait/charge

What we log

IP hash (SHA-256, first 12 chars), user-agent hash, request path, first 200 bytes of payload. No cleartext IPs. No personal data. Published in aggregate only.