Loading HoneyMesh...
Loading HoneyMesh...
About HoneyMesh
We are a small team of sysadmins, homelabbers, and developers who got tired of watching the same internet noise hit every public system we ran.
SSH probes. Redis scans. Random HTTP paths. Credential stuffing. Most tools either buried the signal in logs or asked us to move more of our security workflow into someone else's cloud.
HoneyMesh is our answer: a practical way to see hostile behavior early, block repeat abuse, and share trusted signals with systems you actually control.

Built by
Chief Nerd
Steven "Mando" McCann is the builder behind Network Decode, focused on practical Linux defense tools that stay local-first, understandable, and useful when things get noisy.
The goal is simple: give operators something clear enough to trust, direct enough to act on, and lightweight enough to run where the real work happens.
Our principles
We would rather ship something clear and dependable than something that looks impressive but makes incident response harder.
What HoneyMesh does
HoneyMesh presents realistic service traps, watches how attackers interact, and applies local blocks before the same traffic keeps hitting your applications.
When you choose to use trusted mesh sharing, one system can help protect the others. A signal learned on one node can become a preemptive block somewhere else.
The point is not to replace every enterprise platform. It is to give operators a clear, useful tool for exposed Linux infrastructure.
Talk to us
If something feels off, missing, or too complicated, we want to hear it. The product gets better when real operators tell us what happens in real environments.