Caught in the Jar
A fake Minecraft server running on port 25565 that logs and reports IPs that scan for Minecraft servers.
What It Is
MCHoneypot mimics a real Minecraft server to detect and log automated scanners and bots probing port 25565.
When a scanner connects, the honeypot responds with a valid Minecraft status packet — version, MOTD, and a fake player list — so it looks like a real server. The connecting IP is looked up for country and ISP info, written to local log files, and optionally reported to AbuseIPDB and alerted via Discord webhook.
If the scanner proceeds to send a login packet, the username is captured and the connection is kicked with a configurable message. No real Minecraft session is ever established.
AbuseIPDB Contributor
Scanning IPs are automatically reported to AbuseIPDB under category 14 (Port Scan).
report_ttl setting to avoid submitting the same IP multiple times within a short window.
How It Works
report_ttl.max_pings threshold within the configured time window.Configuration
All settings are controlled via config.json. No code changes needed.
0.0.0.0:25565.time_window before further connections are dropped.true to enable automatic AbuseIPDB reporting.true to send Discord alerts on hits and login attempts."response": {
"version": { "name": "1.21.11", "protocol": 774 },
"players": { "max": 20, "online": 4, "sample": [...] },
"description": { "text": "we love honey ;)" },
"favicon": "data:image/png;base64,..."
}
The online player count is randomised ±1 on each response and the player sample list is shuffled.
"kick_message": {
"text": "minescan.xyz honeypot caught your scanner ;)",
"color": "yellow"
}
Log Files
Two files are written to the directory set by logs_directory.
[2025-01-14 03:12:44] Ping from: `192.0.2.47:49823` Country: China ISP: Shenzhen Tencent Computer Systems Company Limited [2025-01-14 03:17:29] Login attempt from: scannerguy 203.0.113.88
Open Source & Usage
MCHoneypot is fully open-sourced. You can audit the code or contribute on GitHub.
pip install -r requirements.txt
python honeypot.py
sudo python honeypot.py or set up an iptables redirect.
Support & Opt-Out
For questions, support, or to request opt-out from honeypot reporting, join the Discord server: