Nuclei Fingerprinting at Scale
Detecting Nuclei-style scanning through user-agent evidence, path selection, and request sequencing.
Scanner AnalysisCyber Intelligence Network
XCOM turns hostile traffic into structured intelligence. Honeypot sensors capture behavior, the event layer preserves it, AI agents analyze and correlate it, and operators review high-impact response.
XCOM is built for hostile internet telemetry. It is not just a honeypot and not just a dashboard. Sensors capture probes, the event layer preserves structure, agents add analysis and campaign logic, and the control plane keeps humans in command.
┌─────────────────────────┐
│ HOSTILE INTERNET │
│ ▼ ▼ ▼ ▼ ▼ ▼ ▼ │
├─────────────────────────┤
│ admin.xcom.dev │
│ ┌───┐ ┌───┐ ┌───┐ │
│ │ H │ │ H │ │ H │ │
│ └─┬─┘ └─┬─┘ └─┬─┘ │
│ └───┬──┘────┘ │
│ ▼ │
│ ┌──────────────┐ │
│ │ EVENT BUS │ │
│ └──────┬───────┘ │
│ ┌────┴────┐ │
│ ▼ ▼ │
│ ┌──────┐ ┌──────────┐ │
│ │AGENTS│ │DASHBOARD │ │
│ └──────┘ └──────────┘ │
├─────────────────────────┤
│ STATUS: ██ ACTIVE │
│ FLOW: TYPED EVENTS │
└─────────────────────────┘
XCOM runs as four hard-boundary layers. Sensors collect. Transport preserves. Agents interpret. Operators approve. That separation keeps the system easier to audit, scale, and defend.
Deceptive infrastructure that captures hostile requests, bait access, login attempts, and canary interaction. Traffic is logged, fingerprinted, and scored as structured telemetry.
Typed event movement between layers. Every event carries source, timestamp, severity, and machine-readable metadata so downstream analysis stays reproducible.
Agents analyze, enrich, correlate, and discuss events. They identify scanner families, cluster related behavior into campaigns, and propose response actions without replacing human judgment.
Operators review live activity, inspect agent output, approve actions, and preserve auditability. The dashboard is a control surface, not the source of truth.
XCOM agents are narrow, auditable event processors. They read typed events, add context or analysis, and emit new events back into the network. This makes detection logic modular, explainable, and easy to extend.
Detect scanner families, cluster hostile requests, identify reconnaissance patterns, and turn noisy traffic into usable security signals.
Add context to events: IP reputation, ASN profiling, geolocation, tool hints, and vulnerability relevance for targeted probing.
Propose alerts, exports, and operator-reviewed response steps based on severity, confidence, and campaign context.
Track repeated attacker behavior over time, refine signatures, and improve campaign correlation across sensors and sessions.
A sanitized public stream of detections and agent output. Built to show system behavior without exposing internal infrastructure, secrets, or operator-only data.
XCOM is designed around structured events, narrow agent roles, operator review, and traceable processing boundaries. The system favors explainable detection over black-box theater.
Every signal carries source, severity, timestamp, and structured context for consistent downstream analysis.
High-impact actions are reviewed by operators instead of being blindly executed by automation.
Events, discussions, and actions are preserved as traceable system history rather than ephemeral noise.
Publish and query typed events with structured fields for source, severity, correlation, and payload data.
Build custom agents in Python with a simple event-in, event-out model for analysis, enrichment, and response logic.
Integrate feeds, events, and interfaces into browser or Node.js workflows with lightweight client logic.
Retrieve event history quickly by time, type, source, and campaign relationship with audit-friendly persistence.
Detecting Nuclei-style scanning through user-agent evidence, path selection, and request sequencing.
Scanner AnalysisGrouping multi-request hostile behavior into campaigns using scoring, repetition, and path diversity.
Campaign IntelUsing planted credentials and bait artifacts to raise confidence when an attacker moves beyond generic probing.
Canary SystemsXCOM grows through sensors, agents, and detection logic. Extend the network, build custom analysis, or connect its event stream to your own security workflows.