- Home
- Security Operations
- Honeypots & Deception
- MongoDB-HoneyProxy
MongoDB-HoneyProxy
A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.

MongoDB-HoneyProxy
A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
MongoDB-HoneyProxy Description
MongoDB-HoneyProxy is a logging proxy tool created in response to the 'MongoDB Apocalypse'. Pre-requisites: sudo apt-get install nodejs npm gcc g++. You'll also need to install MongoDB for this to function. Setup: Create a MongoDB database, generate dummy data with JSON Generator, and install the project by cloning the repository and running npm install. To run the project, use node index.js. Docker version: Build a Docker image with 'docker build --tag="changeme" .', then run it with 'docker run -d -p 27017:27017 --name="changeme" changeme'. To access the container, use 'docker exec -it changeme bash'.
MongoDB-HoneyProxy FAQ
Common questions about MongoDB-HoneyProxy including features, pricing, alternatives, and user reviews.
MongoDB-HoneyProxy is A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.. It is a Security Operations solution designed to help security teams with Docker, Proxy, Nodejs.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox