🍃

MongoDB Honeypot

Detect unauthorized access attempts targeting MongoDB document databases.

27017
Default Port
TCP
Protocol
Username
Detection
MongoDB tripwire details

About MongoDB

MongoDB is the most popular NoSQL document database, widely used for applications requiring flexible schemas and high scalability. Its prevalence in modern web applications makes MongoDB credentials valuable targets for attackers seeking customer data or application access.

What Gets Captured

When an attacker attempts to connect using your MongoDB honeypot credentials, Tripwires captures:

  • Username - The username in the authentication attempt
  • Source IP - The attacker's IP address
  • Timestamp - Exact time of the connection
  • Database name - The database they tried to access

Connection String Formats

Standard Connection URL

mongodb://user:password@mongo-xxx.gettripwires.com:27017/dbname

mongo Shell

mongo "mongodb://mongo-xxx.gettripwires.com:27017/dbname" -u user -p password

Node.js (mongoose)

const mongoose = require('mongoose');
mongoose.connect('mongodb://user:password@mongo-xxx.gettripwires.com:27017/dbname');

Python (pymongo)

from pymongo import MongoClient
client = MongoClient('mongodb://user:password@mongo-xxx.gettripwires.com:27017/dbname')

Strategic Placement Ideas

Application Configuration

Leave as "analytics database" credentials in config files.

Microservices Config

Add as "user-service database" in kubernetes secrets files.

Data Migration Scripts

Include in scripts that appear to migrate customer data.