Reference table of all detection sources in WebDecoy.
Source Code Icon Description Decoy Link decoy_linkLink Hidden honeypot link was accessed Endpoint endpointAPI API honeypot received a request Detection Script bot_scannerRobot JavaScript scanner detected automation LLM Referral llm_referralLink Visitor arrived from an AI platform (ChatGPT, Perplexity, etc.) WordPress Plugin wordpress_pluginDocument WordPress plugin server-side detection SDK sdkTool Server-side SDK submitted detection
Detections from hidden honeypot URLs that legitimate users cannot see or access.
Field Example URL /admin/backup.zipMethod GET Trigger Action Log, Block, Poison, Redirect Click Count Incremented on each access
Bot crawling hidden links
Scanner probing common admin paths
Attacker following disallowed robots.txt paths
Usually mapped to:
TA0043 (Reconnaissance)
TA0001 (Initial Access)
Detections from fake API endpoints that capture detailed request information including POST bodies.
Field Example URL /api/v1/admin/usersMethod POST, PUT, DELETE, PATCH Body Captured request body Content-Type application/json Attack Signatures SQL injection, XSS, etc.
Field Description request_bodyCaptured POST/PUT body content body_sizeSize in bytes content_typeContent-Type header value has_auth_headerWhether Authorization header present attack_signaturesArray of detected attack patterns
API vulnerability scanning
SQL injection attempts
Authentication bypass attempts
Data exfiltration probing
Usually mapped to:
TA0001 (Initial Access) - for exploit attempts
TA0006 (Credential Access) - for auth attacks
TA0007 (Discovery) - for enumeration
Detections from the JavaScript-based scanner running in visitors’ browsers.
Field Example Detection Type Headless browser, WebDriver Bot Score 0-100 Signals Array of detected anomalies Browser Fingerprint Hash of browser characteristics
Field Description webdriver_detectedWebDriver API present headless_detectedRunning in headless mode automation_markersPuppeteer, Playwright traces fingerprint_hashBrowser fingerprint behavioral_scoreBehavior analysis score
Signal Indicates webdriverSelenium/WebDriver automation headless_chromeChrome running headless puppeteerPuppeteer automation playwrightPlaywright automation phantom_jsPhantomJS browser missing_pluginsNo browser plugins (headless indicator) canvas_anomalyUnusual canvas fingerprint webgl_anomalyGraphics rendering inconsistency chromedriver_cdcChromeDriver cdc_ properties detected selenium_evaluateSelenium evaluation artifacts selenium_unwrappedSelenium unwrapped objects firefox_driverFirefox WebDriver artifacts puppeteer_evalPuppeteer evaluation script markers cdp_script_injectionCDP Runtime.evaluate injection webdriver_getter_modifiedModified navigator.webdriver getter
These advanced signals detect stealth plugins and anti-fingerprinting tools:
Signal Indicates lie_tamperingStealth plugin detected (native functions modified) lie_modified_*Specific function with modified toString() lie_webdriver_getter_tamperedWebDriver getter property descriptor modified lie_webdriver_getter_modifiedWebDriver getter toString is not native lie_toString_tamperedFunction.prototype.toString modifiedlie_bind_tamperedFunction.prototype.bind modifiedlie_plugins_spoofednavigator.plugins object type mismatchlie_getOwnPropertyDescriptor_tamperedCore Object method modified lie_defineProperty_tamperedCore Object method modified lie_chrome_runtime_spoofedFake chrome.runtime in non-Chrome browser worker_mismatchMain thread/Web Worker navigator mismatch worker_mismatch_platformPlatform differs between main/worker worker_mismatch_userAgentUser agent differs between main/worker worker_mismatch_hardwareConcurrencyCPU cores differ between main/worker worker_mismatch_languageLanguage differs between main/worker canvas_pixel_noiseAnti-fingerprinting noise in canvas output canvas_text_metrics_anomalyText metrics inconsistent across fonts
Headless browser scraping
Automated testing tools on production
Bot networks using browser automation
Usually mapped to:
TA0043 (Reconnaissance) - for scraping
TA0009 (Collection) - for data theft
Detections from the WebDecoy WordPress plugin’s server-side analysis.
Field Example Detection Type Rate limit, honeypot field, user agent WordPress Hook comment_form, login, registration Plugin Version 1.3.x
Field Description hook_triggeredWhich WordPress hook caught this honeypot_filledHidden form field was filled rate_limitedRequest exceeded rate limit form_typecomment, login, registration woocommerce_contextCart, checkout, etc.
Context Description comment_formComment submission loginLogin attempt registrationUser registration checkoutWooCommerce checkout generalGeneral request analysis
Comment spam bots
Login brute force attacks
Registration spam
Card testing on WooCommerce
Usually mapped to:
TA0006 (Credential Access) - for login attacks
TA0001 (Initial Access) - for form exploits
Detections submitted programmatically via the Node.js or PHP SDK.
Field Example SDK Version 1.0.0 Framework Express, Next.js, etc. Custom Fields Developer-defined metadata
Field Description sdk_versionVersion of SDK used frameworkWeb framework (if applicable) custom_metadataDeveloper-added fields submission_timestampWhen SDK submitted
Custom server-side bot detection
Middleware-based protection
API gateway integration
Custom threat analysis
Depends on detection context. Typically:
TA0043 (Reconnaissance)
TA0001 (Initial Access)
Detections from the client-side detection script when a visitor arrives from an AI platform. These represent human visitors who clicked a link shared by an AI chatbot (e.g., ChatGPT, Perplexity, Claude).
Field Example Score 0 (always) Referrer https://chatgpt.com/c/abc123LLM Platform ChatGPT, Perplexity, Claude, etc. Page URL The landing page URL
Platform Domains ChatGPT chat.openai.com, chatgpt.comPerplexity perplexity.ai, www.perplexity.aiGoogle Gemini gemini.google.comClaude claude.aiDeepSeek deepseek.com, www.deepseek.com, chat.deepseek.comMicrosoft Copilot copilot.microsoft.comYou.com you.com, www.you.comPhind phind.com, www.phind.comKagi kagi.com, www.kagi.comMeta AI meta.ai, www.meta.aiGrok grok.com, www.grok.com
User asks ChatGPT a question, ChatGPT links to your site, user clicks the link
Perplexity search results include your page as a source
AI assistant recommends your product/service with a link
LLM referral detections are not threats . They have a score of 0 and are used for analytics purposes — understanding how AI platforms drive traffic to your site.
Source Server-Side Client-Side Body Capture Attack Signatures decoy_link Yes No No Basic endpoint Yes No Yes Full bot_scanner No Yes No Automation llm_referral No Yes No None wordpress_plugin Yes Yes Limited Full sdk Yes No Custom Custom
Go to Detections
Click Filters
Select Source filter
Check desired sources
GET /api/organizations/{org_id}/detections?source=endpoint
Multiple sources:
GET /api/organizations/{org_id}/detections?source=endpoint,bot_scanner