Dev Examples
Multi-protocol sandbox & fake infra
Public, non-production protocol playground

Hit "fake" protocols. Fake infrastructure. No stakes.

This host exposes a broad set of common services (databases, message queues, web stacks, auth, file shares, ICS-ish things, and more) Perfect for testing client libraries, connection handling and error paths. It exists because I didn't find a single public place to test your new network app, using realistic-but-fake network surface.

Postgres playground / MySQL / MSSQL / Mongo / Redis RabbitMQ (AMQP) & MQTT SMTP / IMAP / POP3 FTP / SMB / NFS DNS / LDAP / SSH / Telnet

Powered by the open-source FaPro project, huge thanks to the FoFaPro team for making this kind of protocol zoo possible.

Key endpoints Public Demo creds
Postgres exampledomain.org:5432
MySQL exampledomain.org:3306
MongoDB exampledomain.org:27017
Redis exampledomain.org:6379
RabbitMQ exampledomain.org:5672
MQTT exampledomain.org:1883
HTTP exampledomain.org:80
SMB exampledomain.org:445
Expect resets Expect weird data

Databases Postgres / MySQL / MSSQL / MongoDB / Redis / Cassandra / Memcached

A cluster of fake-ish database endpoints to test drivers and connection logic. Contents are non-sensitive and may reset or change at any time. Use the creds shown below. Behavior is intentionally simple: focusing on connection patterns, auth, and basic queries.

  • PostgreSQL playground: exampledomain.org:5432 (db exampledb, user playground, pass playgroundpass)
    Run SELECT init_session(); once per connection, then query tables like customers.
  • MySQL: exampledomain.org:3306 (user example, pass example, db shop)
  • Microsoft SQL Server: exampledomain.org:1433 (user example, pass example)
  • MongoDB: exampledomain.org:27017 (db playground, user playground, pass playgroundpass, authSource admin)
  • Redis: exampledomain.org:6379 (no auth)
  • Cassandra Thrift: exampledomain.org:9160
  • Memcached: exampledomain.org:11211
# PostgreSQL playground (psql)
# Database: exampledb
# User:     playground
# Password: playgroundpass

psql -h exampledomain.org -p 5432 -U playground -d exampledb

-- Inside psql, start a fresh session sandbox:
SELECT init_session();

-- Now interact with the session-local copy of customers:
SELECT * FROM customers LIMIT 10;

Message queues, MQTT & Ethereum JSON-RPC RabbitMQ / MQTT / Ethereum

A few endpoints for exercising messaging patterns and JSON-RPC: RabbitMQ (AMQP), MQTT broker, and an Ethereum JSON-RPC endpoint. These are suitable for connection tests, basic publish/consume flows, and handling failures.

  • RabbitMQ (AMQP): exampledomain.org:5672 (user example, pass example)
  • MQTT: exampledomain.org:1883 (no auth in this demo)
  • Ethereum JSON-RPC: http://exampledomain.org:8545
# pip install pika
import pika

creds = pika.PlainCredentials("example", "example")
params = pika.ConnectionParameters("exampledomain.org", 5672, "/", creds)
conn = pika.BlockingConnection(params)
chan = conn.channel()

chan.queue_declare(queue="demo")
chan.basic_publish(exchange="", routing_key="demo", body=b"hello from python")

print("Published message")
conn.close()

HTTP, Elasticsearch & echo HTTP / Elasticsearch / TCP/UDP echo / WebLogic

Basic HTTP endpoints and search-API style targets: a generic HTTP server, Elasticsearch-style endpoint, WebLogic port and raw TCP/UDP echo services for low-level socket testing.

  • HTTP: exampledomain.org:80
  • Elasticsearch: exampledomain.org:9200
  • WebLogic: exampledomain.org:7001
  • TCP echo: exampledomain.org:1234
  • UDP echo: exampledomain.org:1234/udp
# Simple HTTP GET
curl -v http://exampledomain.org:80/

# You should get 301 Moved Permanently (nginx/1.29.3)

Mail & directory services SMTP / IMAP / POP3 / LDAP / DNS / SNMP

Classic infra components to talk to from your clients: SMTP, IMAP, POP3 mail endpoints, LDAP directory, DNS server, and SNMP. All are safe for dev use and may return canned or minimal responses.

  • SMTP: exampledomain.org:25 (user example, pass example, banner Postfix)
  • IMAP: exampledomain.org:143 (users example:example, guest:guest)
  • POP3: exampledomain.org:110 (users example:example, guest:guest)
  • LDAP: exampledomain.org:389 (Active Directory-style rootDSE)
  • DNS: exampledomain.org:53/udp
  • SNMP: exampledomain.org:161/udp (community example)
# Standard library only
import smtplib
from email.message import EmailMessage

msg = EmailMessage()
msg["From"] = "example@exampledomain.org"
msg["To"] = "demo@exampledomain.org"
msg["Subject"] = "Sandbox SMTP test"
msg.set_content("Hello from the dev examples SMTP sandbox.")

with smtplib.SMTP("exampledomain.org", 25, timeout=5) as s:
    s.login("example", "example")
    s.send_message(msg)
    print("Sent message")

File transfer & remote access FTP / SMB / NFS / SSH / Telnet / RDP / VNC / SOCKS5

Endpoints for testing legacy and modern remote access: FTP, SMB share, NFS export, SSH, Telnet, RDP, VNC and a simple SOCKS5 proxy. Use them to see how your code handles banners, prompts, and session lifecycles.

  • FTP: exampledomain.org:21 (user example, pass example)
  • SMB: exampledomain.org:445 (user example, pass example, shares admin, public)
  • NFS: exampledomain.org:2049 (export path depends on config)
  • SSH: exampledomain.org:24 (user example, pass example)
  • Telnet: exampledomain.org:23 (password example)
  • RDP: exampledomain.org:3389
  • VNC: exampledomain.org:5900 (password example)
  • SOCKS5: exampledomain.org:1080 (user example, pass example)
# FTP
ftp exampledomain.org 21
# login: example / example

# or with curl
curl ftp://exampledomain.org/ --user example:example

Other protocols & ICS-ish endpoints DNS / BACnet / Modbus / DNP3 / S7 / ONVIF / SIP / more

A grab-bag of extra protocols, many industrial / OT or discovery-style: BACnet, Modbus, DNP3, Siemens S7, ONVIF, SIP, RMI, IKE, SSDP, Winbox, and more. These are ideal for scanners, protocol fingerprinting, and tooling experiments.

Protocol Handler Port Notes
DNS dns 53/udp Basic DNS server
BACnet bacnet 47808/udp Building automation demo device
Modbus modbus 502/tcp Modbus TCP device info test
DNP3 dnp3 20000/tcp Substation / SCADA style endpoint
Siemens S7 s7 102/tcp PLC-style service for S7 clients
IEC 60870-5-104 iec104 2404/tcp IEC104 SCADA link
GE-SRTP ge-srtp 18245/tcp GE PLC protocol
Omron omron 9600/tcp CP1L mode device
PC Worx pcworx 1962/tcp Phoenix Contact PLC
Red Lion Crimson3 redlion-crimson3 789/tcp HMI / gateway device
ONVIF discovery onvif 3702/udp IP camera discovery
RTSP rtsp 554/tcp Streaming control endpoint
SIP sip 5060/udp VoIP signalling
SSDP / UPnP ssdp 1900/udp UPnP/SSDP discovery
Winbox winbox 8291/tcp MikroTik management interface
IKE ike 500/udp VPN negotiation
L2TP l2tp 1701/udp VPN tunnel endpoint
PPTP pptp 1723/tcp Legacy VPN protocol
Java RMI java-rmi 1099/tcp RMI registry for testing clients
Memcached memcache 11211/tcp ASCII Memcached protocol
MongoDB mongodb 27017/tcp Mongo wire protocol
Redis redis 6379/tcp RESP protocol
AMQP amqp 5672/tcp RabbitMQ server banner
NTP ntp 123/udp NTP test
ICAP icap 1344/tcp ICAP service banner
DHT dht 6881/udp BitTorrent DHT-style behavior
NetBIOS netbios 137/udp NetBIOS name service banner
Portmap / RPCbind portmap 111/tcp,udp RPC program mapper
RDP rdp 3389/tcp RDP handshake / banner
WeMo / UPnP wemo 49152/tcp UPnP style endpoint