STINGAR Documentation

STINGAR helps organisations protect their computer networks from malicious attacks by providing a convenient way to deploy and manage honeypots. For general information, please see the STINGAR website.

STINGAR provides a way for you to:

  • Identify linux servers that will host your honeypots.
  • Configure & deploy honeypots to these linux servers.
  • Manage your honeypots.
  • View all attack events and filter them using various criteria.

The user interface is divided into five sections:

  1. Manage Hosts - Identify and configure servers that host your honeypots.
  2. Manage Honeypots - View a list of your honeypots and manage their availability.
  3. Deploy Honeypots - Identify, configure & deploy honeypots to specific hosts.
  4. Attack Analysis - View summary & detailed information about honeypot events.
  5. Settings - Manage information needed to support the system such as user accounts and deployment tags.

STINGAR installation instructions are available at this site.

If you've installed STINGAR & now want to setup you first host to deploy a honeypot, the Getting Started section is a good place to start.