Home » About


At Duke, STINGAR has helped to increase the security team’s blocking capabilities from 10 million malicious connection attempts per day to 2 billion per day at the height of the Mirai botnet. The honeypot portion of STINGAR accounts for a significant chunk of these blocks and also has increased the fidelity of what we block, reducing  false positives.

We believe that honeypots provide an excellent source of local threat data with a high signal-to-noise ratio.

We would love for other universities and research organizations to join the STINGAR community. We’re looking for:

  • Feedback on options for integrating STINGAR data with your current network blocking infrastructure
  • Interest and willingness to  sharing your honeypot data back to a larger community
Email the STINGAR team (info@forewarned.io) for more information or to receive an invite to the Slack channel.

Join private STINGAR mailing list

Interested parties are encouraged to interact with the team via the slack channel : stingar.slack.com or join the email list.

Institutions can email info@forewarned.io to be added to the private STINGAR mailing list and Slack workspace.

Please include information about your organization’s interest in the STINGAR project in your request.