A Splunk-based platform for deploying honeypots and analyzing attacker sessions with intelligence dashboards and threat feeds.
Tango is an open-source honeypot intelligence platform that automates the deployment of Cowrie honeypots and integrates them with Splunk for advanced security analysis. It collects attacker session data, provides detailed dashboards for behavior analysis, and generates threat feeds for proactive defense. The platform helps security teams visualize attacks, track malware downloads, and understand adversary tactics.
Security operations teams, threat intelligence analysts, and organizations deploying honeypots for network monitoring and attack research. It's particularly useful for those already using Splunk for security analytics.
Tango simplifies honeypot deployment and analysis by providing pre-built Splunk apps and automation scripts, reducing setup time. Its deep integration with Splunk offers powerful, customizable dashboards and threat feeds not found in standalone honeypot solutions.
Honeypot Intelligence with Splunk
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides scripts like sensor.sh and uf_only.sh for one-click installation of Cowrie honeypots and Splunk Universal Forwarder on Ubuntu and CentOS, reducing manual configuration effort.
Includes comprehensive Splunk dashboards for session playbacks, attacker profiling, and geographic mapping, as shown in screenshots like Attack Overview and Session Playlog.
Leverages VirusTotal API for SHA256 hash analysis and tracks file downloads, with dashboards for malware signatures and campaigns to identify threats.
Generates exportable feeds of IPs, URLs, domains, and file hashes in the Threat Feed section, enabling integration with other security tools like SIEMs.
The platform is tightly coupled with Splunk Enterprise for data analysis, adding licensing costs and complexity for teams not already invested in the Splunk ecosystem.
Relies on external services like ipv4.icanhazip.com for IP lookup and VirusTotal with a strict 4-request-per-minute limit, which can slow down malware analysis and introduce dependencies.
Installation requires multiple manual steps, such as configuring Splunk listeners, adding VirusTotal API keys, and installing dependencies like the requests library, as noted in the Server Installation section.