Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,717 unique cyber attackers who, collectively, were responsible for 17,639 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
Canada flag
66.132.186.107CanadaOntarioEtobicokeAptum Technologies7547, 1099, 8020, 554, 1234, 10258, 9300, 8545, 8159, 1801... (8 more)
System monitoring reveals a focused approach on a handful of ports, such as 7547, 1099, 8020. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.27United KingdomEnglandLondonGoogle LLC42, 8032, 52000, 23909, 28083, 5462, 49203, 45005, 9368, 9575... (2252 more)
Network inspection reveals a focused approach on a handful of ports, such as 42, 8032, 52000. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.20United StatesCaliforniaSanta ClaraPalo Alto Networks Inc13, 5678, 8887, 1433, 3306, 8883, 53631, 52869, 44344, 28016... (297 more)
System analysis reveals a focused approach targeting MySQL, and others. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
158.94.187.172United KingdomEnglandLondonMiddlesex University8096
Digital footprint reveals a focused attack on port 8096.
United States flag
147.185.132.13United StatesCaliforniaSanta ClaraPalo Alto Networks Inc389, 6667, 16010, 888, 2380, 1194, 10004, 23856, 9200, 81... (272 more)
System monitoring reveals a focused approach targeting Elasticsearch, and others. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.253United StatesCaliforniaSanta ClaraPalo Alto Networks Inc23956, 873, 106, 1883, 24056, 10250, 2086, 9997, 5678, 10255... (290 more)
System monitoring reveals a focused approach on a handful of ports, such as 23956, 873, 106. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.30United StatesCaliforniaSanta ClaraPalo Alto Networks Inc11211, 49502, 22460, 50996, 3390, 3493, 1244, 20121, 1604, 23756... (270 more)
Network inspection reveals a focused approach targeting Memcached, and others. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.30United StatesCaliforniaSanta ClaraPalo Alto Networks Inc10911, 2602, 5678, 2380, 41795, 12694, 50052, 9876, 10257, 1883... (296 more)
System analysis reveals a focused approach on a handful of ports, such as 10911, 2602, 5678. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.220United KingdomEnglandLondonGoogle LLC5533, 9888, 9468, 22127, 51009, 49103, 1588, 10019, 58314, 19422... (2222 more)
Network inspection reveals a focused approach on a handful of ports, such as 5533, 9888, 9468. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.228United StatesCaliforniaSanta ClaraPalo Alto Networks Inc2086, 23456, 548, 6000, 8008, 23856, 10004, 10003, 60243, 10002... (280 more)
System monitoring reveals a focused approach on a handful of ports, such as 2086, 23456, 548. The attacker appears to be leveraging a data center hideout.
Japan flag
118.194.236.118JapanTokyoTokyoUCloud Information Technology (HK) Limite...9004, 26, 9035, 50999, 49670, 50580, 18081, 51002, 3940, 3163... (177 more)
System monitoring reveals a focused approach on a handful of ports, such as 9004, 26, 9035. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.234United StatesSouth CarolinaNorth CharlestonGoogle LLC8855, 48197, 9222, 2122, 47744, 9257, 11493, 9636, 14866, 48840... (2250 more)
Network inspection reveals a focused approach on a handful of ports, such as 8855, 48197, 9222. The attacker appears to be leveraging a data center hideout.
United States flag
154.83.197.31United StatesVirginiaAshburnBunny Technology LLC Inc11702, 11307, 11032, 10983, 9615, 9505, 184, 8642, 8558, 8220... (19 more)
Digital footprint reveals a focused approach on a handful of ports, such as 11702, 11307, 11032. The attacker is behind the veil of a VPN.
United Kingdom flag
194.127.165.69United KingdomEnglandMillwallOwl Limited175, 3851, 7007, 7777, 26, 27015, 9152, 4433, 33354, 51005... (13 more)
Digital footprint reveals a focused approach on a handful of ports, such as 175, 3851, 7007. The attacker appears to be leveraging a data center hideout.
Japan flag
47.74.63.6JapanTokyoTokyoAliCloud JP50200, 14082, 41795, 8588, 7150, 43138
System analysis reveals a focused approach on a handful of ports, such as 50200, 14082, 41795. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.15United StatesCaliforniaSanta ClaraPalo Alto Networks Inc10002, 5678, 62078, 554, 4432, 40005, 3260, 5909, 50003, 4444... (300 more)
System monitoring reveals a focused approach on a handful of ports, such as 10002, 5678, 62078. The attacker appears to be leveraging a data center hideout.
Germany flag
157.180.65.121GermanyBayernGunzenhausenHetzner Online GmbH8080
Digital footprint reveals a focused attack targeting HTTP. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.47United StatesCaliforniaSanta ClaraPalo Alto Networks Inc10257, 3333, 50805, 3388, 5901, 5986, 5900, 5672, 5908, 8010... (263 more)
System monitoring reveals a focused approach targeting VNC, and others. The attacker appears to be leveraging a data center hideout.
United States flag
45.33.84.124United StatesNew JerseyCedar KnollsAkamai Technologies Inc.8378, 62885, 5906, 8545, 433, 3084, 44846, 8359, 9087, 8866... (1389 more)
System monitoring reveals a focused approach on a handful of ports, such as 8378, 62885, 5906. The attacker appears to be leveraging a data center hideout.
Belgium flag
45.156.129.82BelgiumBrussels Hoofdstedelijk GewestBrusselsNSEC - Sistemas Informaticos S.A.175, 11211, 11300, 18245, 1991, 7000, 7001, 7547, 9001, 13579... (42 more)
Network inspection reveals a focused approach targeting Memcached, and others. The attacker appears to be leveraging a data center hideout.
Netherlands flag
185.242.226.85NetherlandsNoord-HollandAmsterdamAlsycon B.V.1195, 69, 65, 177, 94, 66, 101, 93, 123, 137... (134 more)
Digital footprint reveals a focused approach on a handful of ports, such as 1195, 69, 65. The attacker appears to be leveraging a data center hideout.
Singapore flag
47.245.105.222SingaporeSingaporeSingaporeAlibaba Cloud LLC10131
System analysis reveals a focused attack on port 10131. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.146United StatesCaliforniaSanta ClaraPalo Alto Networks Inc49304, 11000, 10029, 12080, 25787, 8843, 2444, 14901, 45194, 31006... (1793 more)
Network inspection reveals a focused approach on a handful of ports, such as 49304, 11000, 10029. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.150United KingdomEnglandLondonGoogle LLC20121, 16026, 30003, 63389, 16161, 46372, 46694, 45650, 48061, 48340... (2287 more)
Network inspection reveals a focused approach on a handful of ports, such as 20121, 16026, 30003. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.194United StatesCaliforniaSanta ClaraPalo Alto Networks Inc1801, 24156, 10911, 1250, 587, 5901, 4020, 5900, 44818, 2604... (287 more)
Digital footprint reveals a focused approach targeting VNC, and others. The attacker appears to be leveraging a data center hideout.