Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,544 unique cyber attackers who, collectively, were responsible for 20,626 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
162.216.150.182United StatesSouth CarolinaNorth CharlestonGoogle LLC60241, 46114, 46205, 2232, 8902, 34471, 8899, 9306, 34463, 7779... (976 more)
Digital footprint reveals a focused approach on a handful of ports, such as 60241, 46114, 46205. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.135United StatesSouth CarolinaNorth CharlestonGoogle LLC8148, 9548, 36910, 59602, 2622, 48734, 8164, 47000, 46517, 12323... (969 more)
System monitoring reveals a focused approach on a handful of ports, such as 8148, 9548, 36910. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.177United StatesSouth CarolinaNorth CharlestonGoogle LLC8440, 9082, 14674, 47003, 48971, 46155, 61682, 9440, 46523, 8830... (901 more)
Network inspection reveals a focused approach on a handful of ports, such as 8440, 9082, 14674. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.179United StatesCaliforniaSanta ClaraPalo Alto Networks Inc49396, 93, 2281, 1722, 46866, 45419, 2024, 9770, 1441, 47134... (169 more)
Network inspection reveals a focused approach on a handful of ports, such as 49396, 93, 2281. The attacker appears to be leveraging a data center hideout.
United States flag
172.168.153.146United StatesIowaDes MoinesMicrosoft Limited5432, 514, 21, 8005, 70, 541, 9990, 8192
System analysis reveals a focused approach targeting PostgreSQL, FTP, and others. The attacker appears to be leveraging a data center hideout.
United States flag
134.122.20.57United StatesNew JerseyNorth BergenDigitalOcean LLC8443, 9443, 6443, 4443, 7443
System monitoring reveals a selective approach targeting HTTPS, and others. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.89United StatesMichiganAnn ArborCensys Inc.995, 10001, 8545, 1024, 4433, 20547, 2455, 3389, 58603, 6667... (56 more)
Activity shows a focused approach targeting RDP, and others. The attacker is perhaps masquerading as a search engine bot?
China flag
47.95.66.92ChinaZhejiangHangzhouAliyun Computing Co. Ltd6379
Digital footprint reveals a focused attack targeting Redis. The attacker appears to be leveraging a data center hideout.
Germany flag
161.35.201.15GermanyHessenFrankfurt am MainDigitalOcean LLC1123, 48443, 23485, 33163, 21253, 5959, 12413, 36668, 50065, 41771... (68 more)
Activity shows a focused approach on a handful of ports, such as 1123, 48443, 23485. The attacker appears to be leveraging a data center hideout.
China flag
222.186.13.132ChinaJiangsuZhenjiangChinaNet Jiangsu Province Network5060, 8581, 6699, 4660, 7272, 32764, 9091, 64347, 8138, 8123... (509 more)
Activity shows a focused approach on a handful of ports, such as 5060, 8581, 6699. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.50United StatesCaliforniaSanta ClaraPalo Alto Networks Inc6080, 9387, 17846, 44626, 8444, 60412, 46956, 49724, 46769, 8980... (178 more)
Digital footprint reveals a focused approach on a handful of ports, such as 6080, 9387, 17846. The attacker appears to be leveraging a data center hideout.
United States flag
13.83.43.95United StatesCaliforniaSan FranciscoMicrosoft Corporation995, 20547, 8098, 1337, 55554, 465, 8090, 9200, 9529, 2525... (3 more)
Network inspection reveals a focused approach targeting Elasticsearch, and others. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.157United KingdomEnglandLondonGoogle LLC14440, 27001, 9841, 36444, 47264, 29842, 45343, 7003, 8809, 1083... (884 more)
System analysis reveals a focused approach on a handful of ports, such as 14440, 27001, 9841. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.14United StatesCaliforniaSanta ClaraPalo Alto Networks Inc4369, 20122, 50052, 2603, 1883, 2121, 5906, 2380, 55918, 7443... (255 more)
System monitoring reveals a focused approach on a handful of ports, such as 4369, 20122, 50052. The attacker appears to be leveraging a data center hideout.
United States flag
23.92.27.179United StatesCaliforniaFremontAkamai Technologies Inc.862, 9191, 5902, 1985, 8058, 45785, 8110, 12323, 44445, 9303... (917 more)
System monitoring reveals a focused approach on a handful of ports, such as 862, 9191, 5902. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.98United StatesCaliforniaSanta ClaraPalo Alto Networks Inc60000, 2121, 9051, 119, 2181, 30005, 143, 8444, 5903, 5986... (152 more)
System analysis reveals a focused approach targeting IMAP, and others. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.16United StatesCaliforniaSanta ClaraPalo Alto Networks Inc8800, 50067, 8282, 44818, 5901, 50002, 61616, 1200, 5903, 1244... (254 more)
Digital footprint reveals a focused approach on a handful of ports, such as 8800, 50067, 8282. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.184United StatesSouth CarolinaNorth CharlestonGoogle LLC9264, 1719, 46297, 5343, 47989, 4014, 9725, 34469, 16161, 9300... (1050 more)
Activity shows a focused approach on a handful of ports, such as 9264, 1719, 46297. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
48.217.211.118United KingdomEnglandLondonMicrosoft Limited1270, 445, 8291, 3389, 21, 28015, 1521, 9300, 8983, 9200... (1 more)
Digital footprint reveals a focused approach targeting SMB, RDP, FTP, Elasticsearch, and others. The attacker appears to be leveraging a data center hideout.
United States flag
143.42.1.84United StatesNew JerseyCedar KnollsAkamai Technologies Inc.42014, 9993, 1490, 8022, 51242, 9501, 10050, 8443, 20022, 7820... (901 more)
System analysis reveals a focused approach targeting HTTPS, and others. The attacker appears to be leveraging a data center hideout.
Germany flag
139.162.176.34GermanyHessenFrankfurt am MainLinode LLC22
Network inspection reveals a focused attack targeting SSH. The attacker appears to be leveraging a data center hideout.
United States flag
167.94.138.158United StatesMichiganAnn ArborCensys Inc.18333, 9201, 1883, 33389, 8883, 40000, 14265, 119, 4242, 5986... (290 more)
Activity shows a focused approach on a handful of ports, such as 18333, 9201, 1883. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
35.203.210.214United KingdomEnglandLondonGoogle LLC11194, 13137, 9596, 31366, 19354, 24523, 34465, 1314, 9423, 14523... (967 more)
Network inspection reveals a focused approach on a handful of ports, such as 11194, 13137, 9596. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.20United StatesSouth CarolinaNorth CharlestonGoogle LLC47658, 45227, 9129, 9729, 49504, 12087, 34479, 6565, 31336, 9061... (960 more)
Digital footprint reveals a focused approach on a handful of ports, such as 47658, 45227, 9129. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.211United StatesSouth CarolinaNorth CharlestonGoogle LLC47624, 26379, 51399, 38879, 9429, 49835, 9335, 47707, 10021, 8312... (995 more)
System analysis reveals a focused approach on a handful of ports, such as 47624, 26379, 51399. The attacker appears to be leveraging a data center hideout.