Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,450 unique cyber attackers who, collectively, were responsible for 18,103 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
Canada flag
66.132.153.146CanadaOntarioEtobicokeAptum Technologies50995, 5902, 50580, 7443, 17778, 12322, 22722, 44817, 20201, 6362... (56 more)
Network inspection reveals a focused approach on a handful of ports, such as 50995, 5902, 50580. The attacker appears to be leveraging a data center hideout.
Hong Kong flag
45.82.76.66Hong KongHong KongHong KongxTom GmbH63260, 7071, 666, 25, 10892, 93, 4165, 9073, 189, 5679... (44 more)
System analysis reveals a focused approach targeting SMTP, and others. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.122United StatesCaliforniaSanta ClaraPalo Alto Networks Inc83, 50003, 9042, 9093, 2404, 102, 2161, 5443, 7093, 11211... (244 more)
Activity shows a focused approach targeting Memcached, and others. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.55United StatesCaliforniaSanta ClaraPalo Alto Networks Inc6002, 3390, 2082, 1604, 1025, 43676, 50996, 465, 444, 6379... (227 more)
System analysis reveals a focused approach targeting Redis, and others. The attacker appears to be leveraging a data center hideout.
Belgium flag
45.156.129.77BelgiumBrussels Hoofdstedelijk GewestBrusselsNSEC - Sistemas Informaticos S.A.8889, 70, 27015, 53413, 8834, 7777, 2332, 4242, 2067, 1099... (22 more)
Activity shows a focused approach on a handful of ports, such as 8889, 70, 27015. The attacker appears to be leveraging a data center hideout.
United States flag
20.81.47.186United StatesVirginiaWashingtonMicrosoft Corporation5007, 7474, 1337, 465, 9160, 2455, 11211, 8001, 47808, 2375... (18 more)
Network inspection reveals a focused approach targeting Memcached, and others. The attacker appears to be leveraging a data center hideout.
- flag
160.30.192.230----3128
System monitoring reveals a focused attack on port 3128.
United Kingdom flag
35.203.211.113United KingdomEnglandLondonGoogle LLC10082, 49543, 9038, 2000, 33306, 4050, 9477, 26956, 34441, 3504... (1959 more)
System analysis reveals a focused approach on a handful of ports, such as 10082, 49543, 9038. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.94United StatesMichiganAnn ArborCensys Inc.22622, 10259, 7000, 1433, 8636, 1201, 1963, 6000, 110, 179... (227 more)
System analysis reveals a focused approach targeting POP3, and others. The attacker is perhaps masquerading as a search engine bot?
Germany flag
8.209.96.38GermanyHessenFrankfurt am MainAlibaba.com Singapore E-Commerce Private ...8187, 12446, 8164, 5986, 8092, 11084, 50996, 9098, 18443, 50004... (98 more)
System analysis reveals a focused approach on a handful of ports, such as 8187, 12446, 8164. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.63United KingdomEnglandLondonGoogle LLC9965, 45169, 5602, 16097, 24567, 14890, 18572, 228, 8881, 49987... (1870 more)
Network inspection reveals a focused approach on a handful of ports, such as 9965, 45169, 5602. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.252United StatesSouth CarolinaNorth CharlestonGoogle LLC8798, 8284, 7441, 8862, 30331, 18140, 9063, 4544, 9000, 9007... (1962 more)
Digital footprint reveals a focused approach on a handful of ports, such as 8798, 8284, 7441. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.212United StatesCaliforniaSanta ClaraPalo Alto Networks Inc47001, 1000, 41795, 60243, 4786, 5289, 873, 1250, 4343, 987... (244 more)
Network inspection reveals a focused approach on a handful of ports, such as 47001, 1000, 41795. The attacker appears to be leveraging a data center hideout.
Spain flag
159.147.170.137SpainAndaluciaMarmolejoVodafone Espana S.A.U.23
Network inspection reveals a focused attack targeting Telnet.
United States flag
162.216.149.83United StatesSouth CarolinaNorth CharlestonGoogle LLC54496, 5800, 48950, 8400, 79, 23107, 47964, 18428, 8997, 44444... (1942 more)
System monitoring reveals a focused approach on a handful of ports, such as 54496, 5800, 48950. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.144United StatesSouth CarolinaNorth CharlestonGoogle LLC9364, 34512, 9252, 45194, 8871, 45101, 1988, 46957, 25555, 45618... (1929 more)
Activity shows a focused approach on a handful of ports, such as 9364, 34512, 9252. The attacker appears to be leveraging a data center hideout.
China flag
119.45.236.191ChinaBeijingBeijingTencent Cloud Computing (Beijing) Co. Ltd...6379
System monitoring reveals a focused attack targeting Redis. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.192United KingdomEnglandLondonGoogle LLC30103, 8097, 45405, 9853, 33888, 8029, 441, 58888, 28899, 8890... (1890 more)
Digital footprint reveals a focused approach on a handful of ports, such as 30103, 8097, 45405. The attacker appears to be leveraging a data center hideout.
Brazil flag
186.224.238.10BrazilGoiasCaldas NovasPath Telecom S.A.1433
System analysis reveals a focused attack on port 1433.
Hong Kong flag
88.218.193.153Hong KongHong KongHong KongxTom GmbH1400, 9100, 23424, 9988, 9119, 32769, 55443, 1001, 50002, 16020... (43 more)
Digital footprint reveals a focused approach on a handful of ports, such as 1400, 9100, 23424. The attacker is behind the veil of a VPN.
China flag
106.12.184.7ChinaBeijingBeijingBeijing Baidu Netcom Science and Technolo...6379
System analysis reveals a focused attack targeting Redis. The attacker is perhaps masquerading as a search engine bot?
Hong Kong flag
118.141.212.187Hong KongHong KongHong KongHGC Global Communications Limited23
Network inspection reveals a focused attack targeting Telnet.
Singapore flag
103.189.234.9SingaporeSingaporeSingaporeCloud Host Pte Ltd22
Network inspection reveals a focused attack targeting SSH. The attacker appears to be leveraging a data center hideout.
United States flag
20.171.8.157United StatesArizonaPhoenixMicrosoft Corporation502, 5900, 118, 32400, 8032, 5672, 28015, 113, 873, 7473... (23 more)
System analysis reveals a focused approach targeting VNC, and others. The attacker appears to be leveraging a data center hideout.
United States flag
20.169.105.100United StatesArizonaPhoenixMicrosoft Corporation8000, 8091, 3391, 8983, 4331, 5632, 18480, 9160, 1604, 8222... (30 more)
Activity shows a focused approach on a handful of ports, such as 8000, 8091, 3391. The attacker appears to be leveraging a data center hideout.