Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,243 unique cyber attackers who, collectively, were responsible for 16,687 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
Singapore flag
167.99.78.165SingaporeSingaporeSingaporeDigitalOcean LLC58773, 57039, 38983, 63395, 1622, 25665, 22405, 9727, 31204, 54720... (198 more)
Network inspection reveals a focused approach on a handful of ports, such as 58773, 57039, 38983. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.177United StatesCaliforniaSanta ClaraPalo Alto Networks Inc58603, 49501, 8139, 52311, 2628, 9093, 58000, 56222, 1443, 8445... (255 more)
System analysis reveals a focused approach on a handful of ports, such as 58603, 49501, 8139. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.166United StatesCaliforniaSanta ClaraPalo Alto Networks Inc45846, 46522, 47690, 2306, 54043, 9697, 11122, 58008, 18182, 9171... (1603 more)
System monitoring reveals a focused approach on a handful of ports, such as 45846, 46522, 47690. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.239United StatesSouth CarolinaNorth CharlestonGoogle LLC47596, 46224, 48727, 45756, 21341, 20265, 64413, 61449, 8115, 47864... (2182 more)
Digital footprint reveals a focused approach on a handful of ports, such as 47596, 46224, 48727. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.46United StatesMichiganAnn ArborCensys Inc.2456, 832, 12322, 22822, 6006, 1201, 1194, 22522, 1961, 636... (240 more)
Network inspection reveals a focused approach on a handful of ports, such as 2456, 832, 12322. The attacker is perhaps masquerading as a search engine bot?
- flag
185.93.89.36----2052, 2096, 221, 55443, 8003, 8888, 9000, 8383
System analysis reveals a focused approach on a handful of ports, such as 2052, 2096, 221.
China flag
140.246.124.160ChinaShandongJinanChinaNet Shandong Province Network6379
Network inspection reveals a focused attack targeting Redis. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.196United KingdomEnglandLondonGoogle LLC2534, 48930, 32001, 9654, 8180, 9526, 48022, 8595, 48935, 9187... (2122 more)
Activity shows a focused approach on a handful of ports, such as 2534, 48930, 32001. The attacker appears to be leveraging a data center hideout.
United States flag
165.154.135.208United StatesCaliforniaLos AngelesUCloud Information Technology (HK) Limite...1255
Network inspection reveals a focused attack on port 1255. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.148United KingdomEnglandLondonGoogle LLC19092, 45721, 8411, 60003, 42285, 31006, 49247, 9759, 61813, 9331... (2115 more)
Activity shows a focused approach on a handful of ports, such as 19092, 45721, 8411. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.95United StatesCaliforniaSanta ClaraPalo Alto Networks Inc47020, 47658, 10040, 46562, 6352, 8010, 49154, 29403, 49684, 45876... (1622 more)
System analysis reveals a focused approach on a handful of ports, such as 47020, 47658, 10040. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.28United StatesCaliforniaSanta ClaraPalo Alto Networks Inc50053, 3306, 20, 10911, 7093, 47693, 3443, 6000, 60243, 50052... (296 more)
Network inspection reveals a focused approach targeting MySQL, and others. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.230United StatesCaliforniaSanta ClaraPalo Alto Networks Inc6601, 9606, 9997, 45890, 9053, 42236, 24442, 51242, 7722, 47100... (1653 more)
Network inspection reveals a focused approach on a handful of ports, such as 6601, 9606, 9997. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.143United StatesCaliforniaSanta ClaraPalo Alto Networks Inc5678, 50052, 2380, 8531, 52869, 9100, 38520, 10257, 3306, 1433... (296 more)
System analysis reveals a focused approach targeting MySQL, and others. The attacker appears to be leveraging a data center hideout.
United States flag
13.89.124.218United StatesIowaDes MoinesMicrosoft Corporation102, 995, 636, 1930, 5222, 631, 7210, 138, 5432, 9160... (41 more)
Network inspection reveals a focused approach targeting PostgreSQL, and others. The attacker appears to be leveraging a data center hideout.
India flag
103.215.201.34IndiaHaryanaFaridabadA2j Data Services Pvt. Ltd.1433, 3306, 8080
Network inspection reveals a selective approach targeting MySQL, HTTP, and others. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.161United KingdomEnglandLondonGoogle LLC8288, 9116, 2062, 9137, 46966, 33079, 53181, 34423, 49051, 9655... (2121 more)
Digital footprint reveals a focused approach on a handful of ports, such as 8288, 9116, 2062. The attacker appears to be leveraging a data center hideout.
United States flag
47.77.223.20United StatesCaliforniaSan MateoAlibaba Cloud LLC9950, 4160
Activity shows a selective approach on a handful of ports, such as 9950, 4160. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.202United StatesCaliforniaSanta ClaraPalo Alto Networks Inc41795, 49, 5678, 1112, 3978, 873, 1194, 8009, 1604, 2483... (281 more)
System analysis reveals a focused approach on a handful of ports, such as 41795, 49, 5678. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.180United StatesMichiganAnn ArborCensys Inc.831, 1234, 20548, 20001, 2380, 1000, 990, 2000, 389, 22522... (243 more)
System analysis reveals a focused approach on a handful of ports, such as 831, 1234, 20548. The attacker is perhaps masquerading as a search engine bot?
United States flag
20.64.104.251United StatesTexasSan AntonioMicrosoft Corporation81, 4840, 5432, 8899, 25565, 1337, 28015, 45000, 3389, 5903... (38 more)
System monitoring reveals a focused approach targeting PostgreSQL, RDP, and others. The attacker appears to be leveraging a data center hideout.
China flag
106.54.176.158ChinaBeijingBeijingTencent Cloud Computing (Beijing) Co. Ltd...22, 2222, 2375, 23
Network inspection reveals a selective approach targeting SSH, Telnet, and others. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.11United StatesCaliforniaSanta ClaraPalo Alto Networks Inc1443, 37, 51200, 50003, 1234, 8887, 50100, 50002, 9001, 20122... (293 more)
System monitoring reveals a focused approach on a handful of ports, such as 1443, 37, 51200. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.28United StatesSouth CarolinaNorth CharlestonGoogle LLC38880, 42443, 9370, 9042, 8893, 9457, 17826, 9239, 28117, 29091... (2140 more)
System monitoring reveals a focused approach on a handful of ports, such as 38880, 42443, 9370. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.93United StatesCaliforniaSanta ClaraPalo Alto Networks Inc9600, 3052, 5906, 789, 264, 54498, 59382, 2605, 50052, 64719... (256 more)
System monitoring reveals a focused approach on a handful of ports, such as 9600, 3052, 5906. The attacker appears to be leveraging a data center hideout.