Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 18,993 unique cyber attackers who, collectively, were responsible for 158,686 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
47.251.92.46United StatesCaliforniaLos AngelesAliCloud12204, 6009, 12389, 7885, 7000, 3085, 990, 9027, 13128, 12488... (114 more)
Digital footprint reveals a focused approach on a handful of ports, such as 12204, 6009, 12389. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.226United StatesCaliforniaSanta ClaraPalo Alto Networks Inc3333, 548, 5432, 8084, 9983, 1000, 32569, 3299, 11495, 2443... (273 more)
System monitoring reveals a focused approach targeting PostgreSQL, and others. The attacker appears to be leveraging a data center hideout.
United States flag
20.168.120.148United StatesArizonaPhoenixMicrosoft Corporation1270, 7077, 3790, 5632, 5351, 5061, 2362, 1434, 8047, 2304... (41 more)
Digital footprint reveals a focused approach on a handful of ports, such as 1270, 7077, 3790. The attacker appears to be leveraging a data center hideout.
United States flag
20.169.108.13United StatesArizonaPhoenixMicrosoft Corporation18080, 8981, 5632, 8181, 1434, 162, 10443, 8333, 15001, 25... (39 more)
System analysis reveals a focused approach targeting SMTP, and others. The attacker appears to be leveraging a data center hideout.
France flag
91.231.89.202FranceIle-de-FranceMontreuilBha Conseil Sarl20107, 21234, 11005, 20031, 9098, 10203, 8011, 8702, 5223, 6555... (57 more)
Digital footprint reveals a focused approach on a handful of ports, such as 20107, 21234, 11005. The attacker appears to be leveraging a data center hideout.
China flag
120.26.49.175ChinaZhejiangHangzhouAliyun Computing Co. Ltd2375, 23, 22, 2222
Network inspection reveals a selective approach targeting Telnet, SSH, and others. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.161United StatesCaliforniaSanta ClaraPalo Alto Networks Inc84, 49930, 36000, 10092, 9689, 47758, 47299, 33322, 49455, 24100... (1571 more)
System analysis reveals a focused approach on a handful of ports, such as 84, 49930, 36000. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.117United StatesCaliforniaSanta ClaraPalo Alto Networks Inc20547, 20, 4025, 8999, 61337, 8530, 1443, 2379, 4369, 44344... (251 more)
System monitoring reveals a focused approach on a handful of ports, such as 20547, 20, 4025. The attacker appears to be leveraging a data center hideout.
France flag
91.230.168.10FranceIle-de-FranceMontreuilBha Conseil Sarl7400, 8787, 5002, 61234, 21289, 28443, 20099, 21241, 1443, 20036... (53 more)
Activity shows a focused approach on a handful of ports, such as 7400, 8787, 5002. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.219United StatesCaliforniaSanta ClaraPalo Alto Networks Inc106, 42713, 8139, 20122, 8282, 8094, 4100, 5909, 6568, 25827... (262 more)
Activity shows a focused approach on a handful of ports, such as 106, 42713, 8139. The attacker appears to be leveraging a data center hideout.
United States flag
45.79.67.140United StatesCaliforniaFremontAkamai Technologies Inc.22, 21, 8080, 3128, 1723
Activity shows a selective approach targeting SSH, FTP, HTTP, and others. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.9United StatesCaliforniaSanta ClaraPalo Alto Networks Inc8155, 58542, 33060, 9346, 18139, 48289, 49888, 18083, 4112, 9899... (1549 more)
Activity shows a focused approach on a handful of ports, such as 8155, 58542, 33060. The attacker appears to be leveraging a data center hideout.
France flag
91.231.89.106FranceIle-de-FranceMontreuilBha Conseil Sarl20100, 21251, 14430, 2003, 9081, 10053, 70, 8445, 50998, 6022... (63 more)
System analysis reveals a focused approach on a handful of ports, such as 20100, 21251, 14430. The attacker appears to be leveraging a data center hideout.
France flag
195.184.76.129France--Visteria LLC8013, 8554, 5050, 6717, 21318, 42123, 20126, 15443, 20064, 9197... (106 more)
System monitoring reveals a focused approach on a handful of ports, such as 8013, 8554, 5050. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.246United StatesCaliforniaSanta ClaraPalo Alto Networks Inc5678, 30005, 30006, 9192, 6697, 6002, 3388, 2080, 11911, 50052... (269 more)
System monitoring reveals a focused approach on a handful of ports, such as 5678, 30005, 30006. The attacker appears to be leveraging a data center hideout.
Turkey flag
78.174.97.132TurkeyKonyaKonyaTurk Telekomunikasyon Anonim Sirketi23
Activity shows a focused attack targeting Telnet.
France flag
195.184.76.66France--Visteria LLC6601, 8300, 5053, 6076, 26257, 4098, 2126, 23333, 12168, 1958... (26 more)
System monitoring reveals a focused approach on a handful of ports, such as 6601, 8300, 5053. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.205United StatesCaliforniaSanta ClaraPalo Alto Networks Inc448, 8123, 45680, 5900, 9424, 8846, 9675, 48022, 7261, 45748... (1546 more)
Activity shows a focused approach targeting VNC, and others. The attacker appears to be leveraging a data center hideout.
Ukraine flag
91.196.152.33UkraineKyivKievVisteria LLC20083, 21245, 10201, 20034, 9013, 10016, 8006, 8732, 6001, 6868... (128 more)
Network inspection reveals a focused approach on a handful of ports, such as 20083, 21245, 10201. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.78United StatesCaliforniaSanta ClaraPalo Alto Networks Inc6568, 18080, 4332, 5904, 4433, 51007, 1244, 20249, 59382, 1443... (253 more)
System analysis reveals a focused approach on a handful of ports, such as 6568, 18080, 4332. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.245United StatesCaliforniaSanta ClaraPalo Alto Networks Inc3014, 9040, 45039, 14739, 9988, 9916, 8017, 3341, 42233, 48393... (1538 more)
Activity shows a focused approach on a handful of ports, such as 3014, 9040, 45039. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.154United StatesMichiganAnn ArborCensys Inc.20548, 20546, 2454, 41795, 9876, 28015, 4444, 22822, 2079, 22922... (244 more)
Network inspection reveals a focused approach on a handful of ports, such as 20548, 20546, 2454. The attacker is perhaps masquerading as a search engine bot?
United States flag
162.216.150.165United StatesSouth CarolinaNorth CharlestonGoogle LLC46123, 962, 2095, 8054, 9902, 8816, 9163, 53311, 9355, 4565... (2169 more)
Activity shows a focused approach on a handful of ports, such as 46123, 962, 2095. The attacker appears to be leveraging a data center hideout.
United States flag
9.234.10.190United StatesNorth CarolinaDurhamIBM2000, 5007, 3351, 4444, 636, 2380, 44818, 50070, 1527, 79... (25 more)
Network inspection reveals a focused approach on a handful of ports, such as 2000, 5007, 3351. The attacker appears to be leveraging a data center hideout.
Viet Nam flag
14.225.230.81Viet NamHa NoiHanoiVietnam Posts and Telecommunications Grou...1433, 445
System analysis reveals a selective approach targeting SMB, and others.