Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,474 unique cyber attackers who, collectively, were responsible for 21,934 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
147.185.133.195United StatesCaliforniaSanta ClaraPalo Alto Networks Inc9478, 8829, 8837, 56894, 34433, 13526, 56010, 47753, 57466, 31200... (1128 more)
Digital footprint reveals a focused approach on a handful of ports, such as 9478, 8829, 8837. The attacker appears to be leveraging a data center hideout.
United States flag
40.124.175.26United StatesTexasSan AntonioMicrosoft Corporation636, 520, 1521, 60001, 8032, 5353, 8006, 264, 1911, 4330... (13 more)
System analysis reveals a focused approach on a handful of ports, such as 636, 520, 1521. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.108United KingdomEnglandLondonGoogle LLC10099, 9212, 8520, 28034, 18362, 46801, 44726, 31336, 233, 46372... (1516 more)
System monitoring reveals a focused approach on a handful of ports, such as 10099, 9212, 8520. The attacker appears to be leveraging a data center hideout.
Germany flag
45.134.108.250GermanyBayernOttobrunnWexlHost30120
Network inspection reveals a focused attack on port 30120. The attacker appears to be leveraging a data center hideout.
United States flag
20.163.15.217United StatesArizonaPhoenixMicrosoft Corporation1212, 53, 27017, 995, 3306, 8983, 5006, 7473, 873, 11743... (15 more)
Digital footprint reveals a focused approach targeting DNS, MongoDB, MySQL, and others. The attacker appears to be leveraging a data center hideout.
Singapore flag
152.32.217.126SingaporeSingaporeSingaporeUCloud Information Technology (HK) Limite...97, 12291, 12849, 12374, 12021, 12015, 12010, 12009, 11972, 11858... (194 more)
Activity shows a focused approach on a handful of ports, such as 97, 12291, 12849. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.190United StatesCaliforniaSanta ClaraPalo Alto Networks Inc8453, 50895, 1081, 541, 45110, 33910, 62250, 43342, 3085, 50492... (1134 more)
Network inspection reveals a focused approach on a handful of ports, such as 8453, 50895, 1081. The attacker appears to be leveraging a data center hideout.
Thailand flag
165.154.120.253ThailandKrung Thep Maha NakhonBangkokUCloud Information Technology (HK) Limite...645, 5015, 11003, 12004, 61011, 13217, 7339, 2406, 20332, 6747... (175 more)
System analysis reveals a focused approach on a handful of ports, such as 645, 5015, 11003. The attacker appears to be leveraging a data center hideout.
Germany flag
185.91.127.20GermanyBayernBad Konigshofen im GrabfeldTUBE-HOSTING7190, 7860, 8080, 8090, 8082, 8081
System analysis reveals a focused approach targeting HTTP, and others. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.11United KingdomEnglandLondonGoogle LLC9041, 5689, 45544, 46148, 22052, 10123, 9477, 36874, 33079, 6565... (1691 more)
Activity shows a focused approach on a handful of ports, such as 9041, 5689, 45544. The attacker appears to be leveraging a data center hideout.
Ukraine flag
91.196.152.38UkraineKyivKievVisteria LLC8009, 17137, 22122, 50000, 9013, 9618, 20154, 179, 9002, 5555... (99 more)
Activity shows a focused approach on a handful of ports, such as 8009, 17137, 22122. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.55United KingdomEnglandLondonGoogle LLC9361, 47988, 1977, 9573, 30220, 12798, 9953, 53526, 3391, 29842... (1689 more)
Digital footprint reveals a focused approach on a handful of ports, such as 9361, 47988, 1977. The attacker appears to be leveraging a data center hideout.
United States flag
162.142.125.226United StatesMichiganAnn ArborCensys Inc.43420, 65314, 58887, 42341, 25243, 4515, 1906, 40860, 58150, 11558... (1001 more)
System analysis reveals a focused approach on a handful of ports, such as 43420, 65314, 58887. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
118.193.64.235United KingdomEnglandLondonUCloud Information Technology (HK) Limite...15128, 11136, 996, 16619, 4596, 3762, 20000, 2494, 5122, 8989... (256 more)
Network inspection reveals a focused approach on a handful of ports, such as 15128, 11136, 996. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.26United StatesCaliforniaSanta ClaraPalo Alto Networks Inc4190, 6379, 51200, 3390, 50052, 113, 50805, 8084, 3333, 4172... (294 more)
Network inspection reveals a focused approach targeting Redis, and others. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.130United StatesCaliforniaSanta ClaraPalo Alto Networks Inc3493, 43676, 2483, 30083, 27015, 9001, 5557, 3306, 12694, 10257... (295 more)
System analysis reveals a focused approach targeting MySQL, and others. The attacker appears to be leveraging a data center hideout.
United States flag
167.94.138.148United StatesMichiganAnn ArborCensys Inc.1433, 8808, 2456, 9601, 1000, 2403, 11103, 10002, 13000, 788... (339 more)
Network inspection reveals a focused approach on a handful of ports, such as 1433, 8808, 2456. The attacker is perhaps masquerading as a search engine bot?
Taiwan, Province of China flag
36.238.155.68Taiwan, Province of ChinaKaohsiungKaohsiungChunghwa Telecom Co. Ltd.23
Activity shows a focused attack targeting Telnet.
United States flag
147.185.133.106United StatesCaliforniaSanta ClaraPalo Alto Networks Inc3080, 8350, 40470, 25293, 886, 4322, 4480, 64486, 46895, 47593... (1141 more)
Network inspection reveals a focused approach on a handful of ports, such as 3080, 8350, 40470. The attacker appears to be leveraging a data center hideout.
China flag
106.13.124.241ChinaBeijingBeijingBeijing Baidu Netcom Science and Technolo...6379
Activity shows a focused attack targeting Redis. The attacker is perhaps masquerading as a search engine bot?
Canada flag
142.4.222.96CanadaQuebecMontrealOVH Hosting Inc.39166, 35729
System analysis reveals a selective approach on a handful of ports, such as 39166, 35729. The attacker appears to be leveraging a data center hideout.
Ukraine flag
91.196.152.220UkraineKyivKievVisteria LLC8554, 6279, 2079, 20083, 44464, 8159, 8190, 9094, 8399, 5002... (105 more)
Digital footprint reveals a focused approach on a handful of ports, such as 8554, 6279, 2079. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.113United StatesSouth CarolinaNorth CharlestonGoogle LLC9643, 962, 9583, 40206, 9914, 7979, 9640, 31778, 22211, 9281... (1801 more)
Network inspection reveals a focused approach on a handful of ports, such as 9643, 962, 9583. The attacker appears to be leveraging a data center hideout.
South Africa flag
196.251.91.50South AfricaGautengJohannesburgSecure Internet Limited3306
System analysis reveals a focused attack targeting MySQL. The attacker is behind the veil of a VPN.
Nigeria flag
196.251.80.172NigeriaLagosLagosSecure Internet Limited2078, 2077, 196, 186, 185, 147, 146, 141, 140, 138... (75 more)
Activity shows a focused approach on a handful of ports, such as 2078, 2077, 196. The attacker is behind the veil of a VPN.