Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,442 unique cyber attackers who, collectively, were responsible for 21,659 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
China flag
180.167.201.234ChinaShanghaiShanghaiChinaNet Shanghai Province Network9401
Digital footprint reveals a focused attack on port 9401. The attacker appears to be leveraging a data center hideout.
United States flag
167.94.145.19United StatesMichiganAnn ArborCensys Inc.2376, 44818, 9201, 8013, 23, 3299, 22, 5986, 9301, 9300... (315 more)
Digital footprint reveals a focused approach targeting Telnet, SSH, and others. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
35.203.211.54United KingdomEnglandLondonGoogle LLC8870, 49930, 9331, 21028, 8809, 33699, 9005, 9425, 3308, 9654... (1215 more)
Digital footprint reveals a focused approach on a handful of ports, such as 8870, 49930, 9331. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.172United StatesSouth CarolinaNorth CharlestonGoogle LLC36370, 3016, 8869, 33079, 8062, 45853, 18576, 48408, 28444, 8058... (1277 more)
System analysis reveals a focused approach on a handful of ports, such as 36370, 3016, 8869. The attacker appears to be leveraging a data center hideout.
United States flag
173.255.221.106United StatesCaliforniaFremontAkamai Technologies Inc.6080, 2079, 3302
Digital footprint reveals a selective approach on a handful of ports, such as 6080, 2079, 3302. The attacker appears to be leveraging a data center hideout.
United States flag
170.187.163.133United StatesNew JerseyCedar KnollsAkamai Technologies Inc.8300, 85, 32015, 7744, 9551, 14430, 52223, 18080, 30007, 1443... (1043 more)
Activity shows a focused approach on a handful of ports, such as 8300, 85, 32015. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.237United StatesCaliforniaSanta ClaraPalo Alto Networks Inc42069, 55123, 9788, 49452, 13443, 14444, 46245, 9057, 33889, 18082... (505 more)
Activity shows a focused approach on a handful of ports, such as 42069, 55123, 9788. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.171United StatesSouth CarolinaNorth CharlestonGoogle LLC3454, 45227, 53306, 8023, 60731, 22138, 48819, 9268, 49168, 2422... (1286 more)
System monitoring reveals a focused approach on a handful of ports, such as 3454, 45227, 53306. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.98United StatesSouth CarolinaNorth CharlestonGoogle LLC46315, 192, 13929, 15700, 7071, 48406, 47394, 52798, 49578, 53526... (1247 more)
System analysis reveals a focused approach on a handful of ports, such as 46315, 192, 13929. The attacker appears to be leveraging a data center hideout.
India flag
152.32.156.158IndiaMaharashtraMumbaiUCloud Information Technology (HK) Limite...5523, 135, 51000, 12334, 1521, 8020, 50050, 2222, 51003, 9013... (49 more)
System monitoring reveals a focused approach on a handful of ports, such as 5523, 135, 51000. The attacker appears to be leveraging a data center hideout.
United States flag
104.45.233.92United StatesCaliforniaSan FranciscoMicrosoft Corporation2222, 18091, 8083, 1389, 7443, 4332, 179, 5800, 5985, 5938... (22 more)
Activity shows a focused approach on a handful of ports, such as 2222, 18091, 8083. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.223United StatesSouth CarolinaNorth CharlestonGoogle LLC11022, 33699, 8161, 9547, 34495, 9559, 22462, 1003, 49846, 46888... (1226 more)
System analysis reveals a focused approach on a handful of ports, such as 11022, 33699, 8161. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.183United StatesCaliforniaSanta ClaraPalo Alto Networks Inc9423, 1587, 49153, 10225, 521, 12088, 9877, 13929, 45608, 5657... (516 more)
Digital footprint reveals a focused approach on a handful of ports, such as 9423, 1587, 49153. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.133.13United StatesCaliforniaSanta ClaraPalo Alto Networks Inc9779, 52103, 859, 60731, 49171, 46194, 29080, 7172, 55916, 9860... (532 more)
Activity shows a focused approach on a handful of ports, such as 9779, 52103, 859. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.35.99United StatesMichiganAnn ArborCensys Inc.20547, 83, 623, 4840, 5432, 8389, 20256, 81, 8088, 2083... (121 more)
Digital footprint reveals a focused approach targeting PostgreSQL, and others. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
35.203.210.87United KingdomEnglandLondonGoogle LLC9440, 9756, 52587, 8869, 12347, 53226, 4118, 1719, 10050, 38082... (1255 more)
Network inspection reveals a focused approach on a handful of ports, such as 9440, 9756, 52587. The attacker appears to be leveraging a data center hideout.
China flag
47.120.42.15ChinaGuangdongShenzhenAliyun Computing Co. Ltd6379
System monitoring reveals a focused attack targeting Redis. The attacker appears to be leveraging a data center hideout.
United States flag
147.185.132.75United StatesCaliforniaSanta ClaraPalo Alto Networks Inc10255, 4786, 28080, 6379, 5672, 5909, 30010, 4026, 9200, 8883... (102 more)
Network inspection reveals a focused approach targeting Redis, Elasticsearch, and others. The attacker appears to be leveraging a data center hideout.
Taiwan, Province of China flag
49.213.139.15Taiwan, Province of ChinaTaichungTaichungTaiwan Infrastructure Network Technologie...82, 34567, 34568, 8080, 3128
Network inspection reveals a selective approach targeting HTTP, and others.
United States flag
198.235.24.182United StatesCaliforniaSanta ClaraPalo Alto Networks Inc9001, 8445, 995, 12345, 7093, 8094, 9999, 22460, 38520, 4117... (162 more)
System monitoring reveals a focused approach on a handful of ports, such as 9001, 8445, 995. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.46United StatesCaliforniaSanta ClaraPalo Alto Networks Inc6001, 58603, 6443, 4190, 4369, 32400, 554, 10250, 4025, 28080... (174 more)
Activity shows a focused approach on a handful of ports, such as 6001, 58603, 6443. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.234United StatesSouth CarolinaNorth CharlestonGoogle LLC36531, 5540, 46555, 45446, 48895, 22023, 12511, 48609, 34471, 49160... (1311 more)
Digital footprint reveals a focused approach on a handful of ports, such as 36531, 5540, 46555. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.124United KingdomEnglandLondonGoogle LLC25787, 34512, 48172, 49344, 12019, 47915, 25938, 1236, 8843, 9556... (1212 more)
System analysis reveals a focused approach on a handful of ports, such as 25787, 34512, 48172. The attacker appears to be leveraging a data center hideout.
Netherlands flag
80.82.70.133NetherlandsNoord-HollandAmsterdamFiberXpress BV9201, 4500, 500, 50050, 83, 3388, 8081, 6893, 53, 777... (57 more)
Network inspection reveals a focused approach targeting DNS, and others. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.128United StatesCaliforniaSanta ClaraPalo Alto Networks Inc20123, 1000, 12694, 50052, 53300, 50805, 10257, 20249, 50997, 47001... (276 more)
System analysis reveals a focused approach on a handful of ports, such as 20123, 1000, 12694. The attacker appears to be leveraging a data center hideout.