Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 3,942 unique cyber attackers who, collectively, were responsible for 19,983 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
206.217.128.98United StatesNew JerseyPiscatawayColoCrossing8095, 8998, 9095, 49848, 9865, 8000, 7070, 8880, 9092, 8087... (27 more)
Network inspection reveals a focused approach on a handful of ports, such as 8095, 8998, 9095. The attacker appears to be leveraging a data center hideout.
United States flag
45.79.191.178United StatesNew JerseyCedar KnollsAkamai Technologies Inc.12345, 20132, 4321, 4003, 49184, 13818, 5631, 8888, 8333, 4370... (776 more)
Digital footprint reveals a focused approach on a handful of ports, such as 12345, 20132, 4321. The attacker appears to be leveraging a data center hideout.
United States flag
170.187.165.218United StatesNew JerseyCedar KnollsAkamai Technologies Inc.49680, 9988, 51007, 8095, 1947, 17001, 8585, 4524, 2201, 6466... (784 more)
Digital footprint reveals a focused approach on a handful of ports, such as 49680, 9988, 51007. The attacker appears to be leveraging a data center hideout.
Switzerland flag
179.43.180.108SwitzerlandZurichZurichPrivate Layer Inc4145, 3128, 8080, 22, 5683, 3283, 3702, 389
System analysis reveals a focused approach targeting HTTP, SSH, and others. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.34.78United StatesMichiganAnn ArborCensys Inc.2455, 8883, 6004, 5900, 8010, 17778, 52200, 49502, 8080, 6008... (7 more)
System analysis reveals a focused approach targeting VNC, HTTP, and others. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
167.99.204.235United KingdomEnglandLondonDigitalOcean LLC22
Network inspection reveals a focused attack targeting SSH. The attacker appears to be leveraging a data center hideout.
France flag
146.59.230.1FranceHauts-de-FranceRoubaixOVH SAS22
System monitoring reveals a focused attack targeting SSH. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.16United StatesSouth CarolinaNorth CharlestonGoogle LLC48898, 49992, 14117, 49588, 9095, 49249, 8842, 9552, 3321, 8890... (750 more)
Digital footprint reveals a focused approach on a handful of ports, such as 48898, 49992, 14117. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.229United KingdomEnglandLondonGoogle LLC7998, 33899, 47816, 1011, 28980, 15000, 9476, 9064, 4446, 30103... (714 more)
Network inspection reveals a focused approach on a handful of ports, such as 7998, 33899, 47816. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.102United StatesCaliforniaSanta ClaraPalo Alto Networks Inc83, 28080, 20257, 943, 2087, 20123, 2484, 9200, 6443, 5938... (108 more)
System monitoring reveals a focused approach targeting Elasticsearch, and others. The attacker appears to be leveraging a data center hideout.
United States flag
45.79.186.176United StatesNew JerseyCedar KnollsAkamai Technologies Inc.9993, 58392, 2300, 2288, 7415, 6688, 15000, 61616, 2224, 81... (783 more)
System monitoring reveals a focused approach on a handful of ports, such as 9993, 58392, 2300. The attacker appears to be leveraging a data center hideout.
Ukraine flag
92.63.197.210UkraineKyivKievIP Khnykin Vitaliy Yakovlevich31905, 31940, 31910, 30990, 30910, 30925, 30970, 30965, 30940, 30985... (2149 more)
Digital footprint reveals a focused approach on a handful of ports, such as 31905, 31940, 31910. The attacker appears to be leveraging a data center hideout.
China flag
119.253.34.194ChinaBeijingBeijingBeijing Sinnet Technology Co. Ltd.1433
System analysis reveals a focused attack on port 1433. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.246United StatesCaliforniaSanta ClaraPalo Alto Networks Inc51007, 8015, 30083, 8010, 2525, 8140, 9051, 51401, 2160, 21242... (107 more)
Network inspection reveals a focused approach on a handful of ports, such as 51007, 8015, 30083. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.104United KingdomEnglandLondonGoogle LLC58194, 21328, 22001, 19100, 9415, 47157, 21288, 9815, 5222, 9005... (733 more)
Activity shows a focused approach on a handful of ports, such as 58194, 21328, 22001. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.34.199United StatesMichiganAnn ArborCensys Inc.6007, 1911, 2096, 8082, 33389, 1962, 990, 11300, 2701, 6003... (6 more)
Activity shows a focused approach on a handful of ports, such as 6007, 1911, 2096. The attacker is perhaps masquerading as a search engine bot?
France flag
203.55.81.13FranceIle-de-FranceNanterreSkoali SAS8728
Digital footprint reveals a focused attack on port 8728. The attacker appears to be leveraging a data center hideout.
United States flag
20.118.69.87United StatesTexasSan AntonioMicrosoft Corporation771
Network inspection reveals a focused attack on port 771. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.94United StatesSouth CarolinaNorth CharlestonGoogle LLC9038, 19222, 47179, 9831, 3310, 11850, 47233, 9882, 1715, 9806... (712 more)
Activity shows a focused approach on a handful of ports, such as 9038, 19222, 47179. The attacker appears to be leveraging a data center hideout.
Serbia flag
80.76.49.239SerbiaMoravicki okrugCacakNeterra Ltd.35122, 19229, 50225, 22175, 46822, 19223, 36224, 12228, 22380, 22676... (16 more)
Activity shows a focused approach on a handful of ports, such as 35122, 19229, 50225. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.226United StatesSouth CarolinaNorth CharlestonGoogle LLC30001, 9248, 49584, 9132, 40007, 9743, 9880, 18887, 1719, 48727... (757 more)
System monitoring reveals a focused approach on a handful of ports, such as 30001, 9248, 49584. The attacker appears to be leveraging a data center hideout.
China flag
115.55.241.78ChinaHenanHebiChina Unicom Henan Province Network23
System analysis reveals a focused attack targeting Telnet.
United States flag
162.216.150.155United StatesSouth CarolinaNorth CharlestonGoogle LLC49779, 10348, 9816, 9097, 34447, 32508, 1913, 46919, 3310, 53362... (763 more)
Network inspection reveals a focused approach on a handful of ports, such as 49779, 10348, 9816. The attacker appears to be leveraging a data center hideout.
United States flag
167.94.138.98United StatesMichiganAnn ArborCensys Inc.36927, 40792, 13301, 10077, 40410, 16633, 45157, 35978, 19324, 34297... (394 more)
System monitoring reveals a focused approach on a handful of ports, such as 36927, 40792, 13301. The attacker is perhaps masquerading as a search engine bot?
United States flag
162.216.149.99United StatesSouth CarolinaNorth CharlestonGoogle LLC8063, 9865, 18326, 8818, 49159, 9929, 13651, 48356, 49346, 21026... (689 more)
Network inspection reveals a focused approach on a handful of ports, such as 8063, 9865, 18326. The attacker appears to be leveraging a data center hideout.