Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 3,938 unique cyber attackers who, collectively, were responsible for 20,918 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
198.235.24.104United StatesCaliforniaSanta ClaraPalo Alto Networks Inc110, 1234, 20257, 12345, 40005, 53524, 1443, 3443, 139, 5555... (120 more)
System monitoring reveals a focused approach targeting POP3, NetBIOS, and others. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.103United StatesSouth CarolinaNorth CharlestonGoogle LLC46916, 23231, 9552, 56220, 7776, 8172, 8151, 49835, 9437, 35672... (777 more)
System analysis reveals a focused approach on a handful of ports, such as 46916, 23231, 9552. The attacker appears to be leveraging a data center hideout.
United States flag
192.241.199.32United StatesCaliforniaSan FranciscoDigitalOcean LLC3351, 502, 514, 17990, 18091, 1930, 2376, 138, 5269, 20... (29 more)
Network inspection reveals a focused approach on a handful of ports, such as 3351, 502, 514. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.113United KingdomEnglandLondonGoogle LLC25864, 5022, 9507, 30452, 46364, 43056, 2322, 45790, 9044, 211... (790 more)
Network inspection reveals a focused approach on a handful of ports, such as 25864, 5022, 9507. The attacker appears to be leveraging a data center hideout.
China flag
106.122.172.144ChinaGuangdongGuangzhouChinaNet Guangdong Province Network23
Activity shows a focused attack targeting Telnet.
United Kingdom flag
35.203.210.53United KingdomEnglandLondonGoogle LLC722, 9635, 3980, 22052, 47198, 9617, 8069, 46724, 7415, 8063... (789 more)
Network inspection reveals a focused approach on a handful of ports, such as 722, 9635, 3980. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.128United KingdomEnglandLondonGoogle LLC8066, 21276, 8126, 9715, 48302, 33592, 9887, 15588, 9401, 5089... (800 more)
System monitoring reveals a focused approach on a handful of ports, such as 8066, 21276, 8126. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.89United StatesSouth CarolinaNorth CharlestonGoogle LLC37412, 9432, 2281, 21760, 47342, 46640, 8044, 10038, 19222, 9614... (660 more)
System monitoring reveals a focused approach on a handful of ports, such as 37412, 9432, 2281. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.5United KingdomEnglandLondonGoogle LLC18887, 9945, 20080, 9068, 9417, 6745, 9488, 44556, 14403, 9980... (736 more)
Digital footprint reveals a focused approach on a handful of ports, such as 18887, 9945, 20080. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.138United KingdomEnglandLondonGoogle LLC8116, 10001, 8446, 49578, 9105, 8050, 6565, 9654, 54921, 9169... (759 more)
Network inspection reveals a focused approach on a handful of ports, such as 8116, 10001, 8446. The attacker appears to be leveraging a data center hideout.
United States flag
206.168.34.63United StatesMichiganAnn ArborCensys Inc.6002, 2083, 8020, 465, 5671, 831, 28080, 2087, 1962, 1194... (22 more)
System monitoring reveals a focused approach on a handful of ports, such as 6002, 2083, 8020. The attacker is perhaps masquerading as a search engine bot?
United Kingdom flag
35.203.211.241United KingdomEnglandLondonGoogle LLC9214, 8889, 14901, 51580, 44346, 1913, 48132, 2013, 49689, 14196... (786 more)
Digital footprint reveals a focused approach on a handful of ports, such as 9214, 8889, 14901. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.48United KingdomEnglandLondonGoogle LLC49306, 9111, 9651, 48796, 8023, 45444, 2554, 32768, 57712, 8060... (764 more)
Network inspection reveals a focused approach on a handful of ports, such as 49306, 9111, 9651. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.189United KingdomEnglandLondonGoogle LLC60245, 9957, 47394, 60170, 2288, 42285, 51242, 9480, 47987, 9236... (790 more)
System monitoring reveals a focused approach on a handful of ports, such as 60245, 9957, 47394. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.3United StatesSouth CarolinaNorth CharlestonGoogle LLC4508, 1252, 1234, 9670, 46439, 29842, 11010, 49684, 9326, 45877... (771 more)
Digital footprint reveals a focused approach on a handful of ports, such as 4508, 1252, 1234. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.154United StatesSouth CarolinaNorth CharlestonGoogle LLC8997, 9998, 3120, 24442, 20022, 28653, 8127, 8586, 51050, 9183... (849 more)
System monitoring reveals a focused approach on a handful of ports, such as 8997, 9998, 3120. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.31United StatesSouth CarolinaNorth CharlestonGoogle LLC28080, 93, 1011, 9982, 9315, 19092, 9119, 47254, 12022, 8150... (796 more)
Activity shows a focused approach on a handful of ports, such as 28080, 93, 1011. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.13United StatesSouth CarolinaNorth CharlestonGoogle LLC9112, 9780, 3322, 8074, 9335, 49503, 9538, 5988, 9398, 11111... (796 more)
System monitoring reveals a focused approach on a handful of ports, such as 9112, 9780, 3322. The attacker appears to be leveraging a data center hideout.
Colombia flag
190.24.142.85ColombiaHuilaSanta MariaOpitasEnLinea S.A.S.23
Network inspection reveals a focused attack targeting Telnet.
United States flag
192.241.204.63United StatesCaliforniaSan FranciscoDigitalOcean LLC1583, 15001, 500, 2323, 7199, 32400, 5351, 9443, 1962, 113... (31 more)
Network inspection reveals a focused approach on a handful of ports, such as 1583, 15001, 500. The attacker is behind the veil of a VPN.
United States flag
162.216.149.26United StatesSouth CarolinaNorth CharlestonGoogle LLC22001, 9581, 9964, 9256, 9266, 10300, 8054, 45648, 8094, 9520... (770 more)
Activity shows a focused approach on a handful of ports, such as 22001, 9581, 9964. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.106United StatesSouth CarolinaNorth CharlestonGoogle LLC46999, 9401, 9316, 801, 52592, 226, 5557, 8833, 5911, 2012... (836 more)
Digital footprint reveals a focused approach on a handful of ports, such as 46999, 9401, 9316. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.120United KingdomEnglandLondonGoogle LLC9678, 58020, 1523, 55888, 9420, 47971, 57222, 46140, 36510, 15812... (815 more)
System monitoring reveals a focused approach on a handful of ports, such as 9678, 58020, 1523. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
193.163.125.26United KingdomEnglandLondonConstantine Cybersecurity Ltd.5200, 6015, 64444, 3758, 60017, 49676, 984, 465, 4662, 5115... (62 more)
System monitoring reveals a focused approach on a handful of ports, such as 5200, 6015, 64444. The attacker appears to be leveraging a data center hideout.
United States flag
34.168.254.130United StatesOregonThe DallesGoogle LLC3306
Activity shows a focused attack targeting MySQL. The attacker appears to be leveraging a data center hideout.