Wall of Sheep

wall of sheep

In today’s digital landscape, the threat of online attacks is a constant concern. My website, like many others, is a target for such threats. To address this, I've set up a system to monitor and display attempted intrusions against my servers.

Fans of DEFCON, a renowned cybersecurity conference, might be familiar with their 'Wall of Sheep' — a feature that showcases vulnerabilities in network traffic during the event. Drawing inspiration from this, I’ve created a similar display, but with a focus on attacks targeting my servers. It’s a daily testament to the diverse range of attacks we face, going beyond just website vulnerabilities to include attempts on all server ports.

The purpose of my 'Personalized Wall of Sheep' is educational. It serves as a live example of the relentless attacks servers endure, and aims to raise awareness among my visitors. This display is a vivid reminder that cyber threats are universal, affecting not just big corporations but every entity connected to the internet. It underscores the vital importance of cybersecurity for everyone.

In the Last 24 Hours

Detected a total of 4,033 unique cyber attackers who, collectively, were responsible for 18,445 breach attempts.

Unique Cyber Attackers - Last 14 Days

(Each attacker is recorded once per day, regardless of the number of attempts)

To the right is a chart that illustrates the geographical distribution of the attacks against my servers. This chart categorizes each hacking attempt by its country of origin, providing visual insight into the diverse, global sources of these cyber intrusions.

It’s important to note, however, that geographical distribution can sometimes be masked using various techniques. Therefore, in instances where such masking was detected, these attackers have been reassigned to the category ‘obscured’ in the pie chart.

This chart breaks down the different kinds of traffic trying to access my network, focusing on whether the source is hidden or masked. It shows how attackers hide their identity using methods like VPNs, public proxies, or data centers.

This helps us understand the variety of ways attackers try to stay anonymous and the tactics they use to try to get past security measures.

The chart on the right showcases the top 20 data centers being used to launch attacks. These range from public cloud services to smaller providers.

This not only indicates the diversity of platforms used in cyber offensives but also suggests that many of these providers might be unaware of their infrastructure's misuse, highlighting a critical aspect of the cybersecurity challenge.

Attackers over the last 24 hours

The most recent 25 attackers

IPCountryRegionCityISPPorts
United States flag
162.216.150.9United StatesSouth CarolinaNorth CharlestonGoogle LLC36431, 65233, 281, 45463, 781, 9990, 43209, 21265, 30278, 50645... (712 more)
Activity shows a focused approach on a handful of ports, such as 36431, 65233, 281. The attacker appears to be leveraging a data center hideout.
United States flag
198.199.95.91United StatesCaliforniaSan FranciscoDigitalOcean LLC8000, 5900, 18480, 5901, 5007, 25, 2380, 8580, 5902, 8889... (27 more)
System analysis reveals a focused approach targeting VNC, SMTP, and others. The attacker is behind the veil of a VPN.
United Kingdom flag
35.203.211.103United KingdomEnglandLondonGoogle LLC992, 45890, 556, 4043, 48823, 49103, 2502, 9913, 52000, 17777... (686 more)
Activity shows a focused approach on a handful of ports, such as 992, 45890, 556. The attacker appears to be leveraging a data center hideout.
United States flag
43.153.15.128United StatesCaliforniaSanta ClaraTencent Cloud Computing (Beijing) Co. Ltd...7575, 5520, 16039, 7578, 6656, 3019, 18039, 10670, 8389, 51007... (112 more)
System monitoring reveals a focused approach on a handful of ports, such as 7575, 5520, 16039. The attacker appears to be leveraging a data center hideout.
China flag
58.49.140.21ChinaHubeiWuhanChinaNet Hubei Province Network6379
System analysis reveals a focused attack targeting Redis.
China flag
47.92.50.35ChinaBeijingBeijingAliyun Computing Co. Ltd6379
Digital footprint reveals a focused attack targeting Redis. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.219United StatesSouth CarolinaNorth CharlestonGoogle LLC9027, 28999, 9350, 48971, 12373, 9508, 21398, 31083, 2324, 569... (681 more)
System monitoring reveals a focused approach on a handful of ports, such as 9027, 28999, 9350. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.7United StatesSouth CarolinaNorth CharlestonGoogle LLC8869, 46786, 9347, 60099, 6622, 40206, 9867, 7878, 1194, 30000... (719 more)
Network inspection reveals a focused approach on a handful of ports, such as 8869, 46786, 9347. The attacker appears to be leveraging a data center hideout.
United States flag
143.42.164.127United StatesCaliforniaFremontAkamai Technologies Inc.3030, 56777, 9004, 5188, 6888, 34513, 5679, 6070, 1042, 10021... (752 more)
System monitoring reveals a focused approach on a handful of ports, such as 3030, 56777, 9004. The attacker appears to be leveraging a data center hideout.
United States flag
18.222.227.254United StatesOhioColumbusAmazon Technologies Inc.6588, 4157, 9304, 54984, 2560, 9209, 5552, 4444, 9119, 5006... (580 more)
Digital footprint reveals a focused approach on a handful of ports, such as 6588, 4157, 9304. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.150.239United StatesSouth CarolinaNorth CharlestonGoogle LLC9379, 28139, 14295, 9370, 18008, 10089, 8001, 9469, 9723, 26789... (698 more)
System monitoring reveals a focused approach on a handful of ports, such as 9379, 28139, 14295. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.210.79United KingdomEnglandLondonGoogle LLC22940, 1722, 8729, 48570, 8847, 8832, 9540, 35929, 9410, 18140... (694 more)
System monitoring reveals a focused approach on a handful of ports, such as 22940, 1722, 8729. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.79United StatesSouth CarolinaNorth CharlestonGoogle LLC9204, 49951, 46620, 48040, 9740, 9195, 9782, 7545, 47694, 49518... (692 more)
Activity shows a focused approach on a handful of ports, such as 9204, 49951, 46620. The attacker appears to be leveraging a data center hideout.
United States flag
47.243.4.163United StatesCaliforniaSan MateoAlibaba Cloud LLC2376, 2375, 6379
System monitoring reveals a selective approach targeting Redis, and others. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.70United StatesCaliforniaSanta ClaraPalo Alto Networks Inc54528, 4567, 9093, 10443, 3929, 44818, 2484, 139, 40000, 7070... (108 more)
Activity shows a focused approach targeting NetBIOS, and others. The attacker appears to be leveraging a data center hideout.
Russian Federation flag
185.11.61.120Russian FederationMoskvaMoscowStarcrecium Limited50043, 10906, 3360, 1025, 5845, 10389, 9100, 3215, 2890, 9888... (281 more)
System analysis reveals a focused approach on a handful of ports, such as 50043, 10906, 3360. The attacker is behind the veil of a VPN.
United Kingdom flag
35.203.211.216United KingdomEnglandLondonGoogle LLC17001, 18354, 8910, 666, 9524, 9394, 46191, 45551, 54233, 5301... (715 more)
Activity shows a focused approach on a handful of ports, such as 17001, 18354, 8910. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
35.203.211.58United KingdomEnglandLondonGoogle LLC44756, 5533, 5445, 3082, 57357, 9666, 36444, 18000, 9038, 46635... (711 more)
Network inspection reveals a focused approach on a handful of ports, such as 44756, 5533, 5445. The attacker appears to be leveraging a data center hideout.
United Kingdom flag
185.165.191.27United KingdomEnglandLondonBlackHOST Ltd.9306, 4242, 26, 9080, 3310, 5357, 83, 2345, 7171, 119... (43 more)
System analysis reveals a focused approach on a handful of ports, such as 9306, 4242, 26. The attacker appears to be leveraging a data center hideout.
United States flag
162.216.149.19United StatesSouth CarolinaNorth CharlestonGoogle LLC47253, 9276, 9904, 188, 9988, 9675, 40089, 15000, 47804, 47223... (664 more)
Digital footprint reveals a focused approach on a handful of ports, such as 47253, 9276, 9904. The attacker appears to be leveraging a data center hideout.
United States flag
167.94.138.128United StatesMichiganAnn ArborCensys Inc.808, 88, 6881, 1962, 81, 5938, 5000, 4443, 5222, 6699... (163 more)
Network inspection reveals a focused approach on a handful of ports, such as 808, 88, 6881. The attacker is perhaps masquerading as a search engine bot?
United States flag
162.216.149.132United StatesSouth CarolinaNorth CharlestonGoogle LLC1636, 19100, 9876, 8006, 4083, 47525, 47624, 9307, 1252, 22322... (712 more)
System analysis reveals a focused approach on a handful of ports, such as 1636, 19100, 9876. The attacker appears to be leveraging a data center hideout.
Australia flag
170.64.199.250AustraliaNew South WalesSydneyDigitalOcean LLC3128, 3000, 22533, 1337, 4444, 8884, 8899, 50050
System monitoring reveals a focused approach on a handful of ports, such as 3128, 3000, 22533. The attacker appears to be leveraging a data center hideout.
United States flag
198.235.24.16United StatesCaliforniaSanta ClaraPalo Alto Networks Inc59382, 51200, 8000, 20121, 16010, 21242, 6000, 4024, 465, 1723... (216 more)
Network inspection reveals a focused approach on a handful of ports, such as 59382, 51200, 8000. The attacker appears to be leveraging a data center hideout.
United States flag
205.210.31.64United StatesCaliforniaSanta ClaraPalo Alto Networks Inc20256, 53631, 23, 9001, 1883, 18080, 58000, 4332, 1443, 50997... (98 more)
System analysis reveals a focused approach targeting Telnet, and others. The attacker appears to be leveraging a data center hideout.