Synthetic Data: All metrics displayed are aggregated from research infrastructure. No personal data is collected or displayed. Sampling rate: ~5%.

Total Observed
0
lifetime events
Last 24h 0 events
12%
Last 7d 0 events
8%
Active Sensors 0 nodes
stable

// Attack Origins (7d)

World Map
Attack origin
Our sensors

// Event Stream

LIVE FEED
0 events/min
SSH Brute Force DE 103.245.xxx.xxx
30s ago
SMTP Scan US 157.230.xxx.xxx
59s ago
SMTP Scan VN 103.245.xxx.xxx
36s ago
FTP Auth KR 185.220.xxx.xxx
14s ago
SMTP Scan US 139.59.xxx.xxx
55s ago
SMTP Scan DE 45.155.xxx.xxx
9s ago
SSH Brute Force US 139.59.xxx.xxx
7s ago
SSH Brute Force ID 45.155.xxx.xxx
12s ago
Activity Timeline (24h)
ONLINE
48 Current
63 Avg
95 Peak
00:0006:0012:0018:00Now
Target Ports (7d)
INFO
#1
22 SSH
12,847
#2
23 Telnet
4,521
#3
445 SMB
3,892
#4
3389 RDP
2,891
#5
80 HTTP
2,103
#6
443 HTTPS
1,247
#7
21 FTP
892

// Noise Taxonomy

SSH Brute Force

0

Credential stuffing and dictionary attacks targeting SSH services.

SMTP Probes

0

Mail server enumeration and open relay testing.

Web Crawlers

0

Automated vulnerability scanners and reconnaissance bots.

Telnet Scanners

0

IoT botnet propagation attempts (Mirai variants).

Data Collection

Our sensor network consists of distributed honeypots deployed across multiple regions. Data is sampled at approximately 5% to manage volume while maintaining statistical significance. All IP addresses are anonymized before storage. Geographic attribution is approximate and based on GeoIP databases.