OMG! We're under attack!


Yes, we are indeed. And I believe that the more you know an attack, the better you can defend from it. That's why we are working on deploying honeypots and other open-source security monitoring systems so that we can provide informations about the threats that any random internet actor should worry about.

That's it, we monitor everything we can and it begins with you, visitor of this page :
Your IP : 54.167.18.170
Your http request source port: 59256

Details of the HTTP header:
User-Agent: CCBot/2.0 (https://commoncrawl.org/faq/)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Host: nsm.antoinepelloux.eu
Connection: Keep-Alive
Accept-Encoding: gzip


What's going on here?


You may browse the different categories on the top of this page to check statistics and details about last attacks caught :

  • Credentials

  • The server is providing fake remote access services (SSH, VNC...). Any connection attempt is logged and login/passwords are available as well as basic statistics (Top 10 login...).
  • IDS

  • Other websites are hosted on this server. Intrusion detection systems are implemented on this server too. Here, you will find what malicious activities is threatening any website.
  • Footprinting (not available yet)

  • This section links to tools that are gathering remote host informations (OS, connection clients, User-agents...)
  • Malwares (not available yet)

  • This section is not working yet, but the objective is to open the door to worms, trap them and dissect them!