What you can learn

Commonly Attacked Ports

Not all ports are created equal! Some are more vulnerable to attacks than others. This section explores the ports attackers frequently target and explains the potential risks associated with them. By understanding these high-risk ports, you can take steps to secure your systems and prevent unauthorized access.

Malicious IP Addresses

In the digital world, your IP address is like your home address. Just like some neighborhoods might experience more break-ins, some IP addresses are more likely to be targeted by malicious actors. This section sheds light on malicious IP addresses and how to identify them. We'll also explore strategies to protect yourself from attacks originating from these sources..

Commonly Attacked Protocols

Communication on the internet relies on protocols, like languages that devices use to understand each other. Unfortunately, some protocols are more susceptible to exploitation than others. This section dives into the protocols attackers often target and explains the vulnerabilities they might exploit. By understanding these protocols, you can implement stronger security measures to safeguard your systems.

Kibana Visualisation

You can also view the analysis and insights the team had done using Kibana. This information will provide you with notion of attackers' attacking scheme.