
Seeing and Hearing Internet Background Radiation
See the hidden world of bot attacks and scanner chatter. Listen to Internet Background Radiation on a virtual Geiger counter. Over 3 million served.

See the hidden world of bot attacks and scanner chatter. Listen to Internet Background Radiation on a virtual Geiger counter. Over 3 million served.
When I put my first server up on the internet, I was shocked by the number of bots that immediately tried to break in. I showed the logs to my kids, and they asked "where are all these bots coming from?" To answer this question visually, I built https://knock-knock.net . My goal was to build a visually appealing, educational, and fun site that shows the origins of the bots, the most commonly attempted usernames and passwords in credential attacks, as well as the worst offending ISPs. My newest version here reveals attacks across multiple internet protocols, and across multiple servers, aggregated into a single display.
Click the speaker icon to hear a virtual geiger counter detect what has been called "the background radiation of the internet." If the info is being presented too quickly, hit the pause button or space bar.
Technical info: I built a set of python-based honeypots feeding into a SQL database, with a Uvicorn front-end receiving knock information via websockets.
Have fun. Source code is available at https://github.com/djkurlander/knock-knock
Visit https://knock-knock.net for live data.
A few months ago I posted a web site that I built to show hostile bot traffic hitting my seemingly unprotected VPS. Since then, I have expanded the honeypot to support Telnet, FTP, RDP, SMB, SIP, HTTP, SMTP, in addition to SSH. The site now shows all of my idlers (8) feeding into a single aggregate display. See the bots' locations, favorite usernames, passwords, an ISP Wall of Shame, and more, all of which can be filtered by protocol.
Click the speaker icon to hear a virtual geiger counter detect what has been called "the background radiation of the internet". If the data is coming in too fast, hit the pause button or space bar.
The source is available here: https://github.com/djkurlander/knock-knock
Have fun, and send comments or questions.
To see the latest data, visit: https://knock-knock.net
A 3D heatmap globe, showing bots attacking my servers in realtime. The globe shows the sources of over 1 million attacks across multiple internet protocols. It uses colors and country extrusion heights to indicate the worst offending countries. With every attack, the globe and leaderboard update to show the origin of the attack with a green pulse (and optional sound).
Interesting Geographic Notes:
Tech: Built with python-based honeypots, feeding into a SQL database recording all the info for posterity. The front-end is a uvicorn-based server communicating with the backend via websockets. Globe library courtesy of Globe.GL.
Data source: A SQL database storing over 900,000 Internet bot attacks, aggregated from honeypots on 8 different servers. Visit https://knock-knock.net to see a live presentation of that data.
Visualization: a dynamically rotating 3D globe heat map, with countries rendered as extruded polygons having a height and color reflecting the number of attacks seen so far. Accompanied by a scrolling leaderboard, with globe and leaderboard pulses in sync with each knock.
Audio Visualization: Accompanying "clicks", once for each attack (or "knock"), are intended to represent a geiger counter, measuring what is often referred to as "internet background radiation."
Underlying Technology: A set of honeypots for SSH, Telnet, FTP, RDP, SMB, SIP, HTTP, and SMTP protocols, communicating with the browser via web sockets. The globe code provided by Globe.GL.
To see and hear this live, visit: https://knock-knock.net, which also shows a live feed of the bot attacks, the most frequent usernames and passwords attempted, an ISP Wall of Shame, and more. Click the speaker icon to hear the "internet background radiation".
Source is available at https://github.com/djkurlander/knock-knock