ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > cybersecurity > I invited hackers to attack my dwelling server, and the outcomes had been a warning sign
    I invited hackers to attack my dwelling server, and the outcomes had been a warning sign
    01
    Feb
    • ForensicsS
    • 0 Comments

    I invited hackers to attack my dwelling server, and the outcomes had been a warning sign

    Identity theft


    identity theft 4

    Published Feb 1, 2026, 10:15 AM EST

    Cut Lewis is an editor at How-To Geek. He has been the utilization of computers for 20 years — tinkering with the entirety from the UI to the Dwelling windows registry to instrument firmware. Old to How-To Geek, he used Python and C++ as a freelance programmer. In college, Cut made large consume of Fortran while pursuing a physics level.

    Cut’s fancy of tinkering with computers extends previous work. He has been running video game servers from dwelling for better than 10 years the utilization of Dwelling windows, Ubuntu, or Raspberry Pi OS. He also uses Proxmox to self-host a diversity of providers and products, alongside with a Jellyfin Media Server, an Airsonic song server, a handful of game servers, NextCloud, and two Dwelling windows digital machines.

    He enjoys DIY initiatives, especially within the event that they dangle know-how. He step by step repairs and repurposes dilapidated computers and hardware for no topic recent project is at hand. He has designed crossovers for homemade audio system all the potential from the considerable win to the PCB.

     Cut enjoys the exterior. When he isn’t very any longer engaged on a computer or DIY project, he is most inclined to be stumbled on camping, backpacking, or canoeing.

    Self-web web hosting is both an interesting ardour while you cherish computers, and an cheap potential to set apart about a dollars while you swap out your subscription providers and products for something you host your self. It does attain with moderately threat, then again, while you set apart your self-hosted providers and products on-line so that they’re accessible from the fetch. I used to be uncommon about what create of attacks my server was getting, so I space up a honeypot to gaze what happened.

    What is a honeypot?

    Within the cybersecurity world, a honeypot is a tool that is designed to plot the glory of hackers (or other forms of cybercriminals). Honeypots take about a diversified forms and provide about a crucial capabilities.

    Typically a honeypot can take the create of a faux download that is used to reap the IP addresses of folk attempting to amass unlawful articulate material.

    In other instances, a honeypot is a program that runs on a server that is designed to peep cherish a weak target for hackers. That affords about a advantages.

    At the initiating, a honeypot permits cybersecurity specialists (or a dedicated self-hoster) to search out out what create of attacks their server is experiencing. Are the hackers attempting to attack a specific port, which signifies they’re aiming to consume a specific provider? When originate they attack, and the place does their online page online page visitors build? All of these components can provide insight into lovely how hackers (or other styles of malicious actors) are attacking, and that insight will be utilized to forestall them from being a success one day.

    Furthermore, a honeypot will be utilized to plot attackers away from legit targets. If they’re busy hitting what appears to be cherish a extraordinarily weak target that is mainly a ineffective-discontinuance, maybe they would possibly maybe presumably well miss your Minecraft server that has been as it goes to be secured.

    Picking a honeypot for my server

    Whenever you search the fetch for server honeypot it’s seemingly you’ll presumably well be ready to search out a huge fluctuate of choices with extraordinarily technical descriptions. Whenever you kind no longer know what you’re seeking in attain, most of it’s miles no longer helpful. Alternatively, there’s a project that brings together a huge fluctuate of diversified honeypots into one convenient package: T-Pot.

    T-Pot provides 30 sure honeypots, plus a dozen tools that originate issues cherish mechanically restart broken honeypots, encrypt your honeypot files, visualization tools, and a web based fully mostly frontend that makes running the total setup as straightforward as seemingly.

    To speed T-Pot, the creators recommend at the least 16GB of RAM and 256GB of storage, even though it’s seemingly you’ll presumably well be ready to squeeze by with a piece less. I if truth be told space up T-Pot on my 8GB Raspberry Pi 4 with a 128GB microSD card. It has been running for rather some time now with out a difficulty.

    What did my honeypot fetch?

    No topic running quite loads of servers on my network (about a of which will be exposed to the fetch), I had fewer hits on my honeypot than I would seek files from, and none of them had been extreme.

    identity theft The honeypot dashboard in T-Pot.

    My honeypots maintain purchased a total of 227 hits over the previous 5 days, actually all of them from IPs managed by Talos Intelligence, which is a cybersecurity neighborhood speed by Cisco.

    Though my sincere outcomes are a piece tame, while you fetch yourself talking about cybersecurity, tedious is correct! You kind no longer desire a ton of attacks hitting your servers step by step if it will seemingly be evaded.

    identity theft A beach chair under a parasol surrounded by hooks and warning signs, indicating a scam.


    4 customary ways Dwelling windows PCs win hacked and the solution to forestall them

    Most Dwelling windows hacks are made seemingly by your every day habits, no longer sophisticated attacks.

    Constructing T-Pot to your server

    T-Pot is designed to be as user-pleasant as seemingly, and while it’s seemingly you’ll presumably well well cherish, it’s seemingly you’ll presumably well be ready to space it up to your server with a single direct.

    First, open by connecting to your Linux server as you repeatedly originate. Whenever you fetch yourself the utilization of a headless server, join over SSH, or while you maintain a mouse and keyboard space up at your server, it’s seemingly you’ll presumably well be ready to manually enter it that suggests as an different. Alternatively, you can no longer consume a GUI with T-Pot on a Linux server—it couldn’t work.

    T-Pot is within the marketplace for Dwelling windows and macOS too.

    Alternatively you win watch over your server, enter the following direct within the terminal:

    env bash -c "$(curl -sL https://github.com/telekom-security/tpotce/raw/master/install.sh)"
    

    That can mechanically download and install the entirety you want. At some stage within the setup process, it’s seemingly you’ll presumably well be prompted to construct a username a password. Be particular you write it down. Those credentials are the potential you win admission to T-Pot’s web interface.

    identity theft AVG Logo

    AVG Antivirus Free

    OS

    Dwelling windows, macOS, iPadOS, iOS, Android

    Place

    $78/year

    As soon as the entirety is carried out installing, lovely restart your server, look forward to it to attain lend a hand lend a hand on-line, and speed the dps direct. If the entirety went effectively, it’s most predominant to specialize in a record of running honeypots.

    identity theft Confirming that the honeypots are running on your server.

    Then, to your browser, enter https://(Your IP Right here):64297/ to see the fetch interface.

    identity theft The T-Pot web interface.

    I would recommend initiating with Kibana. It provides overview of what your honeypots are doing.


    A honeypot isn’t very any longer a strictly wanted portion of my self-web web hosting setup, however pondering how extremely straightforward it’s miles to space up and video show, I’m going to proceed the utilization of it for the foreseeable future. In a worst difficulty, I extinguish some storage house and maintain to delete dilapidated logs intermittently.

    At simplest, I create insight into the forms of attacks that would possibly maybe presumably well hit my self-hosted providers and products, and would possibly maybe presumably well better supply protection to myself one day.

    Learn Extra

    • Tags

    • cybercrime cybercrimefraud cybersecurity email-fraud forensics|digital-forensics hackers Investigation invited malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Hong Kong small print investigations into online food complaints
    • Republican Secretary of Inform Brad Raffensperger Names Jason Doss as Investigative Agent in First Liberty Fallout
    • Exposed MongoDB cases soundless centered in records extortion assaults
    • I invited hackers to attack my dwelling server, and the outcomes had been a warning sign
    • I watched the Georgia 2020 divulge. Here’s what the FBI raid in Fulton County is de facto about.

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Hong Kong small print investigations into online food complaints
    Republican Secretary of Inform Brad Raffensperger Names Jason Doss as Investigative Agent in First Liberty Fallout
    February 1, 2026
    Republican Secretary of Inform Brad Raffensperger Names Jason Doss as Investigative Agent in First Liberty Fallout
    Exposed MongoDB cases soundless centered in records extortion assaults
    February 1, 2026
    Exposed MongoDB cases soundless centered in records extortion assaults

    Popular Tags

    administration calls Confirms Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers Investigation investigationfraud Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Million Minnesota North online-scam online-scamphishing-attack orders Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO