MIRE/C³: Multi-layer Intrusion Response Engine

What is happening with the MIRE/C³ cluster?

Statistics from the Last 24 Hours

The last 24 hours of The MIRE/C³ Cluster.

Every request is logged, every response deliberate. By carefully dispensing the Secret Sauce (treacle), the system keeps attackers engaged long enough to cost them time, bandwidth, and effort—sometimes with unexpected results for the most persistent visitors.

Statistics from the Last 7 Days

7 Days in the Life of The MIRE/C³ Cluster.

Statistics from the Last 30 Days

A Month in the Life of The MIRE/C³ Cluster.

MIRE/C³ Trends

Trends in volumes, delays and sizes on The MIRE/C³ cluster.

The MIRE/C³ Rabbit Hole

MIRE/C³ serves what it can when asked. Archives are particularly popular and are rendered as authentically as possible. Some present a greater challenge—protected by passwords—while others include additional bonuses baked directly into their structure.

All of this contributes to a carefully engineered cost in time, bandwidth, and effort.

Unique IPs Attacking The MIRE/C³

There is a genuine mix of occasional visitors and repeat offenders trying to steal data from the MIRE/C³.

All-Time Summary for The MIRE/C³ Cluster

The record of all intrusion attempts since log reset.

Meet Our Biggest Fan!

Meet the host on the internet that hits the MIRE/C³ cluster more than any other. It’s almost certainly automated — tirelessly scanning the entire internet and probing anything it can find.

MIRE/C³ User Agent Top 10

User Agents hitting The MIRE/C³; legitimate agents and scripting agents are featured.