{% extends "base.html" %} {% block title %}Counter Intelligence - AUTARCH{% endblock %} {% block content %}
Scan for known malicious process names
Check for suspicious connections
Quick failed login check
Check recently modified critical files
Check cron jobs for suspicious commands
Basic rootkit and hidden process checks
Detailed failed login analysis with GeoIP enrichment (top 15 IPs)