{% extends "base.html" %} {% block title %}Counter Intelligence - AUTARCH{% endblock %} {% block content %}

Full Threat Scan

Click "Run Scan" to check for threats.

Quick Checks

Suspicious Processes

Scan for known malicious process names


        

Network Analysis

Check for suspicious connections


        

Login Anomalies

Quick failed login check


        

File Integrity

Check recently modified critical files


        

Scheduled Tasks

Check cron jobs for suspicious commands


        

Rootkit Detection

Basic rootkit and hidden process checks


        

Login Analysis

Detailed failed login analysis with GeoIP enrichment (top 15 IPs)

Click "Analyze Logins" to view failed login attempts.
{% if modules %}

Counter Modules

{% endif %} {% endblock %}