{% extends "base.html" %} {% block title %}Threat Monitor - AUTARCH{% endblock %} {% block content %}
Real-time threat detection, network monitoring, and active counter-attack.
| Active Connections | -- |
| Failed Logins (5m) | -- |
| Suspicious Processes | -- |
| Scan Indicators | -- |
| Bandwidth (RX/TX) | -- |
| ARP Spoof Alerts | -- |
| New Listening Ports | -- |
| Conn Rate (1m avg) | -- |
| DDoS Status | -- |
| Local | Remote | State | PID | Process | Action |
|---|---|---|---|---|---|
| Click "Load Connections" to view active network connections. | |||||
Click "Scan ARP Table" to check for spoofing.
First click establishes a baseline. Subsequent clicks detect new listeners.
Click "Generate Report" for a full threat analysis.
Live packet capture via Scapy. Requires root/admin privileges.
Click "Refresh" to load top talkers.
Enables SYN cookies (Linux) or SynAttackProtect (Windows) to mitigate SYN floods.
Click "Refresh" to load history.
Active response tools. Use with caution — actions are immediate and may affect network connectivity.
Click "Refresh Blocklist" to load.