Note: this summary is based on the last 3 months of data.
.png&w=1200&q=75)
15 million attacks per day
Together, the CrowdSec Community blocked  15 million  attacks from  650'000  unique attackers per day. 

A growing herd
Our herd also grew at a consistent rate this year, leading to a  95%  increase in active Security Engines. 

Supreme Leader Debian
Similar to last year, a majority of our users are hosting their services on  Debian , but  FreeBSD-based  systems beat them in growth this year, contributing about 25% of our network growth. 

Attacking us? Attacking US!
When it comes to the origin of attackers, big countries continue to dominate. Leader of the pack is the  US  with  4.7 million  unique malicious IPs, followed by India with 1.8 million attackers and Germany with 1.6 million. 

Hosting captured machines
When it comes to Autonomous Systems, hosters lead the charts, making up  80% of our top 10 AS . The remaining 2 are internet service providers from Brazil and China respectively. As with previous years,  most of the attackers  hitting servers are themselves  captured machines . 
.png&w=1200&q=75)
HTTP dethrones SSH
This year was the first time that we prevented more HTTP attacks than SSH attacks. This coincides with our renewed focus on the web with the release of the  CrowdSec Web Application Firewall . At its peak, the CrowdSec network detected  16.5 million  unique attackers engaging in scanning and reconnaisance behaviors. 

Lots of love for PHP
We caught a lot of CVEs this year. Good old  CVE-2017-9841  was still the most attempted exploit for this year. For a breakdown of each countries favorite CVE, check the following table: 
| Brazil | CVE-2021-43798: Path Traversal in Grafana | 
| USA | CVE-2017-9841: Remote Code Execution in PHPUnit | 
| Germany | CVE-2021-26086: Path Traversal in Atlassian Jira | 
| China | CVE-2024-6387: Race Condition in OpenSSH (RegreSSHion) | 
| Great Britain | CVE-2021-26086: Path Traversal in Atlassian Jira | 
| France | CVE-2023-22515: Remote Code Execution in Atlassian Confluence | 
| India | CVE-2021-41773: Path Traversal in Apache HTTP Server | 
| Japan | CVE-2018-20062: Remote Code Execution in NoneCMS | 
| Russia | CVE-2021-43798: Path Traversal in Grafana | 
| Australia | CVE-2022-26134: Remote Code Execution in Atlassian Confluence | 
.png&w=1200&q=75)
Drop it like it's hot
With version 1.6.3 of the Security Engine, we released the  Remediation Component metrics  to help our users understand the impact of our blocklists. Among the 6000 organizations that have already enabled this, we drop over  35 billion packets per month . If those packets were not blocked they would produce an estimated  60 TB  of server logs 

Talk is cheap, send patches!
Together with our open source community we received around  670 contributions  to the Security Engine. In addition to this,  39 people  contributed their scenarios and parsers to our Hub, helping us improve the protection for the whole CrowdSec Network. Whether its raising issues or contributing code,  we thank you very much for your help!  
 ConsoleHubDocsCrowdSec
ConsoleHubDocsCrowdSec
