Defending Our Digital Home: Is your home Internet connection under attack?

In our interconnected world of fibre broadband, mobile phones, and homes full of ‘Internet of Things’ devices, where digital highways cross continents, our internet connections are often the lifeblood of communication, work, and entertainment (at least our teenagers think so).

But lurking in the shadows are cyber adversaries, constantly probing and attacking these vital pathways.

I wanted to understand the attacks a typical home internet connection may experience and, more importantly, what we must act on to protect our homes and families.

Why would your home internet connection be under attack?

In the vast digital expanse, where data flows ceaselessly, cyber adversaries prowl with intent, or at least that’s what an old, cynical cybersecurity professional like me thinks.…. But am I right, and if so, what motivates these people?

From my professional experience, their motivations are diverse, their methods cunning, and their impact often far-reaching. They may not necessarily be trying to target your home internet connection and home network. You’re just an IP address they throw their tools at to see what sticks.

Let’s examine some common motivations for cyber-attacks:

2. Espionage and Nation-State Agendas

3. Ideology and Activism

How could my home internet connection/home network be attacked?

Cyber attackers have a wide range of tools and techniques they can use.

Methods include automated scanning for open ports or vulnerabilities, password guessing of network devices, and exploiting known firmware or software vulnerabilities. For example, routers run on firmware, which rarely gets updated. Attackers can exploit these unpatched security flaws. Also, most routers often come with pre-set default passwords, which most of us don’t change, making them susceptible to attack. Unfortunately, attackers can easily guess or find these default passwords, gaining unauthorised access to countless devices connected to your network. We must change the default passwords for our Wi-Fi and the administrative login to the routers.

How can I understand what attacks are occurring on my home internet connection?

Well, I’m a bit of a geek. 27 years in cybersecurity and networking does that to a person, so I found a way. You see, your home network is like a fortress with multiple gates. The gateway to this fortress is your service provider router. As mentioned, there are ways to compromise these gateways, so we need some guards on the gate to monitor things. I mainly want my guards to be effective in protecting my gate.

In this case, however, I want to build a fake gate which is open and has a guard asleep so I can understand what attacks are coming my way and, through analysis, understand what measures I need to put in place to provide suitable protection.

I found this in a powerful tool called T-Pot, an all-in-one multi-honeypot platform.

What Is a Honeypot?

Before diving into T-Pot, let’s briefly explore honeypots. These intriguing cybersecurity decoys are designed to attract malicious actors. They mimic vulnerable systems, enticing attackers to interact with them. By analysing behaviour, we gain valuable insights into attack techniques, patterns, and vulnerabilities.

Introducing T-Pot

T-Pot takes honeypots to the next level by supporting 20+ honeypots and covering a wide range of services and protocols. Whether SSH, HTTP or even VoIP, T-Pot has you covered.

It comes with Elastic Stack Integration, allowing you to visualise and analyse honeypot data quickly. You can deep dive into Kibana dashboards, explore animated live attack maps, and gain actionable insights. T-Pot allows you to understand attacker behaviour and improve defences.

For more information on T-Pot, head to the project GitHub page at https://github.com/telekom-security/tpotce.

So, what did I find?

Well, I’ve had T-Pot up and running for a few weeks now, and the data is interesting.


I’m seeing around 100,000 attacks daily on my regular home internet connection.  The number of attacks falls by about 50% on the weekend; I guess even the bad guys take time off.

Most of these attacks are automated scans, at least initially.  Most come from IP addresses documented as ‘bad actors’ and ‘anonymous locations’ such as TOR (the dark web) exit nodes.

Attacks come from many different countries, with the United States being the primary one, surprisingly, but also Brazil, China, Russia, etc., depending on the period I examine.  The USA is consistently at the top, in any case.

TPot collects usernames and passwords used to try and exploit the vulnerable services running in the honeypots. Most of them are simple, expected passwords such as ‘password’ or ‘123456’, which shows how effective longer, complex passwords are in avoiding attacks. The automated scans are looking for low-hanging fruit.

What can we do to defend our digital homes?

Secure Your Router

Increase Security

Educate Family Members

Isolate IoT Devices

Final thoughts

Our internet connections are under constant siege. I was genuinely surprised at the number of attacks I was seeing in 24 hours, even more so when I expanded it out to 7 or even 30 days. Yes, most were low-level automated scanning, looking for easy ways in. Still, I thought the sheer number was staggering, and if I didn’t have several layers of protection, I might have been more concerned.

I’ve delved deeper into some of these attacks, added additional layers and controls to my network to help defend against them, and learned new methods and techniques based on the things I monitored.

Reviewing our security practices and looking for improvements based on threat intelligence is always good. Ensuring your systems' software and firmware are updated is good, and blocking entire countries you don’t communicate with is a good thing.  Shutting down services you don’t need and securing the remaining is good.

Remember, we can fortify our digital homes by staying vigilant, regularly updating our defences, and educating ourselves and our families. Remember, we’re all guardians of our own cyberspace.


ALSO PUBLISHED AT: https://www.linkedin.com/pulse/defending-our-digital-home-your-internet-connection-under-cardwell-fopze/?trackingId=iZ8%2FNqkuRlqwUk8dC%2F%2BnqA%3D%3D