Welcome to my homeserver, called Jetstream. What is Jetstream you
may ask? Jetstream is a virtual machine that is running CentOS 6.5
Linux on my laptop. I use VirtualBox and it's quite stable. Probably my
most favorite hypervisor is VirtualBox. Jetstream's specs are 512MB of
RAM, 512MB swap, Intel Core 2 Duo T5850 2.16GHz, 20GB HDD. Jetstream's
network is CenturyLink (Embarq Tier) with 10Mbps down, and 0.80Mbps up. My lovely 2Wire
router/modem powers the network for Jetstream. My 2Wire runs a variant
of BSD and is actually a decent residential gateway! I really love it's
professional-grade firewall and it's ability to syslog and change more
advance settings such as what NTP servers to use. I've been trying to
find a way to gain SSH access to my 2Wire. I run a syslog host on
Jetstream, and my 2wire outputs the logs to it. I can then tail -f them
into the #ControlDeck IRC channel for live inspection of my network.
The 2Wire is much more stable than the Westell router I had. On a good
month when nobody touches me, I can achieve 100% uptime. What does
Jetstream do you may ask? For one, it gives me a playground to work
around and learn Linux. I just started Linux about 4 years ago, and I'm
learning rapidly. Jetstream also is a contributing server to GTAXLnet
IRC.Jetstream runs an NTP server, DNS server (bind9), and DHCPd for my
LAN network, and runs my screenshot sharing (pik.gtaxl.net). Jetstream also plays a major roll in GTAXLnet DEFCON,
scanning the entire internet. Chances are, you've been touched by
Jetstream. So yeah, look around and you might find something useful.
I monitor the latency and packet loss of the internet connection on all my servers, including Jetstream. This helps determine the quality and reliability of the connection. These graphs get automatically updated roughly every 5 minutes.
I monitor all attacks and dropped packets that hit my servers. This includes, but not limited to: UDP Floods, SYN Floods, ICMP Floods, TCP Port Probes, TCP Port Scans, UDP Port Scans, NULL attacks, etc. At this time I only monitor dropped traffic on Jetstream. I even watch every single port that gets probed. If a port keeps getting probed within a certain threshold, I will then enlist it in the Firewall Monitor. This Firewall Monitor is for the purpose for education and to publicly expose all attackers that touch my IP. The website version doesn't contain as much information as my copy, and the website version is not live. I will try to update it at least weekly. If you feel your IP is wrongfully listed in my Firewall Monitor, and want it removed, just contact me and I will remove it from the Web Version if I feel inclined to. Please note, it is possible to spoof the IP header on some of these attacks, this cannot be verified and there is nothing anyone can do about it except the attacker's ISP.