@@ -31,6 +31,11 @@ const features = [
3131 title : "Real-time Alerts" ,
3232 desc : "Email, SMS, Slack, Discord, and webhook notifications the instant a threat is detected. Push alerts to your phone. Never miss an attack." ,
3333 } ,
34+ {
35+ icon : "💢" ,
36+ title : "Active Defense" ,
37+ desc : "Fight back. Tar pits slow attackers down, honeypots trap them, deception serves fake data, and auto-reports file abuse complaints to their ISP." ,
38+ } ,
3439 {
3540 icon : "⚙️" ,
3641 title : "systemd Daemon" ,
@@ -80,6 +85,7 @@ const included = [
8085 "Network monitor — all ports, all protocols" ,
8186 "Real-time email + SMS alerts" ,
8287 "Webhook support for custom integrations" ,
88+ "Active defense — tar pits, honeypots, deception" ,
8389 "systemd daemon — runs 24/7" ,
8490 "Full CLI, desktop & mobile apps" ,
8591 "All core modules + future updates" ,
@@ -251,7 +257,8 @@ export default function Home() {
251257 < p > < span className = "text-tc-text-dim" > [12:03:47]</ span > < span className = "text-red-400" > ✗</ span > < span className = "text-red-400" > SSH brute force</ span > < span className = "text-tc-text-dim" > — :22 91.232.105.3 → 47 failed attempts</ span > </ p >
252258 < p > < span className = "text-tc-text-dim" > [12:03:50]</ span > < span className = "text-yellow-400" > ⚠</ span > < span className = "text-yellow-400" > Port scan</ span > < span className = "text-tc-text-dim" > — 45.33.32.156 scanning :21-:8080 (SYN flood)</ span > </ p >
253259 < p > < span className = "text-tc-text-dim" > [12:03:52]</ span > < span className = "text-yellow-400" > ⚠</ span > < span className = "text-yellow-400" > DNS tunneling</ span > < span className = "text-tc-text-dim" > — :53 suspicious TXT queries from 103.44.8.2</ span > </ p >
254- < p > < span className = "text-tc-text-dim" > [12:04:01]</ span > < span className = "text-tc-green" > ✓</ span > < span className = "text-tc-text-dim" > 3,891 connections analyzed · 4 threats · 1 blocked</ span > </ p >
260+ < p > < span className = "text-tc-text-dim" > [12:03:55]</ span > < span className = "text-tc-green" > ✓</ span > < span className = "text-tc-text-dim" > Honeypot triggered — logging attacker recon on :2222</ span > </ p >
261+ < p > < span className = "text-tc-text-dim" > [12:04:01]</ span > < span className = "text-tc-green" > ✓</ span > < span className = "text-tc-text-dim" > 3,891 connections · 4 threats · 1 blocked · 2 tar-pitted</ span > </ p >
255262 </ div >
256263 </ div >
257264 </ ScrollReveal >
@@ -397,7 +404,7 @@ export default function Home() {
397404 { time : '14:23:07' , type : 'crit' , icon : '✗' , msg : 'SSH brute — :22 91.232.105.3 (47 fails)' , color : 'text-red-400' } ,
398405 { time : '14:23:09' , type : 'warn' , icon : '⚠' , msg : 'Port scan — 45.33.32.156 :21-:8080' , color : 'text-yellow-400' } ,
399406 { time : '14:23:12' , type : 'warn' , icon : '⚠' , msg : 'DNS tunnel — :53 TXT from 103.44.8.2' , color : 'text-yellow-400' } ,
400- { time : '14:23:15' , type : 'info' , icon : '✓' , msg : 'Blocked 91.232.105.3 via iptables ' , color : 'text-tc-green' } ,
407+ { time : '14:23:15' , type : 'info' , icon : '✓' , msg : 'Tar pit engaged — 91.232.105.3 (slowing) ' , color : 'text-tc-green' } ,
401408 { time : '14:23:18' , type : 'crit' , icon : '✗' , msg : 'XSS attempt — :443 /search?q=<script>' , color : 'text-red-400' } ,
402409 { time : '14:23:22' , type : 'info' , icon : '✓' , msg : 'Rate limited 45.33.32.156 (50 req/s)' , color : 'text-tc-green' } ,
403410 ] . map ( ( e , i ) => (
0 commit comments