Serious Question: How Long?

Ahh thanks. Guessing whatever service or tools they are using to identify the attacks are flagging the sources as nix or mostly nix , probably iot devices. Would hope its just step 1 blanket step and its quickly followed by a fine tuning. Suprised at this strat though, very basic.

/edittosharethepopcorn
:slight_smile: