Distributed Intrusion Detection System. Accepts firewall log excerpts from around the world and you can browse through activity reported to the system. Features a list of the "most wanted" abusive IP addresses.
Distributed Intrusion Detection System collects firewall log excerpts from volunteers. The logs are aggregated and analyzed. Several reports are generated showing trends in attack sources and methods used.