Findings:
- Attacker
- Detecting an attacker's IP address hidden by backscatter
- If an attacker has physical access, your system is already compromised
If you Log in you could create a "attackers" node. If you don't already have an account, you can register here.