this feels like a nice afternoon to just watch incoming traffic in the system log, flowing by quietly
@cthos ooo..... yes! yes, that would be amazing
System's Twilight, by @zarfeblong had this virtual "place" within its computer-setting, the river of data. the metaphor has stuck with us through the years.
@cthos maybe the portion that's http traffic could be printed as its three-digit response code
and the portion that's attempts to brute-force the passwords of ssh accounts that don't exist despite the initial response clearly stating that password login is prohibited could be printed as * (denoting an asshole) or something like that
~ character and we don't know what to map that to@ireneista everything about this idea sounds great. Maybe IP clusters are differently sized rocks that the request ~s flow around.
This might quickly become illegible but it is fun to think through