jeevans · infra
192.168.1.168 · 100.112.118.83
Next in s
🖥 On-Prem Server
☁️ Hostinger VPS 187.124.240.44
🔐 Security Summary
fail2ban Active
SSH brute-force protection running
Daily Scan Scheduled
Runs at 08:00 daily · Slack alerts active
⚠️
PostgreSQL Exposed
Port 5432 on 0.0.0.0 · Fix on Tuesday
⚠️
Backup Not Configured
No automated backup yet · Fix on Tuesday
System Services
🖥 On-Prem · 192.168.1.168
☁️ Hostinger · 187.124.240.44
🖥 On-Prem · jeevans (GMKtec K12)
☁️ Hostinger VPS
📈 Strategy A · On-Prem
Market Status
Capital$1,000
Per Position$100
Take Profit+5%
Stop Loss-2.5%
Circuit Breaker-3% drawdown
Kill Switch-5% drawdown
PDT Limit3 / 5 days
Max Positions5
Watchlist
📈 Strategy B · Hostinger (2×)
Market Status
Capital$100,000
Per Position$1,000
Take Profit+10%
Stop Loss-5%
Circuit Breaker-6% drawdown
Kill Switch-10% drawdown
PDT Limit6 / 5 days
Schedule (UTC)
▶ 13:30 Market Open ■ 20:00 Market Close 📊 20:05 Report → Slack
🔴 Action Required
🔴
No Automated Backup
backup.sh exists but not tested. Critical data (postgres, .env, hermes) unprotected. Fix Tuesday.
🔴
PostgreSQL on 0.0.0.0:5432
Database exposed to entire LAN. Restrict to 127.0.0.1. Fix Tuesday.
⚠️
Docker Images Using :latest
coder uses ghcr.io/coder/coder:latest. Pin to specific versions.
⚠️
No Container Resource Limits
No CPU/memory limits on containers. Add mem_limit + cpus to compose files.
⚠️
MFA Not Enabled on Tailscale
Enable 2FA at login.tailscale.com/admin for all users.
✅ Controls Active
fail2ban Running
SSH brute-force protection active
UFW Firewall Active
Only required ports open
Tailscale Mesh VPN
Remote access via encrypted tunnel only
venkats Restricted
docker-restricted wrapper · Tailscale IP only · No trading containers
Daily Security Scan
Runs 08:00 · Slack alert on anomaly
Secrets in .env Files
No secrets hardcoded in source or Docker compose
Tailscale Peer Audited
venkatasubramani.s@ verified as team member
🔒 Tailscale Mesh
🏠 LAN Devices · 192.168.1.0/24 Last scan May 14
🖥 On-Prem Containers
☁️ Hostinger Containers