Standalone hybrid IDS+IPS for Ubuntu/Windows VMs with relay dashboard
Project description
AnomalyX
AnomalyX provides a standalone IDS/IPS agent and a relay dashboard for Ubuntu and Windows VMs.
It captures host traffic, runs hybrid detection (signature + ML + zero-day),
uses a fusion policy for risk/action, and applies prevention via host firewall rules
(iptables/ip6tables on Ubuntu, netsh advfirewall on Windows).
What it includes
anomalyx setup: installs Python capture dependencies and attempts Npcap setup on Windows.anomalyx agent: runs the endpoint capture/detection/enforcement agent.anomalyx dashboard: runs the relay + monitoring dashboard.anomalyx search-events: query local event logs by action/risk.anomalyx search-enforcement: query enforcement actions by status/action/ip.anomalyx unblock-ip: remove host firewall blocks for a remote IP.
Quick start
pip install anomalyx
anomalyx setup
Start dashboard:
anomalyx dashboard --host 0.0.0.0 --port 8600
relay-ip means the IP address of the machine where you started
anomalyx dashboard.
Start agent on Ubuntu VM (recommended):
sudo anomalyx agent --agent-id ubuntu-vm-001 --relay-url http://<relay-ip>:8600 --interface eth0
Start agent on Windows VM (Administrator terminal):
anomalyx agent --agent-id win-vm-001 --relay-url http://<relay-ip>:8600
Open dashboard:
http://<relay-ip>:8600/
What to expect
- Live events with action labels:
allow,alert,temp_block_ip,block_ip. - Risk score and reason generated from fusion policy.
- Enforcement status in event data (applied/skipped/failed) with diagnostics.
- Staged escalation and repeat-safe enforcement to reduce false positives.
- Allowlist support with controlled blocking rate limits.
- Dashboard UI supports action/enforcement filters and critical traffic strip.
- Landing page shows fleet-level alerts/temp-blocks/blocks per agent.
- Dashboard supports admin-token protected unblock requests.
Baseline mode (recommended first days)
- Default policy is tuned to prefer
alert+temp_block_ip. block_ipnow requires stronger repeat evidence and higher risk.- Review enforcement log daily before expanding allowlist.
Daily review command:
anomalyx review-enforcement --log-path anomalyx-logs/enforcement_actions.log --top 20 --min-count 5
- Local logs on agent host (default):
anomalyx-logs/agent_runtime.loganomalyx-logs/agent_events.jsonlanomalyx-logs/enforcement_actions.log
Notes
anomalyx setupuseswinget/chocofor automatic Npcap install on Windows when available.- If automatic Npcap installation is unavailable, install Npcap manually:
https://npcap.com/#download.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file anomalyx-0.1.15.tar.gz.
File metadata
- Download URL: anomalyx-0.1.15.tar.gz
- Upload date:
- Size: 11.6 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ad937ea960a1a9446c5e9380d14367b09578a4d6523a21d22ac85459d33efd98
|
|
| MD5 |
537fb17a83f05349c419574b0af67c4c
|
|
| BLAKE2b-256 |
a09f7396c23dfc36ad02db40318a43cc18c2ba2b357337c1691fc4c2b2dd4cc2
|
File details
Details for the file anomalyx-0.1.15-py3-none-any.whl.
File metadata
- Download URL: anomalyx-0.1.15-py3-none-any.whl
- Upload date:
- Size: 12.2 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e43365b9471bd3c6efb18b8e2e40346ae17b398791d07ffedc40815074460cc2
|
|
| MD5 |
5981864ad7e41785eb6a68b71e915cd2
|
|
| BLAKE2b-256 |
9f1abb63b99200c39cbb263e3da16f634015bde29b83aa3abc5f7e1699a96db9
|