Interactive Cyber Maps
Everyday we are reading about Internet attacks, attempting to take sites offline, for a variety of reasons. For most people it is difficult to visualize this type of activity, after all it occurs on a wire, from computer to computer, in a realm we can not see. If you have an interest to know what is going on when it comes to digital attacks, here is a method to visualize it, in real time. Here are a few real-time attack maps. Much of the data from these maps are from real, actual targets and decoy systems (called honeypots). Honeypots are deployed to gather information on online attacks.
Norse maintains the world’s largest dedicated threat intelligence network. With over eight million sensors that emulate over six thousand applications – from Apple laptops, to ATM machines, to critical infrastructure systems, to closed-circuit TV cameras – the Norse Intelligence Network gathers data on who the attackers are and what they’re after. Their map, the IPViking, contains a wealth of data, and you can spend a long time watching it.
Akamai monitors global Internet conditions around the clock. With this real-time data we identify the global regions target of the greatest web attack traffic, cities with the slowest web connections (latency) and geographic areas with the most web traffic (traffic density).
Displayed are the current number of network attacks by major geographic region (State or Country).
Arbor Networks digital attack map contains live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks, and with claims of 270+ ISP customers who share data. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day. This is a truly useful service because it lets you step back in time to attacks on previous dates.
Check Point’s Live Cyber Attack Threat Map provides real-time tracking of cyber attacks as they’re launched around the world. The map give you information, such: attackers, target, and infecting malware types.