Attack Maps

Realtime maps showing virus / penetration Attacks

https://www.fireeye.com/cyber-map/threat-map.html

www.fireeye.com/cyber-map/threat-map.html

See recent global cyber attacks on the FireEye Cyber Threat Map. Sign up to be alerted when attacks are discovered and keep your organization's data protected.

Visited164
http://www.digitalattackmap.com/

www.digitalattackmap.com

Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find repor ...

Visited99
http://globe.f-secure.com/

globe.f-secure.com

Want to see a map of computer virus detection rates all over the world? F-Secure put one online last week. This is kind of neat because you can get a broad overview or drill into  continent and country to see which where the most trouble is. ...

Visited152
http://worldmap3.f-secure.com/

worldmap3.f-secure.com

F-Secure Virusmap

Visited226
http://threatmap.fortiguard.com/

threatmap.fortiguard.com

Secure Sense has now teamed up with its partner Fortinet to provide a threat map—now available on our new website. The Threat Map shows real-time traffic of cyber-attacks on a global scale, using input from over 2 million FortiGate devices deploy ...

Visited92
http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html

www.trendmicro.com/us/security-intelligence/current-threat-a...

Trend Micro’s Global Botnet Threat Activity Map continuously monitors botnet network activities to identify command-and-control (C&C) servers and help increase protection against botnet attacks.

 

Visited106
http://map.honeynet.org/

map.honeynet.org

You are looking at the HoneyMap, a real-time world map which visualizes attacks captured by honeypots of the Honeynet Project. Red markers on the map represent attackers, yellow markers are targets (honeypot sensors).

This project is highly exp ...

Visited108
http://www.team-cymru.org/malicious-activity-maps.html

www.team-cymru.org/malicious-activity-maps.html

We have built a number of different maps of malicious activity seen on the Internet from our various data donors and sources. These maps are updated daily, showing summaries of malicious activity seen over various recent periods of time. Intensity on t ...

Visited116
https://cybermap.kaspersky.com/

cybermap.kaspersky.com

Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. The types of threats displayed include malicious objects detected during on-access and on-demand scans, email and web a ...

Visited109
http://map.norsecorp.com/v1/

map.norsecorp.com/v1/

Norse Dark Intelligence

Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Nor ...

Visited103
http://map.norsecorp.com/

map.norsecorp.com

Norse – Superior Attack Intelligence

Norse maintains the world’s largest dedicated threat intelligence network. With over eight million sensors that emulate over six thousand applications – from Apple laptops, ...

Visited96
http://www.sicherheitstacho.eu/

www.sicherheitstacho.eu

This Portal shows statistics of the early warning system of Deutsche Telekom. The corresponding sensors are operated from Deutsche Telekom and Partners.

Overview of current cyber attacks on DTAG sensors (logged by 180 Sensors)

Visited87