Time flies like an arrow - Fruit flies like a banana

Internet Threat Sources

Put together in conjunction with Arbor Networks, the Digital Attack Map updates every hour with anonymous DDoS events from over 270 ISPs. The animated map shows of inbound, outbound and internal attacks between and within countries, providing details about duration, bandwidth and a bunch of other stuff. There’s a caveat: the data is necessarily incomplete — because it relies on the customers of Arbor Networks — and in fact it can sometimes even be incorrect. The origin of attacks, in particular can be masked, but that doesn’t stop it being an interesting resource.

Kaspersky Lab interactive cyberthreat map
Kaspersky Lab interactive cyberthreat map visualizes cyber security incidents occurring worldwide in real time. The types of threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as objects identified by vulnerability and intrusion detection sub-systems. Users can rotate the globe and zoom in to any part of the world to get a closer look at the local threat landscape. Different types of threats detected in real time are marked with different colors. The user can bring a description of each threat up on the screen or disable the display of threat types.
SANS Internet Storm Center
SANS Internet Storm CenterA global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.
Norse Dark Intelligence
Norse Dark Intelligence attack map
Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports).Hovering over the ATTACK ORIGINS, ATTACK TARGETS, or ATTACK TYPES will highlight just the attacks emanating from that country or over that service-port respectively. Hovering over any bubble on the map, will highlight only the attacks from that location and type. Press S to toggle table sizes.Norse exposes its threat intelligence via high-performance, machine-readable APIs in a variety of forms. Norse also provides products and solutions that assist organizations in protecting and mitigating cyber attacks.
Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme