Real-Time Threat Maps

If you haven’t seen these maps, it can be eye opening.  These are real-time and/or near real-time threat maps that are readily available online. 

  They cover traffic such as:

  • DDoS (distributed denial of service) the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers
  • IDS (intrusion detection systems) network attacks detection flow
  • VUL (vulnerability scan) vulnerability detection flow
  • MAV (mail anti-virus) malware detection flow during Mail Anti-Virus scan when new objects appear in an email application
  • WAV (web anit-virus) shows malware detection flow during Web Anti-Virus scan when the html page of a website opens or a file is downloads
  • OAS (on-access scan) shows malware detection flow during On-Access Scan, i.e. when objects are accessed during open, copy, run or save operations
  • ODS (on demand scanner) shows malware detection flow during On-Demand Scan, when the user manually selects the “Scan for viruses
  • Attack types against (all types not listed):
    • telnet
    • SQL
    • domain
    • http
    • ssh

Various companies who are touting their cyber security offering like to throw these up behind them during photo ops.  They are impressive, but more importantly they show us the unseen cyber world and the fact we are under attack.

The list below includes pictures of the sites and the links to view them in real-time.

Live Norse Attack Map Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors.

Norse Corp Live Threat Map
Norse Corp Live Threat Map

Kaspersky Lab’s CYBERTHREAT Real-Time Map – Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. The types of threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as objects identified by vulnerability and intrusion detection sub-systems.

Kaspersky CyberThreat Real-TIme Map

Digital Attack Map – The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known

Digital Attack Map - Top daily DDoS attacks worldwide
Digital Attack Map – Top daily DDoS attacks worldwide

Fortinet Threat Map – Remote execution attacks, memory related attacks, remote location attacks, denial of service attacks (DoS), etc.

Fortinet Threat Map
Fortinet Threat Map

There are more maps that do some of the same type of tracking as well as other threats.  The list below includes the site listed in this article as well as others.


Share on facebook
Share on twitter
Share on linkedin
Share on pinterest

14 Responses

  1. Hi There, 
    My name is Cindy, and I am writing because at this moment, I am working on a number of PR projects in the same area as  

    It would be absolutely wonderful if we could discuss ways in which we can work together to produce content for, whether it is contributed content or advertising placements. I represent a range of review and information businesses within our sector. 

    Yes, this does include a limited budget should certain terms be met. Additionally, I want to assure you that I always write well researched, original content tailored to what you and your readers like to see. Furthermore, I have a track record of attracting fresh visitors to the sites I work with. 

    For my part, I require a single, followed link to one of the websites I’m working for. We prefer for it not to be tagged as such, however. I would also like for my content to be easily found by casual browsers and where possible, linked to from any main category page. 

    My work is always of the highest quality and I am more than open to ideas and topic suggestions. If you like the sound of this, please send over your pricing structure, and other details so we can proceed. I look forward to hearing back from you. 

    Best Regards,

    PS – If you’re not interested, I totally understand. You’re not on a contact list and I won’t get in touch again.

  2. Αctually no matter if sοmeone ⅾoesn’t be aware ⲟf after thɑt its up
    to othеr people that they will assist, sⲟ
    hеre it happens.

  3. An outstanding share! I’ve just forwarded this onto
    a co-worker who has been doing a little homework on this.
    And he actually ordered me lunch because I discovered it for him…
    lol. So let me reword this…. Thank YOU for the meal!!

    But yeah, thanks for spending time to talk about this matter here on your web site.

  4. Wonderful items from you, man. I have be mindful your
    stuff previous to and you’re simply too great. I actually like
    what you’ve got here, certainly like what you’re saying and the
    best way by which you say it. You’re making it entertaining and you still care for to stay
    it smart. I can not wait to read far more from you. That is
    actually a wonderful site.

Leave a Reply

Your email address will not be published. Required fields are marked *


Join 7,592 other subscribers