Interactive Cyber Attack Map

Over the last 6 months, we’ve seen several large companies develop and launch their own “cyber attack map.” So we decided to curate a list of the most popular maps for your convenience. If you’re aware of another map, please tell us about it so we can add it.

Attack Maps
Deutsche Telekom
Google Ideas + Arbor Networks  Digital Attack Map
Honey Project  HoneyMap
Norse Corporation  Norse – IPViking Live
Kaspersky  Find out where you are on the Cyberthreat map
FireEye  Cyber Threat Map

Some of these maps are so intricate that they appear to be organic, whereas the other maps are relatively simplistic. All of these maps, however, state that they allow you to monitor cyber attacks in real time. Live cyber attack observation is pretty cool, and it also makes for a nice marketing tool.

At CTF365, we think real time cyber attack maps are awesome. So we decided to build one of our own. When we started working on our map, we focused on two elements: user experience and information accessibility. By positioning these elements at the foundation of our map, we were able to create a close to real time cyber attack monitoring system that is engaging, interactive, and insightful. It’s more than a map; it’s a window into the core of the CTF365 security training platform.

Today we present our Interactive Cyber Attack Map.

Screenshot from 2014-11-14 12:05:25

Interfacing with the map is as easy as pointing and clicking. Through the various interactive components, users can identify active attackers, discover fortresses, and more. By measuring attacks on a visible surface, we’ve made it effortless for users to monitor the status of their fortresses and trace attacks back to the perpetrators. In a sense, the map is a less complex alternative to Nmap and IDS and the awesomeness is that users and CTF365 unregistered visitors can watch how attacks occurs.

Screenshot from 2014-11-14 12:02:56

The map is currently in its infancy and, therefore, is still being developed. New features will be added in the near future. Upon completion, the map will act as a comprehensive real time cyber attack monitoring system. If you’re looking to gain a new perspective on CTF365, the map is a great place to start.

You can access the map HERE.


About: CTF365 it’s a top notch Security Training Platform for the IT industry with a focus on Security Professionals, System Administrators and Web Developers that offers five stars services.

The Platform implements CTF concepts and leverages gamification mechanics to improve retention rates and speed up the learning/training curve.


Marius Corici

Lazy (energy efficient) entrepreneur: Thinking a lot to do less, preserving energy, providing simplicity.

You may also like...

5 Responses

  1. Ahmed Elshaer says:

    how these maps developed, if i have the attacks data how to graph it on dashboard. ?

  1. November 23, 2014

    […] At CTF365, we think real time cyber attack maps are awesome. So we decided to build one of our own.  […]

  2. December 15, 2014

    […] At CTF365, we think real time cyber attack maps are awesome. So we decided to build one of our own.  […]

  3. December 15, 2014

    […] At CTF365, we think real time cyber attack maps are awesome. So we decided to build one of our own.  […]

  4. September 30, 2015

    […] You can find a list of other cyber attack maps at CTF365 here. […]

Leave a Reply

Your email address will not be published. Required fields are marked *