Live Attack Map
Creative Commons License

About IPew

Attack maps are the <blink> tag of information security. They are pure eye candy, meant to scare the general public and WOW unsuspecting executives visiting Security Operations Centers. Yet, security vendors keep cranking them out. We didn't want organizations without "real" data or l33t animation skills to to feel left out, so we built this map for anyone to use [CC BY-SA]. Plus, they're all missing sound effects! And, most (all, really) use mind-numbingly dumb map projections, begging the question: "Does Greenland make my map look big?".

The default map uses a statistical model (infrequently updated) for source "attack" node country of origin & frequency while destinations are fully randomized. The default sound is a Star Wars "blaster" (guess which one!). Sounds can be customized and an organization name can be specified, plus there are a few other interesting options.

Check out the github repository for more information and instructions on how to customize the map options for maximum effect.

Brought to you by @alexcpsec, @hrbrmstr & Data-Driven Security