Skip to content

This web application uses D3 / javascript visualization to display cartographic IP data using Datamaps with JavaScript event timers and data queues deployed on Heroku.

Notifications You must be signed in to change notification settings

vkremez/IPAttackMapWebsite

Repository files navigation

IP Attack Map

Deploy

img

Website: http://vitali-honeypot.herokuapp.com

Source: https://github.com/mlsecproject/pewpew

This web app uses D3 / javascript visualization to display cartographic IP data using Datamaps using javascript event timers and data queues deployed on Heroku.

Examples of Usage:

http://vitali-honeypot.herokuapp.com/index.html?china_mode=1&org_name=[INSERT ANY COMPANY NAME]&bad_day=1

http://vitali-honeypot.herokuapp.com/index.html?org_name=[INSERT ANY COMPANY NAME]&drill_mode=1&lat=[INSERT ANY FLOAT VALUE]&lon=[INSERT ANY FLOAT VALUE]

http://vitali-honeypot.herokuapp.com/index.html?org_name=[INSERT ANY COMPANY NAME]&employee_mode=1&employee_fname=[INSERT ANY FIRST NAME]&employee_lname=[INSERT ANY LAST NAME]&lat=[INSERT ANY FLOAT VALUE]&lon=[INSERT ANY FLOAT VALUE]

Using IPAttackMapWebsite

Feel free to use the hosted version, but we've released IPew under a liberal Creative Commons license, so clone away and use as you see fit, just remember to share your creations (and code) with others.

IPAttackMapWebsite

IPAttackMapWebsite includes the following sounds:

  • no sound option set - Star Wars blaster! (guess which one!)
  • tng=1 - Star Trek:TNG Photons!
  • wargames=1 - WarGames key clicks!
  • b5=1 - Babylon 5 defense grid cannons!
  • pew=1 - Somewhat disturbing human-made "pew-pew" sound
  • galaga=1 - Classic arcade sound!

To turn off sound effects (but, but, why? :-), use nofx=1, and to randomly cycle through them all use allfx=1

By default, IPew will use a statistical model for choosing source countries for the attacks, but you can level the playing field and set random_mode=1 to give all countries the same cyber-advatage.

In similar vein, and using the perpsective many prominent security vendors and pundits seem to have, you can make all cyber attacks from from China with china_mode=1 or from North Korea with dprk_mode=1.

IPew's default attack timing is based on observational data from many sources, but you can make it look like the world is on the brink of cyber collapse by setting bad_day=1.

Finally, you can proudly display your organization's name by setting org_name=MyOrgName (URL encode any spaces or special characters).

Drill Mode

We had an interesting request to be able to use IPew in a IR "drill" setting, so there's now a "drill mode" where you can specify a latitude & longitude to be the destination for the attacks. Right now, all attacks go there, but we may add an option to specify a percentage of attacks that should go there. You must use drill_mode=1&lat=##.####&lon=##.#### for this to work, like: drill_mode=1&lat=43.2672&lon=-70.8617 (which would focus all attacks near @hrbrmstr). Remember, you can specify your organization name there, too.

Blame former employee mode

If you want to show that former employees are the problem, try out employee_mode. You can set a first and last name for the employee and also set a latitude and longitude.

About

This web application uses D3 / javascript visualization to display cartographic IP data using Datamaps with JavaScript event timers and data queues deployed on Heroku.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published