Cyber Map

This map visualizes real-time probes and attack attempts against my network perimeter. Markers represent the network origin of the traffic, not the human behind it. Many sources are infected or abused systems, VPN exit nodes, or shared cloud ranges—so attribution to an individual owner is not assumed.