GHOSTWIRE

Real-time threat intelligence, rendered as art

Establishing connection...

headphones recommended

What is this?

Every sound and visual represents real malicious activity happening now— malware spreading, ransomware victims announced, botnets receiving commands, attacks hitting honeypots worldwide.

Malware distribution
Honeypot attacks
Botnet C2 servers
Ransomware victims
Phishing campaigns
Tor exit nodes
Data breaches
IP hijacks
BGP route attacks
LIVE THREAT FEED
INTERACT
CLICK threat node for details
HOVER to highlight related threats
Larger nodes = repeated attackers
Disconnected
Malware URLs 0
Honeypot Attacks 0
Botnet C2 0
Ransomware 0
Phishing 0
Bad Certs 0
Brute Force 0
Tor Nodes 0
Scanners 0
Breaches 0
IP Hijacks 0
BGP Events 0

Audio

Musical Key

Visual