This fork of the GeoIP Attack Map was adjusted for CyberPot, also introducing new features (i.e. dynamic destination IPs to represent CyberPots), better performance for the Attack Map Server by using aiohttp, asyncio and aioredis and, where possible, serving the dependencies locally instead from different CDNs.
This geoip attack map visualizer was forked and adjusted to display CyberPot Honeypot events in real time. The data server connects to elasticsearch, parses out source IP, destination IP, source port, destination port, timestamp, honeypot type and honeypot statistics (events per last 1m, 1h, 1d). Protocols are determined via common ports, and the visualizations vary in color based on protocol type while keeping stats regarding top source IPs and countries.
The original attack map was created by Matthew Clark May.
First CyberPot based fork was released by Eddie4.