Threat maps
While these threat maps have no practical usage for defence, threat maps can be used to study past attack styles. Plus, some are beautiful and/or fun to watch.
Mind that the source of an attack is often forged, which means that it appears as though it was initiated from a certain country, but it is not from that country at all. The largest attacks usually originate from high bandwidth nations, who are perfectly suited to launching huge attacks from thousands of infected devices directed from other locations.
LookingGlass Phishing/Malicious URL Map with live activity for infected malicious and phishing domain URLs.
ThreatCoud Live Cyber Attack Threat Map showing DDoS attacks from around the globe with live stats for recent attacks.
Arbor Networks DDoS Attack Map tracking down attack episodes related to DDoS attacks around the world.
Kaspersky Cyber Malware and DDoS Real-Time Map signifying internet devastation in extremely sleek ways.
Akamai Real-Time Web Attack Monitor with real-time stats pinpointing the sources of most of the biggest attacks anywhere around the globe.
Fortinet Threat Map showing malicious network activity within various geographic regions and international sources of attack and their destinations.
Threat Butt Hacking Attack Map with lots of humour!