ZYXEL Global Threat Map

GLOBAL SECURITY OPERATIONS CENTER

62 CRITICAL
266
TOTAL ATTACKS
LIVE
TOTAL EVENTS
266
CRITICAL
62
BLOCKED
57%
LIVE BUFFER
52

ATTACK TYPES

17%15%12%10%10%10%
Phishing9
Botnet8
Zero-Day6
Ransomware5
Brute Force5
Malware5

SEVERITY

CRITICAL13
HIGH21
MEDIUM13
LOW5

TOP SOURCES

USAChinaTurkey
DRAG TO ROTATE · SCROLL TO ZOOM

Natural Earth Projection · 2D Mode

52 EVENTS TRACKED|DRAG TO ROTATE · SCROLL TO ZOOM
RAW LOG[0052]
06:16:16📜 XSSLOW■ BLOCKED
117.55.249.110(Israel)120.125.241.138(Canada)HTTPS:443
Stored XSS: malicious script injected into description
06:16:15⚡ DDoSHIGH■ BLOCKED
57.200.22.138(Indonesia)120.204.68.160(North Korea)HTTP:53
UDP amplification attack: 2500 Gbps traffic spike
06:16:15🤖 BotnetCRITICAL■ BLOCKED
61.131.30.225(Canada)36.246.228.5(Germany)HTTP:80
Botnet C2: 8127 compromised hosts calling home
06:16:14🎣 PhishingHIGH▲ DETECTED
115.129.67.144(Netherlands)217.90.108.71(Israel)HTTPS:587
Credential harvesting page: fake Amazon login portal
06:16:13🎣 PhishingMEDIUM■ BLOCKED
223.240.134.87(Russia)202.84.6.147(Mexico)HTTPS:587
Spear phishing: targeted attack on Legal department
06:16:12🔒 RansomwareHIGH■ BLOCKED
208.170.41.246(Saudi Arabia)155.13.134.201(Nigeria)TCP:139
LockBit variant detected: lateral movement via RDP
06:16:12🔨 Brute ForceMEDIUM■ BLOCKED
171.178.2.136(North Korea)98.163.125.205(Russia)FTP:3389
RDP credential stuffing: 6380 login failures
06:16:11🔨 Brute ForceLOW▲ DETECTED
100.137.14.24(Turkey)149.203.102.79(France)SSH:80
Web login brute force: 2277 attempts on /admin
06:16:10🎣 PhishingMEDIUM▲ DETECTED
102.97.112.251(India)164.216.189.5(Russia)SMTP:25
Credential harvesting page: fake Microsoft login portal
06:16:10💀 Zero-DayCRITICAL▲ DETECTED
47.66.3.182(South Africa)16.29.241.127(Vietnam)UDP:80
Unpatched vulnerability exploitation in Windows Server
06:16:10🎣 PhishingHIGH■ BLOCKED
54.162.209.167(Israel)210.105.92.40(Saudi Arabia)HTTPS:587
Phishing email: spoofed domain secure-wjewgo.com detected
06:16:09🔒 RansomwareHIGH▲ DETECTED
88.195.5.32(France)4.247.229.203(Germany)TCP:139
Ransomware C2 communication: payment server contacted
06:16:08💉 SQL InjectionHIGH■ BLOCKED
115.166.252.155(Poland)19.174.21.31(USA)HTTP:3306
Blind SQLi: time-based attack on /api/v1/users
06:16:08💀 Zero-DayCRITICAL▲ DETECTED
192.124.92.26(Indonesia)14.36.52.4(USA)HTTP:8080
Unknown vulnerability: anomalous payload pattern detected
06:16:07🔒 RansomwareHIGH■ BLOCKED
142.162.178.75(Turkey)206.209.42.60(China)SMB:4444
File encryption in progress: 9354 files affected
06:16:06⚡ DDoSMEDIUM▲ DETECTED
217.192.184.138(China)201.97.85.59(Ukraine)UDP:80
SYN flood detected: 9749 packets/sec from 98.52.112.38
06:16:06🕵️ MITMMEDIUM▲ DETECTED
209.223.14.97(Vietnam)112.177.168.10(North Korea)DNS:8080
Evil twin AP: rogue WiFi access point detected
06:16:05🦠 MalwareHIGH▲ DETECTED
220.44.51.246(China)47.18.236.15(UK)TCP:4444
Spyware activity: keylogger data exfiltration detected
06:16:05🎣 PhishingCRITICAL■ BLOCKED
198.248.154.99(Japan)142.24.61.234(Canada)HTTPS:587
Credential harvesting page: fake Amazon login portal
06:16:05🦠 MalwareHIGH■ BLOCKED
35.136.108.57(North Korea)143.167.143.224(India)TCP:8080
Backdoor.RAT: reverse shell connection established
06:16:04💀 Zero-DayCRITICAL■ BLOCKED
213.94.74.115(Singapore)141.82.43.55(Netherlands)HTTPS:443
Unknown vulnerability: anomalous payload pattern detected
06:16:04🔒 RansomwareCRITICAL■ BLOCKED
38.137.184.200(Singapore)93.214.25.223(USA)SMB:4444
LockBit variant detected: lateral movement via RDP
06:16:04💀 Zero-DayCRITICAL■ BLOCKED
2.80.31.254(Singapore)103.62.20.82(Poland)HTTP:80
Unknown vulnerability: anomalous payload pattern detected
06:16:03⚡ DDoSMEDIUM■ BLOCKED
114.226.212.15(China)112.244.65.121(Sweden)TCP:53
SYN flood detected: 6781 packets/sec from 73.234.244.214
06:16:02📜 XSSHIGH▲ DETECTED
137.192.200.39(Poland)105.204.230.232(UK)HTTP:80
XSS payload: <script>document.cookie</script> in page
06:16:01🤖 BotnetMEDIUM■ BLOCKED
188.112.114.216(Russia)71.139.216.44(Singapore)TCP:80
Botnet scan: 9677 hosts probing port 7671
06:16:01💉 SQL InjectionLOW▲ DETECTED
172.89.117.90(USA)217.44.148.238(India)HTTPS:80
UNION SELECT injection: extracting sessions table data
06:16:01🎣 PhishingLOW■ BLOCKED
207.37.69.204(USA)83.6.243.65(Ukraine)HTTPS:465
Spear phishing: targeted attack on Executive department
06:16:01💉 SQL InjectionHIGH■ BLOCKED
186.25.114.63(Argentina)193.166.254.176(Russia)HTTPS:80
Blind SQLi: time-based attack on /api/v1/users
06:16:00🦠 MalwareMEDIUM■ BLOCKED
177.141.157.95(USA)168.174.233.57(Iran)HTTPS:4444
Backdoor.RAT: reverse shell connection established
06:16:00💀 Zero-DayHIGH■ BLOCKED
194.43.193.139(Vietnam)203.196.144.45(France)TCP:8443
Zero-day exploit: CVE-2025-76149 targeting Apache
06:16:00💀 Zero-DayCRITICAL■ BLOCKED
34.94.120.55(Brazil)89.40.185.177(South Africa)UDP:8080
Unknown vulnerability: anomalous payload pattern detected
06:16:00🤖 BotnetMEDIUM■ BLOCKED
180.86.197.2(USA)196.217.210.135(Taiwan)UDP:443
DGA domain: secure-nrkpsv.com contacted by 7063 bots
06:15:59🕵️ MITMHIGH▲ DETECTED
212.243.81.59(North Korea)87.125.80.78(South Africa)ARP:443
Evil twin AP: rogue WiFi access point detected
06:15:58💉 SQL InjectionHIGH▲ DETECTED
126.61.39.14(Switzerland)91.244.38.64(Iran)HTTPS:80
SQLi attempt: ' OR 1=1-- in parameter id
06:15:58🦠 MalwareCRITICAL■ BLOCKED
153.101.57.47(Japan)4.40.226.243(Ukraine)TCP:1337
Spyware activity: keylogger data exfiltration detected
06:15:57🤖 BotnetHIGH▲ DETECTED
180.27.228.51(China)124.230.15.161(Turkey)IRC:6697
DGA domain: secure-8r2il1.com contacted by 4269 bots
06:15:57🔨 Brute ForceMEDIUM▲ DETECTED
131.146.243.248(UK)83.130.68.206(Iran)FTP:80
RDP credential stuffing: 5822 login failures
06:15:57🎣 PhishingHIGH▲ DETECTED
56.145.108.26(North Korea)178.188.55.143(Sweden)HTTP:25
Business email compromise: CEO impersonation detected
06:15:57🔨 Brute ForceMEDIUM■ BLOCKED
19.121.40.124(Ukraine)6.171.122.203(Israel)SSH:80
SSH brute force: 8703 failed auth attempts from 131.20.31.180
06:15:56📜 XSSLOW▲ DETECTED
72.203.130.149(Indonesia)164.245.113.196(Switzerland)HTTPS:80
DOM-based XSS: location.hash manipulation detected
06:15:56🤖 BotnetCRITICAL■ BLOCKED
119.194.20.129(Turkey)142.74.44.141(Mexico)UDP:443
DGA domain: secure-5tgriv.com contacted by 3491 bots
06:15:55🤖 BotnetHIGH▲ DETECTED
72.15.87.94(Sweden)50.45.91.62(Iran)TCP:443
Botnet scan: 920 hosts probing port 15590
06:15:55🤖 BotnetHIGH■ BLOCKED
91.186.19.39(USA)23.170.223.43(Argentina)TCP:6667
DGA domain: secure-hzzuh2.com contacted by 9054 bots
06:15:54⚡ DDoSCRITICAL■ BLOCKED
36.113.135.222(Canada)147.165.116.225(Iran)ICMP:443
SYN flood detected: 8458 packets/sec from 220.234.167.63
06:15:53📜 XSSMEDIUM▲ DETECTED
145.180.193.46(Russia)15.222.215.73(Poland)HTTP:443
Reflected XSS: payload in URL parameter user
06:15:53🎣 PhishingCRITICAL▲ DETECTED
117.17.56.112(Switzerland)15.74.105.110(Argentina)SMTP:587
Credential harvesting page: fake PayPal login portal
06:15:53🔒 RansomwareCRITICAL■ BLOCKED
63.40.27.157(Russia)1.121.136.186(Canada)TCP:4444
LockBit variant detected: lateral movement via RDP
06:15:53🔨 Brute ForceMEDIUM▲ DETECTED
217.13.118.237(Russia)175.131.181.162(Iran)FTP:3389
SSH brute force: 1128 failed auth attempts from 16.18.255.105
06:15:53🎣 PhishingHIGH▲ DETECTED
187.193.10.1(Nigeria)40.7.99.228(Netherlands)SMTP:465
Business email compromise: CEO impersonation detected
06:15:53🤖 BotnetHIGH▲ DETECTED
130.77.156.19(Argentina)41.234.70.107(USA)HTTP:443
Mirai variant: IoT device NAS recruited to botnet
06:15:52🦠 MalwareHIGH■ BLOCKED
119.180.15.201(Mexico)183.177.80.187(Russia)HTTP:443
Ransomware signature: encrypted file extension .pay2decrypt