Attack Types and Categories
The probes and attacks on the MIRE/C³ cluster fall into many categories with some seeing large volumes of connection attempts and some with few connections (all connections being willingly served with MIRE content, of course).
The infographic below shows what the main attack vectors are - and is updated in near real-time.
This page may display differently depending on screensize. The embedded iFrame tries to display everything found.