172 private links
IPv6 Uptake
IPv6 Users per AS
IPv6 Relative Performance
DNSSEC RSA Validation
DNS Resolver use
Users per AS
Since 2013, Backblaze has published statistics and insights based on the hard drives in our data center. You'll find links to those reports below. We also publish the data underlying these reports, so that anyone can reproduce them. You'll find an overview of this data and the download links further down this page.
Nous partageons les données qui révèlent comment les règles et les actions des autorités administratives et des entreprises affectent la confidentialité, la sécurité et l'accès aux informations.
Wikiscan is an independent statistics site on Wikipedia and other wikis hosted by the Wikimedia Foundation. The site was created in 2011. The Wikimedia France association supports server hosting.
Wikiscan use public data published by the Wikimedia Foundation : replicas of Wikimedia databases on Tool Labs, pageview dataset, Mediawiki API.
Founded in 2013, Bitmain Technologies, now among the world's most recognizable Bitcoin companies, was established to develop and sell the world’s leading bitcoin miners using Bitmain's ASIC chip technology. Starting with the Antminer S1, our task continuously became more difficult as bitcoin’s “difficulty level” kept rising. We followed Moore’s Law in this emerging field of ASIC chip design and pioneered it, time and again. In May of 2016 we released the Antminer S9, the world’s first consumer-grade bitcoin miner based on a 16nm process ASIC chip. This is also the world’s most power-efficient bitcoin miner, taking that title away from its predecessor, the Antminer S7.
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
Learn about the latest online threats.
Share and collaborate in developing threat intelligence.
Protect yourself and the community against today’s latest threats.
At the heart of Open Threat Exchange is the pulse, an investigation of an online threat. Pulses describe any type of online threat including malware, fraud campaigns, and even state sponsored hacking.
Pulses are comprised of indicators of compromise (or IoCs), which describe the infrastructure of that threat – including IPs, file hashes, e-mail addresses affiliated with the threat, etc.
Ce site et ses graphiques sont réalisés à partir de données issues de As24904 du Fournisseur d'accès internet K-Net.
Mes remerciements à Vivien & Lafibre.info, Jack pour leur collaboration.
Ce site utilise ChartJs pour générer les graphiques.
Contact, remarques, signalements de bugs: TiTiDu01, ou sur lafibre.info.
IBM X-Force Exchange Threat Feed Manager
Introducing threat feed manager: you can now view external sources of threat intelligence within XFE.
Threat Research and Response