Privacy Policy
Last updated: 2026-03-09
CyberAttackMap.net is part of the Easy Digital Tools network: lightweight tools and visual utilities with clear results. This privacy policy explains what information may be processed when you use this site and how that information is used.
What information may be processed
- Technical request data: Like most websites, your browser sends standard request information such as IP address, browser headers and related connection metadata when loading the page.
- Usage and interaction data: If analytics are enabled, this site may collect aggregate usage information such as page views, approximate visit patterns and general interaction statistics.
- Threat map feed data: The live cyber threat map may display aggregated external threat telemetry and supplemental visualization data for the purpose of showing real-time activity on the page.
How this information is used
Technical data is used to operate the site, load the page correctly, improve reliability, prevent abuse and understand general usage patterns. The map itself is provided as an informational visualization tool and may combine real feed data with supplemental threat telemetry for continuity and visual enrichment.
Do we store personal information?
We do not require accounts or sign-ups to use this site, and we do not intentionally collect personal information just to view the cyber attack map. However, like most websites, our hosting provider or infrastructure services may generate standard server logs for security, troubleshooting and abuse prevention.
Cookies and analytics
This site may use analytics to understand traffic and usage patterns. Analytics services may use cookies or similar technologies to measure page views, visits, engagement and basic site performance.
Third-party services
This website may rely on third-party services such as analytics, hosting, CDN or external telemetry sources. Those providers may process technical or usage data according to their own privacy policies.
About the cyber threat visualization
CyberAttackMap.net is designed as a live visual threat map. Some on-screen activity may come from aggregated external data sources, while some supplemental activity may be used to keep the visualization continuous and readable. This site is intended for informational and visual exploration purposes.
Contact
If you have questions about this policy, you can contact us at EasyDigitalTools@proton.me.
This policy is provided for general informational purposes and may not cover all legal requirements in every jurisdiction.