This page contains some thematic maps outlining the concentration of registered cyber attacks by origin. It only pays attention to reports that triggered abuse complaints.
Remember that attackers might disguise behind proxies, Tor exit nodes or boxes they hijacked before. It is up to you to decide how accurate you think these maps are.
Bashinators Abuse Central
Main info page
Copyright © 2011 Dominik George / Felix Falk
Published under the Creative Commons SA-BY 3.0 License.