Visualize real-time global cyber threats with the best Cyber attack maps. Explore the digital battlefield and know more about the top cyber threat maps to easily track online attacks:
A cyber attack map is the same as a cyber threat map. It’s a tool that can get a real-time visual representation of several cyber attacks globally. These cyber-attacks include malicious software, data breaches, denial-of-service (DDoS), and many others.
This tool will show the origin, the target, and the attack intensity, which will help you understand the evolving threat landscape. This tool is very useful for cybersecurity experts and, most especially, cybersecurity researchers.
Table of Contents:
Cyber Threat Maps: Stay Ahead of Cybercriminals
The tool’s data visualization is based on aggregated data and provides insights into various cybersecurity attacks faced globally, though it may not capture every single attack.
Benefits of Cyber Attack Maps
There are several benefits you can derive from using cyber attack maps, which will help you get valuable insights into your threat landscape. Below are some benefits you get:
- Understand Threat Actors: Live Cyber attack maps provide you with a view of active and emerging cyber threats as they occur around the world. Cyber threat maps showing attack intensity help organizations understand the level and rate of a cyber attack. Cyber Threat Maps to track cyber attacks help the security team to visualize and quickly know the intensity or frequency of cyber attack events and the actors. This real-time cyber attack map will help them to respond quickly to attacks. This map too can help protect against zero-day vulnerabilities and identify the emergence of new attack techniques.
- Cyber attack Pattern Identification: This cyber attack map provides a snapshot in real-time that can help security teams observe attack patterns that might not have been captured on their network logs. They get insight into the type of attacks targeting a particular region, organizations, and technologies which will prompt for more proactive measures against this type of threat. When the security team critically analyzes this data, it will show the tactics, techniques, and procedures (TTP) used by cyber attackers.
- Threat Awareness: One benefit of a cyber attack map is the alertness to update your organization and people on the threat pattern discovered and also training them on cybersecurity. This will help the security team to create cybersecurity awareness within an organization that will push for the importance and urgency of proactive protection against cyber threats.
- Global Distribution: This tool will show how attacks are distributed globally and can protect yourself and your organization against cyber attacks.
- Visual Clarity: A Cyberattack map visualization can help break down very complex data into something more understandable and clearer by using heat maps, graphs, and timelines.
Recommended Reading =>> Cyber Security Bootcamps
How does a cyber threat map work?
Cyber threat maps will show you real-time cyber attacks. This data can be obtained from different sources like intrusion detection systems (IDS) and honeypots. It will provide you with up-to-date information on the type of attack and location the attack is coming from.
It exposes the countries or regions that are getting the most attacks and reveals the actors who might cause the attack using the tactics, techniques, and procedures.
The map will show the log or history of previous cyberattacks. This can help you identify the patterns and trends of the threats over time. There is a feature that can help users interact with the data and customize selecting attack types or specific periods.
List of the Best Cyber Attack Maps
Here is the popular list of cybersecurity threat maps to consider:
- Kaspersky
- Fortinet
- Check Point Cyber Attack Map
- NetScout DDoS & Cyber Attack Map
- Check Point Software
- Digital Attack Map
- SonicWall
- Threatbutt
- Radware Live Threat Map
- Talos Spam and Malware Map
- Sophos Threat Tracking Map
- Bitdefender Live Cyber Threat Map
- Spamhaus Threatmap
Detailed reviews:
#1) Kaspersky
Best for graphical interface and is a very comprehensive tool that can be used for cyber attack maps for Monitoring Cyber Threats, Geographical insights, and Interactive exploration.
When you open this cyber attack map, it will first detect your current location and also display statistics for your country and other countries. You can also get the top local attacks and infections from the previous week. It shows the attacks occurring in real time over a specific period.
Features:
- There is a globe view and a plane view you can switch to. These two different visualization modes can give you either 2D or 3D representations that offer different perspectives on cyber attack data.
- There is a Toggle map color that allows for the customization of the visual representation of the data displayed on the map.
- There is a Zoom in or out feature. Users can interact with the map by zooming in and out or panning to focus on specific regions.
- You can enable or disable demo mode. This feature helps to enhance user experience. It is good for training or educational purposes where real-time data is not available or not needed.
- There is an embed map using iframe. This allows users to integrate the interactive map into their websites or applications by just embedding the iframe into their code.
- There is a Buzz tap that contains helpful articles that can provide users with additional resources and insights into what they can gain from the map.
What is good?
It’s one of the best DDoS attack maps in the world.
What can be improved?
- It is possible to further enhance the interface so that it becomes more intuitive and user-friendly.
- The customizable filters can also be improved so that users can filter and customize using specific criteria like attack regions and attack types.
- It should be more interactive in such a way that when you click a specific region, all detailed information like the attacks on that region should show with preventive measures.
- Real-time alerts or notifications can be integrated to notify users during a spike in attacks or when specific regions are under severe attack.
Some activities that are detected by the Kaspersky Map:
- Kaspersky Anti-Spam
- Ransomware
- On-Access and On-Demand Scan
- Email and Web Anti-Virus
- Intrusion Detection and Vulnerability Scan
- Botnet Activity Detection
Website: https://cybermap.kaspersky.com/
#2) Fortinet
Best for creating your map to track cyber attacks targeting a specific country or originating from a specific area. Users can also click on a country and see incoming and outgoing threats.
Fortinet’s Cyberattack map is developed and maintained by the FortiGuard Labs team, which is also in charge of Fortinet’s security research and response team.
This map is a valuable tool for monitoring and understanding how cyber attack works and also helps organizations take proactive measures to protect their networks and enable them to identify any threat that emerges. Immediately after you launch this map, you will instantly see attacks pinging across the map.
Features:
- It provides live updates on different cyber-attacks like malware, botnets, and DDoS. It makes use of data collected from FortiGate devices across the globe to keep users abreast.
- It provides you with a global view of different attack activities from various regions and also allows users to monitor threats targeting specific areas.
- It will provide you with real-time comprehensive security updates and real-time intelligence on the cybersecurity landscape.
- There is an attack type that shows both incoming and outgoing attacks, which shows the overall activity of the threat landscape.
What is good?
Fortinet’s Cyber Attack Map is a valuable tool for threat mitigation and resource allocation, and can also make informed decisions in cybersecurity terrain.
What can be improved?
- There is a need to put more life on the map as its currently not captivating enough.
- Users need to instantly identify areas experiencing a surge in cyber-attacks, that is where the addition of more geographical details on the map like the country borders, major cities, and time zones will be more appreciated and helpful.
- There should be a clearer visual indicator of the severity of cyber-attacks. For example, different attacks can have different colors based on their impact, like low, medium, and high. This would further enhance the map’s interactivity and usability.
- The interface can be further enhanced so it can be more interactive, intuitive, and user-friendly.
- The customizable filters can also be improved so that users can filter and customize using specific criteria like attack regions and attack types.
Some activities that are detected by Fortinet Map:
- It detects incoming attacks that are directed toward a specific area. The map shows the severity and nature of the attack.
- It detects outgoing attacks that originate from a network and target external points.
- It provides security experts with an overall activity on the network by geographic region.
Website: https://threatmap.fortiguard.com/
#3) Check Point
Best for detecting DDoS attacks from anywhere in the world.
Check Point Threat Map is designed by Check Point. It’s a cyber-attack map. The map is like a Norse map, but it is more visual than the one from Norse. Though it is not the most enhanced and advanced map, but can help capture the live statistics for recent attacks.
The Cyber Threat Map shows statistics of recent attacks and the source and destination of these attacks. The Map will also provide you with features like Top Targeted Countries, Top Targeted Industries, and Top Malware Types. Cybersecurity experts use this tool to track cyber-attack patterns within some time and you can filter by daily, weekly, or monthly periods.
Features:
- A chart to view recent daily attacks. It can display attack activity for a specified timeframe. This chart will inform you of the current threat levels and provide you with an interactive way to monitor and analyze attack activity over time.
- It can display information like the top Targeted Countries, and top targeted industries. Based on the number of attacks hitting them, we rank both countries and industries.
- It can identify the top malware types. This provides valuable insights into the most prevalent malware threats currently in circulation. This will help organizations to fashion their security strategies and defense in the right direction.
- There is a daily reset around 12:00 a.m PST. So that the information you view is always up-to-date.
- The map will provide you with deep insights into the attack landscape that will help protect your systems, processes, and technologies.
What is good?
This map provides you with a real-time visualization of the global cyber-attack landscape.
What can be improved?
- There is a need to enhance the quality of the map by providing more detailed information about the specific cities or regions affected by cyber threats.
- It should be more interactive and engaging so that users can click on a specific attack point to view additional details or historical data to enhance more user experience.
- It should be more educative in providing short explanations of attack types, their impact, and potential countermeasures for them to quickly make informed decisions.
- There should be color coding to serve as threat severity indicators.
- Include historical trends or patterns that would assist the users in discovering recurring attack vectors.
Some activities that are detected by the Check Point Map:
- The map shows current cyber attacks in real time, making you see where and when attacks are occurring.
- It provides you with global statistics and insights into the scale, rate, and frequency of attacks from different regions globally.
- It provides historical attack trends to help you identify the patterns and potential vulnerabilities.
Website: https://threatmap.checkpoint.com/
#4) NetScout
Best for cybersecurity professionals to discover and obtain real-time DDoS Attacks. It shows all DDoS events from every part of the world, whether increasing or reducing.
This map focuses on analyzing the capabilities and potential of DDoS and cyber attacks. You get to see multiple indicators of an attack on display through the Omnis Threat Horizon portal. Both the interactive and visualization features can assist users in understanding attack patterns so they can easily identify high-risk regions and be aware of emerging threats.
Features:
- There is a page where you can generate an expert analysis via a DDoS Threat Intelligence Report. Users can gain valuable insights into attack patterns and their impacts, which will help them respond more effectively and aggressively to DDoS threats.
- It’s a fully interactive map. The map provides real-time and detailed visualizations of global cyber attack activity happening around the globe.
- There is a security blog where you can further read other updates. This is where users can get the latest developments in cybersecurity, understand emerging attacks, and implement effective security posture.
- There is an attack statistic that gives a Global DDoS Summary by frequency, volume, and speed. This will help users understand the scale and impact of DDoS threats on them so that they can respond swiftly.
- It gives you the Top Source Countries and Top Destination Countries. This helps users identify where attacks are coming from and where they are directed, which will better help prepare organizations to be swift about their defensive measures.
What is good?
It’s not just a cyber attack map platform but a cybersecurity platform that has DDoS solutions that can protect you and your organization against DDoS.
What can be improved?
- There is a need to enhance the quality of the map by providing more detailed information about the specific cities or regions affected by cyber threats.
- It should be more interactive and engaging so that users can click on a specific attack point to view additional details or historical data to enhance more user experience.
- It should be more educative in providing short explanations of attack types, their impact, and potential countermeasures for them to quickly make informed decisions.
- There should be color coding to serve as threat severity indicators.
- Include historical trends or patterns that would assist the users in discovering recurring attack vectors.
Some activities that are detected by the NetScout Map:
NETSCOUT is a global cybersecurity platform that created situational awareness that provides organizations with the right visibility into threat activity on the landscape.
Horizon Map demonstrates DDoS attack activities observed globally by ATLAS in a near real-time fashion. Explore attack activities by characteristics, such as size, type, sources, destinations, etc. Keep it running in your browser tab or even better, on a big screen in your operations center.
Horizon Summary provides a set of reports on DDoS attacks, highlighting key events like the most significant attacks by geographic areas (eg. global, region, country), industry sectors, and time span (eg. annual, quarter, month). Check-in regularly to see what has happened globally or in your areas of interest.
Horizon Neighborhood enables you to view DDoS attack activities in Map and Summary through the lens of your interests. A neighborhood is a combination of geographic areas and industry sectors. Register for a free login and create neighborhoods you care about.
Website: https://www.netscout.com/ddos-attack-map
#5) Digital Attack Map
Best for cybersecurity analysts who can use this platform to monitor and analyze current cyber threats and attack patterns globally. General IT Pros can use the map to identify potential threats targeting their IT infrastructure.
Digital Attack Map can be used by individuals and organizations interested in what is going around them in the cyber attack sphere they want to understand and visualize the global cyber attacks in real-time. Its detailed metrics on attack volume, frequency, and speed can help users understand the scope and impact of cyber threats.
Features:
- It has a real-time display of DDoS around the world. This real-time visualization is a very good feature for cybersecurity professionals to understand and respond to global cyber threats.
- You can view historical data to track trends and patterns in cyber attacks happening globally over a period.
- The map is customizable using parameters such as attack type, duration, source, and destination countries.
- You can use it to train and create security awareness about cybersecurity threats happening all over the world.
- You can embed the code into other applications or websites by using iframe. This allows seamless integration of real-time DDoS attack data on different platforms.
What is good?
Digital Attack Map is one of the best cyber attack platforms that can help you enhance your understanding of cybersecurity threats globally.
What can be improved?
- It should be more interactive and engaging so that users can click on a specific attack point to view additional details or historical data to enhance more user experience.
- It should be more educative in providing short explanations of attack types, their impact, and potential countermeasures for them to quickly make informed decisions.
Some activities that are detected by the Digital Attack Map:
- DDOS Attack
- Real-time Updates
- Botnet Attacks
Website: https://www.digitalattackmap.com/
#6) SonicWall
Best for security professionals and organizations who want to improve their cyber threat visibility and be more proactive with threat intelligence. It’s a good platform to get strategic insights on how to strengthen an organization’s overall cybersecurity defenses.
It’s a platform that can provide you with a graphical view of worldwide attacks over the last 24 hours. It displays which countries are being attacked and the source of the attacks within the last 24 hours. It can offer you insights into the current state of cyber threats that focus on different types of attacks and their source and destination.
Features:
- It can be used for real-time threat monitoring that gives live updates on global cyber attack activity. When you effectively use this tool, you can monitor, analyze, and respond to cyber threats swiftly.
- It can help to identify new threats by keeping track of new and evolving attack trends as they happen in real-time and, allowing for proactive measures.
- It is an effective tool for teaching and learning about cybersecurity with various educational activities, awareness programs, training exercises, and research projects it contains.
- It can be used for global threat intelligence by supplying the data and geographic details that can help security professionals monitor current threats, analyze trends, and become swift in applying mitigating measures.
What is good?
SonicWall cyber attack map can offer you a powerful tool for monitoring, analyzing, and responding to cyber threats in real time. It can be used for security awareness and to improve your cybersecurity posture.
What can be improved?
- User interactivity on the platform needs to be enhanced and improved.
- A real-time alert add-on can be integrated into the platform.
- Historical data analysis can be improved so that organizations can identify long-term patterns and seasonal trends.
- Provision of seamless integration with a Security Information and Event Management System.
Some activities that are detected by Sonicwall:
- Malware
- Intrusions
- Ransomware
- New Threats
- Spam
- Phishing
- Cryptojacking
- Encrypted Traffic
Website: https://securitycenter.sonicwall.com/m/page/worldwide-attacks
#7) Threatbutt
Best for educational purposes, creating security awareness among security enthusiasts with its unique and playful presentation style of visualizing cyber attacks all over the world.
Threatbutt helps to track cyber attacks in real-time. It will show the source IP of the attack, including the target IP. You will also get an explanation of the severity of each attack. Terms like “We’ll just call it a glitch” indicate small or minor attacks, while terms like “It’s cyber Pompeii” indicate a major attack and its widespread.
Features:
- The platform is humorous with a playful tone. It makes learning about cybersecurity more accessible and enjoyable to users. Its unique and best approach is the way it attracts users’ attention and helps raise awareness about cyber threats in a way that is both educational and entertaining to people.
- It displays real-time data on cyber threats globally, playfully and interactively. This makes it the ideal medium to raise awareness about cybersecurity to educate users and encourage the best cybersecurity practices.
- It helps track cyber attacks in real-time by providing a global perspective on cyber attacks, allowing users to monitor threat activity as they occur in different locations.
- It shows the location and IP address of the source and target of each attack. This feature helps users understand the origins and destinations of cyber threats so that they will know the best way to tackle or mitigate them.
What is good?
It’s entertaining and educative. It is a very simple and good resource for educational explanations of cyber attacks occurring around the world.
What can be improved?
- User interactivity on the platform needs to be enhanced and improved.
- There should be a filtering and customization feature.
- The platform should be more detailed with factual data.
Some activities that are detected by Threatbutt:
- Malware
- Data Breaches
- Ransomware
- Botnet
- Phishing
Website: https://threatbutt.com/map/
#8) Radware
Best for security professionals and organizations that want to improve their threat monitoring, security intelligence, and response posture using a real-time visualization of cyber attacks going on around the world.
Radware’s Live Threat Map will give real-time data about cyber attacks around the world. It makes use of Radware’s Deception Network, which has honeypots that collect information about active threat actors globally in real-time. It uses the capability of machine learning algorithms to profile attackers with their intent.
Features:
- It has a link where you can download the current global threat analysis report. This report will give detailed data and insights into cyber threats happening globally.
- Ability to check on the attack types. Through this categorization of attack types, users can monitor current threats and current attack trends so they can swiftly mitigate any security risk.
- You can select the statistics interval of the cyber-attacks you want. With this feature, you can customize the analysis of attack activity over different times.
- You can view top attackers, top network attack vectors, top application violations, and top scanned UDP and TCP Ports.
- You can enhance its functionalities by integrating with the advanced technologies and services that Radware Solutions can provide.
- It has a user-friendly interface and customizable features that you can use to adjust views, select data intervals, and generate custom reports.
What is good?
It is a valuable tool for real-time visualization, monitoring, and understanding cyber attack behavior.
What can be improved?
- More interaction on the platform like clickable attack icons that provide detailed information.
- Integration with other security solutions aside from Radware solutions.
- There should be more enhanced filtering options.
Some activities that are detected by Radware Live Threat Map:
- Web Attackers
- DDoS Attackers
- Intruders
- Scanners
- Anonymizers
Website: https://livethreatmap.radware.com/
#9) Talos
Best for security professionals and organizations that want to improve their threat monitoring and security intelligence, and get up-to-date information on spam and malware activities happening around the world.
Talos is a platform to discover the world’s top spam and malware senders. The map displays the top 10 spam and malware sender lists by country. The map can track and analyze cyber threats.
Features:
- It has a user-friendly interface that allows easier navigation and interaction and it can be customized to your need.
- It can be integrated into Cisco’s suite of security tools that can help with swift threat detection, response, and analysis of a threat.
- The map is interactive enough to allow users to click on specific regions or threat types to get more detailed information.
- Column for Spam and Malware volume. This helps with detailed and important metrics on the level and widespread of spam and malware attacks.
What is good?
When you click the hostname, you will see the exact IP address of the server that sent spam and malware, the hostname, the last day of the detection, and the reputation status.
What can be improved?
- Providing more details about the threat, such as the specific types of malware and the method of spam.
- There should be options for filtering on the platform.
- Integration with other security tools.
- User interactivity on the platform needs to be enhanced and improved.
Some activities that are detected by Talos Spam and Malware Map:
- Spam
- Malware
Website: https://talosintelligence.com/ebc_spam
#10) Sophos
Best for individuals interested in cyber threat trends, cybersecurity professionals, and large organizations that need real-time insights into global cyber threats.
The Map displays real-time data on cyber attacks like malware infections, spam, and other security attacks like web threats in the world. It visually shows the real-time volume and distribution of these threats coming from different regions all over the world.
Features:
- It has a user-friendly interface and can be integrated into other cybersecurity solutions. This integration will help provide a centralized management system with improved threat detection and improved security posture.
- It can be used for educational purposes where the learners receive adequate training and practical insights into cybersecurity practices, trends, and incident response. This will further bolster their understanding of the cybersecurity field.
- The map visualizes real-time data. This helps users to see all attack activities as they occur and be efficient and effective enough to mitigate ongoing cyber threats.
What is good?
Real-time data for web, malware, and spam threats is from the Sophos award-winning Labs team.
What can be improved?
- There should be more options for advanced filtering on the platform.
- Integration with other security tools.
- User interactivity on the platform needs to be enhanced and improved.
Some activities that are detected by Sophos:
- Spam threats
- Malware threats
- Web threats
Website: https://firewall.net.za/sophos-threat-dashboard/
#11) Bitdefender
Best for individuals who are interested in cyber threats happening around the world.
The Map displays real-time data on cyber attacks like attacks, spam, and infections. It shows live attacks, the attack name, attack type, attack country, and target country. This map is very helpful to users who want to understand the recent attack activities and current threat landscape.
Features:
- The map provides real-time updates on cyber-attack activity. It displays the actual time the attacks happened and were detected.
- The map shows the types of cyber-attacks using visual markers, such as icons, colors, and symbols.
- The interactive markers and real-time updates help determine where attacks are originating and where they are directed.
What is good?
It can only be used for security awareness about live cyber attacks happening around the world.
What can be improved?
- There is no interactivity on the platform. The interface is not clickable.
- There should be more options for filtering on the platform.
- Integration with other security tools.
Some activities that are detected by Bitdefender:
- Attack
- Spam
- Infection
Website: https://threatmap.bitdefender.com/
#12) Spamhaus
Best for security professionals and organizations that want to understand current trends and potential risks spam threats can cause.
Spamhaus can visualize live botnet threats worldwide. It can monitor and visualize real-time spam and malware attacks worldwide. This is one valuable threat attack map that captures everything you need to know in respect to bot attacks.
Further Reading => Top Cybersecurity Companies of the Year
Features:
- It has a user-friendly interface and can be integrated into Spamhaus DNS Firewall and other solutions.
- It can be used for educational purposes to learn about threat intelligence. This is one valuable educational tool that provides its users with adequate knowledge of global cyber threats.
- It displays real-time details of cyber threats happening globally, like the number of active bots in the last 24 hours.
- It shows the top 10 locations with the most intense bot activity. This feature highlights regions affected by these attacks and with a visual description.
- It shows the top 10 worst botnet servers like the most active, dangerous, intensity, and impact.
- There is a Spamhaus Threat Map Widget you can add to your website. This a very good way to keep tap on what is happening on the global threat attacks right from within your website.
What is good?
It will provide you a timely insight into real-time spam and malware attacks happening around the world.
What can be improved?
- There should be more options for advanced filtering on the platform.
- It should support multiple languages and localization which will make the threatmap more accessible and usable for users worldwide.
- User interactivity on the platform needs to be enhanced and improved.
Some activities that are detected by Spamhaus:
- Spam threats
- Malware threats
- Phishing Attack
- Botnet Attack
Website: https://www.spamhaus.com/threat-map/
Frequently Asked Questions
1. Are cyber threat maps real?
Yes, they are real so far there will continue to be Cyber attacks. Cyber threat maps are also known as cyber attack maps. It will continue to provide you with real-time visual representations of cyber attacks as they are happening all over the world.
2. What is a Norse attack map?
This tool provides real-time data about cyber attacks from every part of the world. It tracks and visualizes cyber threats and incidents. It is a powerful tool that can help you protect against any threats.
You can equally customize this tool by adding your company logo and can have Norse Attack Map display real-time data on cyber attacks in your office.
3. What is the number 1 method used by cyber attackers?
Phishing still retains the number one spot as the most successful cyber-attack method because of its ability to exploit human psychology and take advantage of a lack of security awareness.
This method can also lead to other cyber attacks like ransomware whereby the attackers want you to pay a certain amount of money so that your data will not be leaked publicly.
4. What was the most successful cyber attack?
The RockYou2021 attack was one of the largest breaches ever. There were about 8.4 billion passwords leaked. In 2017, one of the biggest ransomware attacks of all time happened. This attack saw around 200,000 computers in over 150 countries affected by the ransomware and several billions were spent to fix it.
5. What was the biggest cyber-attack of 2023?
The Royal Mail Faces a Huge Financial Loss Following the LockBit Attack which was a ransomware attack. This attack had a far-reaching impact on the Royal Mail in 2023.
6. What are the 10 most common types of cyber-attacks?
These are as follows:
Ransomware
Malware
Denial-of-Service (DoS) Attacks
Phishing
Spoofing
Nation-state Cyber Attack
Cross-Site Scripting (XSS) Attacks
Code Injection Attacks
Supply Chain Attacks
Insider Threats
7. What is the fastest-growing cyber threat?
The rate at which Ransomware attacks are growing is very alarming, causing great financial loss to individuals and so many organizations worldwide. Ransomware attacks occur every minute and the security advice is that you should never pay the ransom when you are hit by ransomware.
Suggested Read =>> Most Affordable And Free Online Cyber Security Degree Programs
Conclusion
Cyber-attacks happen every minute, the frequency is still on the rise. Threats like spam, botnets, DDOS, malware infections, and many more still occur. Even when you deploy Cyber attack maps, they will not stop these attacks but inform and create an awareness of the threats, where they are coming from, and the target.
No one can be 100% secure and safe from cyber attacks, but the advice is to deploy security solutions that will protect your organization against security risks and help remediate any vulnerabilities within the system.
Research Process:
- Time is taken to research this article: 120 Hours
- Total products researched: 20
- Top products shortlisted: 12