This blog was thought as an online archive of products and tools that uses visualization as analysis and comprehension method of the network threats' phenomena. The shown examples include a wide range of different types of both malicious activities and visualization methods.