Provides a search interface to search for domain names and IP addresses under attacks. Shows results for the last 30 days. Provides an API, which requires special authorization.
Contains a list of UDP-based protocols, which can be used for amplification attacks.
The Netlab of 360.com provides some open data streams.
One dataset concerns the number of abused reflectors per protocol.
Overview over IP addresses scanning the internet and which ports are scanned.