OpenClaw Exposure Map
View the OpenClaw dataset on an interactive MapLibre GL map. The dataset is loaded from a remote PMTiles archive and rendered as vector tiles in your browser.
How to use
- Wait for the dataset to load (large files can take time).
- Pan and zoom to explore features.
- Click a feature to view its attributes.
- Use the tools panel to measure distance/area or locate your position.
Statistics
| China | 40886 |
| United States | 16860 |
| Singapore | 6483 |
| Germany | 3628 |
| Japan | 2454 |
| Indonesia | 2020 |
| Hong Kong | 1974 |
| Canada | 1361 |
| France | 1311 |
| Finland | 1142 |
| Beijing Baidu Netcom Science and Technology Co., Ltd. | 13784 |
| Shenzhen Tencent Computer Systems Company Limited | 11473 |
| DigitalOcean, LLC | 7942 |
| Baidu | 7596 |
| Hangzhou Alibaba Advertising Co | 4038 |
| Alibaba Cloud LLC | 3767 |
| Alibaba (US) Technology Co., Ltd. | 3354 |
| Hetzner Online GmbH | 3260 |
| Alibaba.com LLC | 2708 |
| Hangzhou Alibaba Advertising Co., Ltd. | 2166 |
Security notice
This dataset contains information that was collected via network port scanning of publicly reachable services. Port-scan derived data can be sensitive and may expose security weaknesses, operational details, or identifying information.
Use this page for defensive research and education only. Do not use it to target systems, and do not perform scanning without explicit authorization. If you operate exposed infrastructure, treat this as a reminder to review your external attack surface.
Practical safety checks
- Inventory what is exposed to the internet and close unused ports/services.
- Prefer VPN or allowlists for admin panels; avoid exposing management interfaces publicly.
- Enable strong authentication (MFA), rotate credentials, and remove default accounts.
- Patch regularly and monitor for known vulnerabilities in exposed software.
- Log and alert on unusual connection attempts; validate firewall and WAF rules.
Learn more (recommended)
If you are new to security, start with foundational resources and focus on defensive concepts like threat modeling, least privilege, and attack surface reduction.
- OWASP Top 10 (common web risks and mitigation)
- NIST Cybersecurity Framework (practical security program structure)
- MITRE ATT&CK (adversary tactics and techniques for defenders)
Privacy note
This page fetches the dataset from a third-party host and loads basemap tiles from external providers. Those providers may receive your IP address and standard request metadata as part of normal delivery.