In the Hardware Hacking Village at Kernelcon, we had a network “PewPew” map running.
It’s based on Organic IP Visualizer: https://github.com/USU-Security/oip, which I saw at Shmoocon when i presented there in January 2025. The instructions for compiling and installing are solid, i was running this on an Intel N97 MiniPC running Ubuntu 24 at Kernelcon.
The one major issue I had is that my core network switch was not mirroring traffic properly. I had to modify 2x network interfaces on my miniPC to be transparent bridges and put the miniPC interfaces directly on the uplink from the core switch to the WAN/edge router.
OIP has 2 components — a daemon and a client app.
The daemon is pointed at an interface — this is easy for a bridge setup — use br0 or whatever the interface name is.
The client app though requests to be pointed at the IP address of the interface that the daemon is pointed at. With a bridge setup, there is no ‘IP address” of the bridge to point to. After several attempts at trial-and-error, we figured out that pointing the client binary at the hostname of the machine worked.




