What you can do is conduct an inventory of items that access the internet from your home and compare those to the IoT used by the Miria botnet. The article on Krebs on Security entitled Who Makes the IoT Things Under Attack will give you a good idea ...