I'd be careful about this, they explicitly do not want you to use their websocket as a public api (hence the obfuscation in their protocol), I wrote a JS library and opted not to play cat and mouse with them.
Data is served through a public MQTT server (dedicated to serve requests for this component) - thanks to geohash-based topics and some other optimizations it greatly reduces amount of data sent to clients comparing to direct websocket connection to Blitzortung servers (it is also required by Blitzortung data usage policy - third party apps must use their own servers to server data for their own clients).
It will add each strike as a device temporarily on your devices map.