Internet traffic trends
Traffic volume over the selected time period
Learn more...Traffic volume over the selected time period
Learn more...Top five ASes
List of the top five Autonomous Systems for a given location, based on APNIC estimated populationInsight into network and application layer attack traffic
Top Mitigation Techniques
Learn more...DDoS Attack Type
Learn more...Insight into adoption and usage of key protocols
IPv4 vs. IPv6
Learn more...HTTP/1.x vs. HTTP/2 vs. HTTP/3
Learn more...Daily insights into domain popularity derived from Cloudflare 1.1.1.1 data
Learn more...Mobile device vs. desktop traffic distribution
Learn more...Bot (automated) vs. human traffic distribution
Learn more...Distribution of requests to Cloudflare by user agent
Learn more...Top 10 attacks by target or source location
Learn more...