Overview for

Autonomous Systems

Top five ASes

Security & Attacks

Insight into network and application layer attack traffic

Layer 3/4 Attacks

DDoS Attack Type

Layer 7 Attacks

Top Mitigation Techniques

Adoption & Usage

Insight into adoption and usage of key protocols

Internet Protocol versions

IPv4 vs. IPv6

HTTP versions

HTTP/1.x vs. HTTP/2 vs. HTTP/3

Top 10 Domains

Daily insights into domain popularity derived from Cloudflare data