Attack volume
Relative change from previous period
Top source of application layer attacks
Top five locations
Relative change from previous period
Top five locations
Layer 7 attack volume trends over time
Learn more...Layer 3/4 attack volume trends over time
Learn more...Distribution of products used to mitigate application layer attack traffic
Learn more...Distribution of network layer attack methods
Learn more...Insight into the composition of traffic seen by Cloudflare
Mobile device vs. desktop traffic distribution
Learn more...Bot vs. Human
Learn more...Insight into adoption and usage of key protocols
IPv4 vs. IPv6
Learn more...HTTP/1.x vs. HTTP/2 vs. HTTP/3
Learn more...Recent BGP route leaks originated by or affecting AS205364
Learn more...Posts tagged with "BGP" from the Cloudflare blog
Is BGP safe yet? If the question needs asking, then it isn't. But how far the Internet is from this goal is what we set out to answer.
Routing on the Internet follows a few basic principles. Unfortunately not everything on the Internet is created equal, and prepending can do more harm than good. In this blog post we’ll talk about the problems that prepending aims to solve, and some alternative solutions
In this blog post, we will introduce our new system designed to detect route leaks and its integration on Cloudflare Radar and its public API.