Attack volume
Relative change from previous period
Top source of application layer attacks
Top five locations
Relative change from previous period
Top five locations
Layer 7 attack volume trends over time from the selected location or ASN
Learn more...Distribution of products used to mitigate application layer attack traffic
Learn more...Insight into the composition of traffic seen by Cloudflare
Mobile device vs. desktop traffic distribution
Learn more...Bot vs. Human
Learn more...Insight into adoption and usage of key protocols
IPv4 vs. IPv6
Learn more...HTTP/1.x vs. HTTP/2 vs. HTTP/3
Learn more...