Security & Attacks in

Attack volume

Relative change from previous period

Top source ASes of application layer attacks

Application layer attack volume

Layer 7 attack volume trends over time


Network layer attack volume

Layer 3/4 attack volume trends over time


Mitigated traffic sources

Distribution of products used to mitigate application layer attack traffic


Attack methods

Distribution of network layer attack methods

Traffic

Insight into the composition of traffic seen by Cloudflare

Mobile vs. Desktop

Mobile device vs. desktop traffic distribution


User classification

Bot vs. Human

Adoption & Usage

Insight into adoption and usage of key protocols

Internet Protocol versions

IPv4 vs. IPv6


HTTP versions

HTTP/1.x vs. HTTP/2 vs. HTTP/3

Application layer attack activity

Top 10 attacks by target or source location