Security & Attacks in

Attack volume

Relative change from previous period

Top source ASes of application layer attacks

Application layer attack volume

Layer 7 attack volume trends over time

Network layer attack volume

Layer 3/4 attack volume trends over time

Mitigated traffic sources

Distribution of products used to mitigate application layer attack traffic

Attack methods

Distribution of network layer attack methods


Insight into the composition of traffic seen by Cloudflare

Mobile vs. Desktop

Mobile device vs. desktop traffic distribution

User classification

Bot vs. Human

Adoption & Usage

Insight into adoption and usage of key protocols

Internet Protocol versions

IPv4 vs. IPv6

HTTP versions

HTTP/1.x vs. HTTP/2 vs. HTTP/3

Application layer attack activity

Top 10 attacks by target or source location