Attack volume
Relative change from previous period
Top source of application layer attacks
Top five locations
Relative change from previous period
Top five locations
Layer 7 attack volume trends over time from the selected location or ASN
Learn more...Distribution of application layer attacks
Learn more...Distribution of products used to mitigate application layer attack traffic
Learn more...Top 10 attacks by source location
Learn more...Layer 3/4 attack volume trends over time based on the mitigating data center location
Learn more...Distribution of network layer attacks
Learn more...Percentage of TCP connections terminated within the first 10 packets by a reset or timeout
Learn more...