Security & Attacks from AS202

CENTURYLINK-LEGACY-LVLT-202

Attack volume

Relative change from previous period

Top source of application layer attacks

Top five locations