Attack volume
Relative change from previous period
Top source of application layer attacks
Top five locations
Relative change from previous period
Top five locations
Layer 7 attack volume trends over time from the selected location or ASN
Learn more...View in Data ExplorerDistribution of products used to mitigate application layer attack traffic
Learn more...View in Data ExplorerPercentage of TCP connections terminated within the first 10 packets by a reset or timeout
Learn more...View in Data Explorer