Security & Attacks in Indonesia

Attack volume

Copy link

Top source of application layer attacks

Copy link

Application layer attack volume

Copy link

Application layer attack distribution

Copy link
Direction

Mitigated traffic sources

Copy link

Application layer attack activity

Copy link
Direction