Attack volume
Relative change from previous period
Top source of application layer attacks
Top source ASes of application layer attacks
Top five ASes
Relative change from previous period
Top five ASes
Layer 7 attack volume trends over time from the selected location or ASN
Learn more...View in Data ExplorerDistribution of products used to mitigate application layer attack traffic
Learn more...View in Data ExplorerTop 10 attacks by source location
Learn more...Layer 3 and 4 attack volume trends over time based on the mitigating data center location
Learn more...View in Data ExplorerPercentage of TCP connections terminated within the first 10 packets by a reset or timeout
Learn more...View in Data Explorer