Security & Attacks in Kenya

Attack volume

Relative change from previous period

Top source of application layer attacks

Top source ASes of application layer attacks

Top five ASes

Application layer attack volume

Layer 7 attack volume trends over time from the selected location or ASN

Learn more...View in Data Explorer

Application layer attack distribution

Distribution of application layer attacks

Learn more...View in Data Explorer

Mitigated traffic sources

Distribution of products used to mitigate application layer attack traffic

Learn more...View in Data Explorer

Application layer attack activity

Top 10 attacks by source location

Learn more...
Sort order: