Attack volume
Copy linkRelative change from previous period
Top source of application layer attacks
Copy linkTop five ASes
Relative change from previous period
Top five ASes
Layer 7 attack volume trends over time from the selected location or ASN
Learn more...View in Data ExplorerDistribution of products used to mitigate application layer attack traffic
Learn more...View in Data ExplorerTop 10 attacks by target location
Learn more...Layer 3 and 4 attack volume trends over time based on the mitigating data center location
Learn more...View in Data ExplorerPercentage of TCP connections terminated within the first 10 packets by a reset or timeout
Learn more...View in Data Explorer