Stage one is analysis - our systems analyse 1/2000th of the traffic that flows through them and analyses the reports, comparing this to the characteristics of a DDOS attack. If it detects an attack is in progress, it automatically triggers mitigation.
Stage two is mitigation - the traffic is vacuumed up and channeled into a network designed to absorb the traffic and ensure it doesn't hit your server. Then, the traffic is filtered so legitimate traffic can still reach your server.
Below, you can see a list of the attacks our system is currently mitigating, updated every minute, alongside a list of the most recent 35 attacks.
Current Attacks
|
|||
IP Address | Start time | Duration |
---|
Recent Attacks
|
|||
IP Address | Duration | Start time | Finish time |
---|