How to detect Mirai C2 traffic on bare metal
Mirai botnet traffic has distinct fingerprints in kernel counters and packet logs. Spot scanning, C2 command t...
9 min read →Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.
All features →From indie hosts to ISPs — see how teams like yours use Flowtriq to detect and stop DDoS attacks.
Talk to Us →Blog
Practical guides from engineers who've been DDoS'd and learned from it.
From the 300 Gbps Spamhaus attack to 5.6 Tbps Mirai variants — the biggest DDoS attacks ever recorded, what made them possible, and the defenses they forced into existence.
Mirai botnet traffic has distinct fingerprints in kernel counters and packet logs. Spot scanning, C2 command t...
9 min read →The 50,000x amplification factor explained at the packet level, a ready-to-use NOC email template, and the exa...
10 min read →Complete guide to DNS amplification DDoS attacks. Learn how they work at the protocol level, what the traffic ...
12 min read →memcached amplification attacks can reach 50,000x amplification. Here's exactly what the traffic looks like at...
8 min read →Sophisticated attackers don't use one protocol. They rotate between UDP, TCP, and HTTP to evade simple thresho...
9 min read →Newsletter
One email a month. Real attack postmortems, detection techniques, and engineering insights. No marketing fluff.
No spam. Unsubscribe any time.