Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners White Label Referral Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

Annual Report

State of DDoS 2026

Attack trends, vector analysis, and mitigation data from Flowtriq's detection network, combined with public intelligence from Cloudflare, Radware, Netscout, and ENISA.

Published March 15, 2026 Platform data: Jan – Dec 2025 15 min read
121%
↑ YoY
More attacks
than 2024
31.4 Tbps
↑ record
Largest recorded
attack (Cloudflare)
62%
↑ 9pts
UDP-based
attack volume
14 min
↓ from 23 min
Median attack
duration

01Executive Summary

2025 was the most active year for DDoS attacks ever recorded. Every major reporting source (Cloudflare, Radware, Netscout, and Flowtriq's own detection network) reported record-breaking numbers across volume, frequency, and peak bandwidth.

Attack frequency more than doubled year-over-year. Cloudflare alone mitigated 47.1 million DDoS attacks in 2025, a 121% increase over 2024.[1] Across Flowtriq-monitored infrastructure, the average node experienced 4.2 incidents per month in 2025, up from 2.4 in 2024. This increase was not driven by a few heavily-targeted outliers: 81% of all monitored nodes saw at least one attack during the year, compared to 64% in 2024.

Attacks are getting shorter but more intense. The median attack duration dropped from 23 minutes to 14 minutes, while median peak PPS rose 41%. Attackers are favoring short, high-intensity bursts designed to overwhelm before defenses can react, making sub-second detection critical.

UDP-based volumetric floods remain dominant, accounting for 62% of all attack traffic observed by Flowtriq. But the composition shifted: DNS amplification surpassed memcached as the #1 amplification vector for the first time since 2021, driven by a 340% increase in open DNS resolver abuse.[1]

Multi-vector attacks became the norm. 38% of incidents observed by Flowtriq involved two or more attack families simultaneously, up from 22% in 2024. Attackers increasingly combine volumetric floods with protocol-level attacks to bypass single-layer defenses.

The barrier to launching attacks has never been lower. DDoS-for-hire services (booters/stressers) now advertise 1 Tbps+ capacity for under $50/day. Law enforcement takedowns of major booter services in late 2024 created a brief dip in Q1 2025, but the market rebounded by Q2 with new operators filling the vacuum.[2]

02Methodology

Data Sources

This report combines three categories of data:

  • Flowtriq platform data: Anonymized, aggregated statistics from incidents detected across the Flowtriq network between January 1 and December 31, 2025. All data is reported as percentages, distributions, and medians. No customer-identifiable information is included. Data is sampled from nodes across hosting providers, ISPs, game server operators, and enterprise infrastructure.
  • Public vendor reports: Published threat intelligence from Cloudflare (DDoS Threat Report Q4 2025), Radware (Global Threat Analysis Report 2025), Netscout (DDoS Threat Intelligence Report 2H 2025), and Akamai (State of the Internet / Security 2025).
  • Government and industry data: ENISA Threat Landscape 2025, FBI IC3 Annual Report, and published incident disclosures from affected organizations.

Where Flowtriq data and public sources overlap, both figures are presented. Discrepancies are noted and explained. All year-over-year comparisons use the same methodology applied to 2024 data.

03Attack Volume & Frequency

DDoS attack frequency has grown every year since 2020, but 2025 marked the steepest single-year increase. Cloudflare reported mitigating 47.1 million DDoS attacks in 2025, a 121% increase over 2024, averaging 5,376 attacks automatically mitigated every hour.[1] Netscout tracked approximately 17 million attacks globally in the first half alone.[3]

Within the Flowtriq network, we observed consistent growth across all quarters:

4.2
Average incidents per node per month (up from 2.4 in 2024)
81%
Of monitored nodes saw at least one attack in 2025
Q4
Peak quarter: 31% of all 2025 incidents occurred Oct–Dec

Quarterly distribution (Flowtriq data):

Q1 2025
18%
18%
Q2 2025
24%
24%
Q3 2025
27%
27%
Q4 2025
31%
31%

The Q4 spike aligns with patterns observed across the industry. Holiday-season gaming DDoS, Black Friday targeting of e-commerce, and year-end geopolitical tensions all contributed to the surge. Radware reported a similar Q4 peak, noting a 46% increase in attacks against e-commerce infrastructure in November and December.[4]

04Attack Vectors

UDP-based volumetric floods continue to dominate, but the specific amplification vectors are shifting. Across Flowtriq-detected incidents in 2025:

UDP Flood
34.1%
34.1%
DNS Amplification
18.2%
18.2%
SYN Flood
15.7%
15.7%
memcached Amplification
9.8%
9.8%
NTP Amplification
7.9%
7.9%
ICMP Flood
5.1%
5.1%
GRE / ESP Flood
3.4%
3.4%
Other / Mixed
5.8%
5.8%

DNS amplification overtook memcached as the top amplification vector for the first time since 2021. This shift was driven by a 340% increase in open DNS resolver abuse, fueled by misconfigured home routers and IoT devices exposed by ISPs that do not enforce BCP38 (source address validation).[1]

SYN floods are making a comeback. After years of declining share, SYN floods rose from 11.3% to 15.7% of incidents. Modern SYN floods use randomized source ports and TTL values to defeat simple rate-limiting, forcing defenders to use stateful inspection or SYN cookies, which consume CPU.

GRE and ESP protocol floods are emerging. These encapsulation protocols are difficult to filter without disrupting legitimate VPN and tunnel traffic. Cloudflare flagged GRE floods as a rising concern in Q3 2025, and Flowtriq data confirms this trend at 3.4% of incidents.[1]

"The shift from memcached to DNS amplification tells you attackers are adapting. Memcached reflectors have been cleaned up over the past three years; open DNS resolvers are being created faster than they're being shut down."

- Flowtriq Threat Intelligence Team

Multi-vector attacks: the new normal. 38% of Flowtriq-detected incidents involved two or more simultaneous attack families. The most common combinations:

Combination% of Multi-Vector IncidentsTypical Goal
UDP Flood + SYN Flood41%Saturate bandwidth while exhausting connection tables
DNS Amp + ICMP Flood22%Overwhelm upstream + probe network path
SYN Flood + HTTP Flood18%Volumetric cover for application-layer attack
memcached + NTP Amp12%Maximize amplification from two reflector pools
Other combinations7%Various

05Attack Size & Duration

The headline number in 2025 was Cloudflare's disclosure of a 31.4 Tbps attack in Q4 2025, the largest ever recorded, surpassing their own 5.6 Tbps record from late 2024. The attack lasted just 35 seconds. Attack sizes grew over 700% compared to the previous year's peaks.[1] But record-breaking mega-attacks are outliers. The real story is the distribution of attacks that hit everyday infrastructure.

Peak bandwidth distribution (Flowtriq data):

< 1 Gbps
42%
42%
1 – 10 Gbps
35%
35%
10 – 100 Gbps
18%
18%
100 Gbps – 1 Tbps
4.2%
4.2%
> 1 Tbps
0.8%
0.8%

77% of attacks are under 10 Gbps. These are not headline-making floods, but they are devastating for hosting providers, game servers, and small operators whose uplinks are 1–10 Gbps. A 3 Gbps flood saturates a 1G uplink completely. This is the "long tail" of DDoS that enterprise reports often overlook.

Attacks are getting shorter. The median duration dropped from 23 minutes in 2024 to 14 minutes in 2025. Short-burst attacks (under 5 minutes) now account for 39% of all incidents, up from 27% the prior year.

14 min
Median attack duration (down from 23 min in 2024)
39%
Attacks lasted less than 5 minutes
41%
Increase in median peak PPS year-over-year

The trend toward short, intense bursts is deliberate. Attackers know that many detection systems poll at 30–60 second intervals. A 3-minute flood at 500K PPS can saturate an uplink and time out before legacy monitoring even registers the event. This makes sub-second detection not a luxury, but a requirement for meaningful protection against the current threat landscape.

06Target Industries

DDoS attacks do not distribute evenly. Certain industries are disproportionately targeted due to the financial impact of downtime, competitive motivation, or geopolitical significance.

Most-targeted industries (Flowtriq data, by % of total incidents):

Gaming & Gambling
28.4%
28.4%
Hosting & Cloud
21.3%
21.3%
Financial Services
13.2%
13.2%
SaaS & Technology
11.1%
11.1%
E-Commerce
8.6%
8.6%
Telecom & ISPs
6.8%
6.8%
Government
4.5%
4.5%
Other
6.1%
6.1%

Gaming remains the #1 target for the fifth consecutive year. Competitive gaming DDoS (hitting opponents' servers or connections during matches) and extortion attacks against game hosting providers drive the majority of this volume. Cloudflare and Radware both independently confirm gaming as the most-attacked sector.[1][4]

Financial services attacks surged 67%. Hacktivist groups and state-affiliated actors targeted banks and payment processors across Europe and North America throughout 2025. ENISA flagged DDoS as the top threat to the financial sector in its 2025 Threat Landscape report.[5]

Government and public sector attacks, while only 4.5% by volume, received outsized media attention due to geopolitical targeting. Pro-Russian and pro-Palestinian hacktivist groups claimed responsibility for sustained campaigns against government portals in NATO countries.

07Botnets & Attack Infrastructure

The infrastructure behind DDoS attacks shifted significantly in 2025. Three trends defined the year:

1. IoT botnets grew larger and more sophisticated. Mirai derivatives remain the backbone of the DDoS-for-hire ecosystem, but 2025 saw the emergence of next-generation botnets like Aisuru (also known as Kimwolf) that build on Mirai's architecture with improved evasion and higher packet throughput. Cloudflare flagged Aisuru as a dominant force behind the largest hyper-volumetric attacks of the year.[1] New variants targeting ASUS routers, TP-Link Archer devices, and Hikvision cameras expanded the botnet pool substantially.

2. Compromised cloud VMs are replacing IoT for high-PPS attacks. Attackers are spinning up or compromising cloud instances (AWS, Azure, GCP, Hetzner, OVH) to generate packet floods that IoT devices cannot sustain. A single compromised cloud VM with a 10 Gbps NIC can generate 1–3 million PPS, orders of magnitude more than a consumer router.

3. Carpet-bombing attacks increased 180%. Instead of targeting a single IP, attackers spread traffic across an entire /24 or /16 subnet, hitting every address with a small flood. This defeats per-IP threshold detection and overwhelms aggregate bandwidth. Flowtriq detected carpet-bombing in 12% of all incidents in 2025, up from 4.3% in 2024.

botnet source analysis, flowtriq 2025
Source IP Classification (% of attack sources)

IoT / Consumer Devices ████████████████████ 44%
Cloud / VPS Instances ████████████████ 31%
Residential Proxies █████████ 14%
Spoofed / Unknown ██████ 11%

IP Spoofing Detection (Flowtriq TTL analysis)

Spoofed source IPs detected in 29% of incidents
Down from 37% in 2024, BCP38 adoption improving
▲ Good news: source address validation is working

IP spoofing is declining but still prevalent. Flowtriq's TTL-based spoofing detection flagged spoofed source IPs in 29% of incidents, down from 37% in 2024. This is a direct result of increasing BCP38/BCP84 adoption by ISPs. However, nearly 1 in 3 attacks still using spoofed sources means the problem is far from solved.

08Notable Attacks of 2025

These publicly disclosed incidents illustrate the evolving threat landscape:

Q4 2025
31.4 Tbps: Largest DDoS attack ever recorded
Mitigated by Cloudflare. The attack lasted approximately 35 seconds and represented a 700%+ increase in hyper-volumetric attack sizes over previous peaks. Surpassed Cloudflare's own 5.6 Tbps record from Q4 2024, which itself originated from a Mirai-variant botnet of ~13,000 IoT devices.[1]
September 2025
3.15 Tbps carpet-bomb against European hosting provider
A multi-day campaign spread across a /16 subnet, hitting over 65,000 IPs with distributed low-volume floods. The aggregate bandwidth overwhelmed peering links while individual per-IP traffic stayed below detection thresholds on legacy systems.
August 2025
840+ Mpps packet flood against OVHcloud infrastructure
Continuing a trend first disclosed by OVHcloud in mid-2024,[6] packet-rate attacks from compromised MikroTik core routers (CCR1036-8G-2S+ and CCR1072-1G-8S+) continued through 2025. OVHcloud identified nearly 100,000 exposed MikroTik CCR devices, with a theoretical combined capacity of 2.28 billion PPS. These attacks demonstrated that PPS-based floods from networking equipment can exceed what volumetric bandwidth numbers suggest.
July 2025
Hacktivist campaign targets 40+ government portals
Coordinated by pro-Russian groups, the campaign knocked multiple EU government websites offline for periods ranging from hours to days. Attacks ranged 50–300 Gbps, primarily DNS amplification and HTTP floods.
May 2025
Gaming platform hit with 14-day sustained DDoS campaign
A major game hosting provider experienced continuous attacks over two weeks, with peak bursts exceeding 400 Gbps. Attackers rotated vectors every 6–12 hours, switching between UDP floods, SYN floods, and DNS amplification to evade static mitigations.
February 2025
Financial services extortion wave across North America
Multiple banks and payment processors received ransom demands followed by demonstration attacks of 100–500 Gbps. The FBI issued a private industry notification warning of the campaign. ENISA later cited this wave in its annual report.[5]
January 2025
Booter service takedown creates brief Q1 dip
Law enforcement operations in late 2024 shut down several major DDoS-for-hire services. Attack volume dropped approximately 15% in January before new operators filled the gap by March.[2]

09Mitigation Trends

How the industry is defending against the evolving threat:

1. Detection speed is the #1 differentiator. With 39% of attacks lasting under 5 minutes, detection systems that poll every 30–60 seconds miss a significant portion of incidents entirely. Flowtriq data shows that nodes with sub-second detection mitigated 94% of short-burst attacks automatically, while nodes relying on 60-second polling detected only 23% of the same attacks before they ended.

2. Automated mitigation adoption is growing fast. Among Flowtriq users who enabled auto-mitigation rules in 2025, 87% of incidents were resolved with zero human intervention. The median time from detection to mitigation was 0.9 seconds for kernel-level firewall rules and 4.2 seconds for BGP FlowSpec deployment.

3. Multi-layer defense is no longer optional. With 38% of attacks using multiple vectors simultaneously, single-layer defenses (firewall only, or scrubbing only) are increasingly insufficient. The most effective deployments combine local kernel-level filtering with BGP-based upstream filtering and cloud scrubbing as a final escalation tier.

0.9s
Median time from detection to kernel-level mitigation (Flowtriq)
87%
Incidents resolved with zero human intervention (auto-mitigation users)
94%
Short-burst attacks caught by sub-second detection

4. BGP FlowSpec adoption is accelerating. FlowSpec allows operators to push granular traffic filters to their upstream transit providers via BGP, dropping attack traffic before it reaches the target network. Flowtriq users who configured FlowSpec as an escalation tier saw a 73% reduction in bandwidth consumed by attacks that exceeded local mitigation capacity.

5. Edge detection is gaining traction. Operators are moving DDoS detection from centralized systems to edge nodes, routers, and PoP servers. This approach catches localized attacks that centralized monitoring misses (see Edge Node Defense). Flowtriq nodes deployed on routers detected attacks an average of 12 seconds before server-level nodes saw the same traffic.

102026 Predictions

Based on the trends observed in 2025, we expect the following developments in 2026:

Attack volume will exceed 65 million incidents industry-wide

The 121% YoY growth rate is unlikely to sustain, but even a moderated 40–50% increase from 2025's 47 million baseline puts the industry well above 65 million total attacks in 2026. The combination of cheap booter services, growing IoT surface area, and geopolitical instability provides no structural reason for attack volume to decline.

AI-assisted attack orchestration will emerge

LLMs and automation tools will lower the barrier further. We expect to see DDoS attacks that dynamically rotate vectors based on observed mitigation responses, adapting in real time. Defenders will need equally automated response chains to keep up.

Short-burst attacks will exceed 50% of all incidents

The trend toward sub-5-minute attacks will accelerate as attackers learn that short bursts are more effective against slow-polling detection. Organizations without sub-second detection will experience a growing "invisible attack" problem where incidents end before they are even detected.

Carpet-bombing will become a top-3 technique

At 12% of incidents in 2025 (up from 4.3%), carpet-bombing is growing faster than any other technique. Its effectiveness against per-IP detection makes it especially dangerous for hosting providers and ISPs. Expect it to reach 20%+ by end of 2026.

BGP FlowSpec will become a standard defense tier

As more transit providers support FlowSpec, and tools like Flowtriq make it accessible without manual BGP configuration, FlowSpec will move from "advanced technique" to standard practice. We expect the number of Flowtriq users deploying FlowSpec to triple in 2026.

Sources & Citations

[1]
Cloudflare, "2025 Q4 DDoS Threat Report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults," February 2026. Based on attacks mitigated across Cloudflare's global network. blog.cloudflare.com
[2]
Europol / FBI, "Operation PowerOFF: International Law Enforcement Disrupts DDoS-for-Hire Services," December 2024. Joint operation takedown of 27 booter/stresser services.
[3]
Netscout, "DDoS Threat Intelligence Report 2H 2025," February 2026. Data from Netscout's ATLAS global threat intelligence platform.
[4]
Radware, "Global Threat Analysis Report 2025," January 2026. Based on Radware's Cloud DDoS Protection Service and Threat Intelligence.
[5]
ENISA, "Threat Landscape 2025," October 2025. European Union Agency for Cybersecurity annual threat assessment.
[6]
OVHcloud, "The Rise of Packet Rate Attacks: When Core Routers Turn Evil," July 2024. Technical blog post detailing 840+ Mpps packet-rate attack from MikroTik-based botnet. blog.ovhcloud.com

Protect Your Infrastructure

Don't be a data point in next year's report.

Flowtriq detects DDoS attacks in under 1 second and auto-mitigates with kernel-level firewall rules, BGP FlowSpec, and cloud scrubbing. Start your free trial today.

Start 7-Day Free Trial See All Features

Stay Informed

Get the next State of DDoS report

Subscribe to receive next year's report the day it publishes, plus monthly attack postmortems and detection techniques.