Europe, Middle East, and Africa
Flag of United Republic of Tanzania

United Republic of Tanzania

The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, largest attack by bandwidth and throughput, most vectors used in an attack, and total attack frequency.

Max Multivector Attack

Max number of vectors seen in a single attack

12

Attack Vectors Used

1. DNS
2. DNS Amplification
3. OpenVPN Amplification
4. RDP Amplification
5. SIP Amplification
6. SSDP Amplification
7. STUN Amplification
8. TCP ACK
9. UDP
10. VSE Amplification

Top Attack Vectors

Dn

DNS Amplification

Number of Attacks

243

Ds

DNS

Number of Attacks

17

Ve

VSE Amplification

Number of Attacks

10

Lt

L2TP Amplification

Number of Attacks

8

Tr

TCP RST

Number of Attacks

7

Top Two Vertical Industries Under Attack

The following table lists the top vertical industries under attack from July 2024 to December 2024 by number of attacks.

Rank Vertical Frequency Max Attack Max Impact Average Duration
1
Hotels (except Casino Hotels) and Motels
26 0.12 Gbps 0.01 Mpps 21 Minutes
2
New Car Dealers
10 0.07 Gbps 0.01 Mpps 18 Minutes