© 2019 A10 Networks. All rights reserved. Legal Notices

A10 Networks (NYSE: ATEN) provides Reliable Security AlwaysTM through a range of high-performance solutions that enable intelligent automation with deep machine learning to ensure business critical applications are protected, reliable and always available. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.

For more information, visit: 
a10networks.com or tweet @A10Networks .

REQUEST 
YOUR REPORT

THE STATE OF DDOS WEAPONS

DDOS PROTECTION:

IDENTIFY & ENUMERATE THE ORIGIN OF DDOS ATTACKS

Q2 2019 HIGHLIGHTS

COAP IoT amplifiers increased geographically with new handsets and mobile hot spot usage.

SPECIAL REPORT

A10 Networks’ report inventories DDoS weapons across the Internet being exploited to launch attacks. It’s an invaluable tool for strengthening your organization’s defenses.

 

A10 Networks’ security threat researchers deploy honeypots, monitor botnet attack agents, and scan the Internet for exposed reflection sources. Actionable intelligence is derived from the millions of host IP addresses used in attacks. 

THEY’RE EASIER TO STOP WHEN YOU KNOW WHERE THEY COME FROM.

GET THE REPORT

SSDP amplification attacks, not sourced from UDP port 1900, are on the rise.

Uptick in scanning activity indicative of the Satori botnet. Confirmed through observed malware drops.

TOP 5 DDOS WEAPONS

TOP HOSTING COUNTRIES

TOP HOSTING ASNS

DDOS ATTACKS GO HYPERSCALE WITH 5G

While 5G enables exciting new IoT applications, it also expands the arsenal of DDoS weaponry.

A new DDoS threat is weaponizing IoT. CoAP, a management protocol that supports IoT applications like smart energy, doesn’t require authentication to trigger large responses to small spoofed requests, making it ideal for launching massive, reflected amplification attacks.

THE LATEST IOT THREAT Q2 2019: CONSTRAINED APPLICATION PROTOCOL (COAP)

IDENTIFY THE THREAT. THEN TAKE IT OUT!

Why inventory DDoS weapons? While you can’t know when attacks are coming, you can have advance notice of where they might come from. Once an attack agent has been identified, you can take proactive defense measures to block it. 

DDOS WEAPONS INTELLIGENCE

Blacklists based on the IP addresses of attack weapon hosts provide actionable intelligence that can help you achieve full spectrum DDoS protection.

To learn more, visit A10 Networks’ DDoS threat map at: https://threats.a10networks.com.

Most malware binaries uploaded were different from last quarter, but most share Mirai and Gafgyt roots