© 2019 A10 Networks. All rights reserved. Legal Notices

A10 Networks (NYSE: ATEN) provides Reliable Security AlwaysTM through a range of high-performance solutions that enable intelligent automation with deep machine learning to ensure business critical applications are protected, reliable and always available. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide.

For more information, visit: 
a10networks.com or tweet @A10Networks .

REQUEST 
YOUR REPORT

THE STATE OF DDOS WEAPONS

DDOS PROTECTION:

IDENTIFY & ENUMERATE THE ORIGIN OF DDOS ATTACKS

Q1 2019 HIGHLIGHTS

TFTP reflected amplification enters the Top 5

SPECIAL REPORT

A10 Networks’ report inventories DDoS weapons across the Internet being exploited to launch attacks. It’s an invaluable tool for strengthening your organization’s defenses.

 

A10 Networks’ security threat researchers deploy honeypots, monitor botnet attack agents, and scan the Internet for exposed reflection sources. Actionable intelligence is derived from the millions of host IP addresses used in attacks. 

THEY’RE EASIER TO STOP WHEN YOU KNOW WHERE THEY COME FROM.

GET THE REPORT

414,130 weaponized IoT CoAP devices identified 

Spain ranked the third highest host country

TOP 5 DDOS WEAPONS

TOP HOSTING COUNTRIES

TOP HOSTING ASNS

DDOS ATTACKS GO HYPERSCALE WITH 5G

While 5G enables exciting new IoT applications, it also expands the arsenal of DDoS weaponry.

A new DDoS threat is weaponizing IoT. CoAP, a management protocol that supports IoT applications like smart energy, doesn’t require authentication to trigger large responses to small spoofed requests, making it ideal for launching massive, reflected amplification attacks.

THE LATEST IOT THREAT Q1 2019: CONSTRAINED APPLICATION PROTOCOL (COAP)

IDENTIFY THE THREAT. THEN TAKE IT OUT!

Why inventory DDoS weapons? While you can’t know when attacks are coming, you can have advance notice of where they might come from. Once an attack agent has been identified, you can take proactive defense measures to block it. 

DDOS WEAPONS INTELLIGENCE

Blacklists based on the IP addresses of attack weapon hosts provide actionable intelligence that can help you achieve full spectrum DDoS protection.

To learn more, visit A10 Networks’ DDoS threat map at: https://threats.a10networks.com.