DDoS & Application Threat Analysis

Unsolicited Network Activity And Attack Activity

Powered by the globally distributed sensors that comprise Radware’s Global Deception Network (GDN), unsolicited events include DDoS backscatters, spoofed and nonspoofed scans, and spoofed and nonspoofed attacks. This data differs from DDoS and web application events due to the unsolicited nature of the event. Unsolicited events are random scans or attacks not targeting known services or a particular organization.

Continue reading


Top Attacked TCP Port


Top SSH Username


Top Attacked UDP Port


Top Attacking Country


Top scanned and attacked TCP ports

2022 Q4 Top TCP Ports

Top scanned and attacked UDP ports

2022 Q4 Top UDP Ports

Top scanned and attacked URI

2022 Q4 Top 10 Scanned URI

Top HTTP Credentials

2022 Q4 Top Ten HTTP Credentials

Top SSH Usernames

2022 Q4 Top Ten SSH Usernames

Top Attacking Countries

2022 Q4 Top Attacking Countries

Continue Reading...

Radware's Quarterly DDoS & Application Threat Analysis Hub analyzes attack data across these additional categories:

Additional Resources

For additional, detailed analysis of new threats, vulnerabilities and attack vectors as they emerge, view our Threat Intelligence Alerts, or subscribe to our email list to automatically receive these alerts as they’re released.

Threat intelligence and analysis is only the beginning. Learn more about how Radware’s cybersecurity solutions provide state-of-the-art, frictionless security solutions that empower innovation and agility while safeguarding your organization.

Contact Us ➔


Nation-state activity impacts Ukraine and patriotic hacktivism drives surge in DDoS activity; RDoS and fallout from the Log4Shell vulnerability continues

Download the 2022 Global Threat Analysis Report to understand:

  • Why DDoS attack volumes and number of blocked events are up but average attack sizes are down
  • What the top application security vulnerabilities were in the first half of 2022
  • Insight into record-breaking DDoS attacks and hacktivism campaigns that drove DDoS activity
  • The most attacked industries and regions

Download the 2022 Global Threat Analysis Report Now