DDoS Statistics 2026: Attack Data, Records & Trends

18 min readBy Nathan House
DDoS Statistics 2026

20.5 million DDoS attacks in a single quarter (Cloudflare Q1 2025). A record-breaking 31.4 Tbps assault that lasted just 35 seconds (Bleeping Computer). Network-layer attacks up 509% year over year. DDoS is no longer a nuisance — it is the defining threat vector of 2026, weaponised by nation-states, amplified by AI, and cheaper to launch than a restaurant meal.

Below you will find 52+ statistics across 11 sections — covering attack volumes, record-breaking incidents, industry targeting, geopolitical weaponisation, and the cost of downtime. Sourced from Cloudflare, Radware, Zayo, and 15+ authoritative reports, with original cross-referenced analysis in every section.

Key DDoS Takeaways

  • Cloudflare blocked 20.5 million DDoS attacks in Q1 2025 — 96% of its entire 2024 total
  • The largest attack ever reached 31.4 Tbps, an 726% increase from the 3.8 Tbps record set just 14 months earlier
  • Network-layer DDoS attacks surged 509% YoY while application-layer attacks rose 74%
  • 89% of DDoS attacks now last under 10 minutes — hit-and-run is the new default
  • Every minute of DDoS downtime costs an average of $22,000 ($1,320,000/hour)
  • A DDoS-for-hire service costs as little as $38/hour — the attacker-to-defender cost ratio is 1:3158
  • Israel is the most targeted country for geopolitical DDoS (12.2% of all claimed attacks)
  • The DDoS protection market is projected to reach $10.39 billion by 2030 (12.3% CAGR)
Last updated: March 2026
20.5M
Attacks blocked (Q1 2025)
31.4 Tbps
Largest attack ever
358%
YoY attack increase
$22K
Cost per minute

📊 Key DDoS Statistics

These are the headline DDoS statistics for 2026. The numbers come from Cloudflare, Radware, Zayo, and MarketsandMarkets — each covering different aspects of the DDoS threat landscape.

20.5M
DDoS Attacks Blocked in Q1 2025
96% of Cloudflare's entire 2024 total — in one quarter
Finding Value Source
Average daily DDoS attacks worldwide 44,000 SentinelOne / Industry Reports
DDoS attacks blocked by Cloudflare (Q1 2025) 20.5 million Cloudflare
Largest DDoS attack ever recorded 31.4 Tbps Bleeping Computer
Year-over-year increase in DDoS attacks (Q1 2025) 358% Cloudflare
Network-layer DDoS increase (2025) 168% Radware
Cost of downtime per minute $22,000 MazeBolt
Total DDoS attacks globally (2025) 47.1 million Gcore
DDoS protection market by 2030 $10.39 billion MarketsandMarkets

Nathan House's Analysis: The Scale of Acceleration

Cloudflare blocked 20.5 million DDoS attacks in Q1 2025 alone — 96% of what it blocked in all of 2024. Meanwhile, Radware reports a separate 168% year-over-year increase. Cross-referencing both reports, the data points in the same direction: DDoS volume is not just growing, it is compounding. At 1.5 attacks per second globally (47.1 million in 2025), DDoS has become background radiation on the internet.

📈 DDoS Attack Volume & Frequency

47.1 million DDoS attacks hit the global internet in 2025 (Gcore). Cloudflare alone mitigated 20.5 million in Q1, while Radware's average customer faced 139 attacks per day in H2 2025. The frequency is not spiking — it is sustaining at all-time highs.

DDoS Attack Surge
358%
+358% YoY
Line chart showing DDoS attacks per quarter rising from 5.4M in Q1 2023 to 10.5M in Q1 2024 to 20.5M in Q1 2025
Finding Value Source
DDoS attacks blocked (Cloudflare Q1 2025) 20.5 million Cloudflare
Year-over-year increase (Q1 2025) 358% Cloudflare
Network-layer attacks blocked (Q1 2025) 16.8 million Cloudflare
Network-layer YoY increase 509% Cloudflare
HTTP DDoS attack YoY increase 118% Cloudflare
Network-layer DDoS increase (Radware 2025) 168% Radware
Average attacks per customer per day (H2 2025) 139 Radware
Web DDoS increase YoY (2025) 101% Radware
Total DDoS attacks globally (2025) 47.1 million Gcore
Average daily attacks worldwide 44,000 SentinelOne / Industry Reports
DDoS attack surge (2024) 550% Security Brief

DDoS Attack Volume Growth (Cloudflare Data)

2022
~5M
2023
~8M
2024
~21M
Q1 '25
20.5M
Source: Cloudflare DDoS Threat Reports 2022-2025

Nathan House's Analysis: 139 Attacks Per Day, Per Customer

Radware reports its average customer faced 139 DDoS attacks per day in H2 2025. That is not a spike — it is a sustained barrage. Cross-referencing with Cloudflare's Q1 data showing 20.5 million attacks in 90 days (227,000+ per day across their network), both sources confirm the same pattern: DDoS has shifted from occasional events to constant pressure.

💥 Largest DDoS Attacks in History

31.4 Tbps. That is the new all-time record, set by the Aisuru botnet in December 2025 and lasting just 35 seconds (Bleeping Computer). The DDoS bandwidth record was broken at least five times in 2025, with attack sizes increasing over 700% from the late-2024 benchmarks.

31.4 Tbps
All-Time DDoS Record
Aisuru botnet — December 2025 — lasted 35 seconds
Line chart showing record DDoS attack size growing from 1.7 Tbps in 2018 to 31.4 Tbps in 2025, with a sharp spike in the final year
Finding Value Source
Aisuru botnet (Dec 2025) — all-time record 31.4 Tbps Bleeping Computer
Unnamed attack (2025) — 22.2 Tbps 22.2 Tbps SecurityWeek
Azure DDoS Protection (Oct 2025) — cloud record 15.7 Tbps Microsoft / SecurityAffairs
Cloudflare (May 2025) — 7.3 Tbps 7.3 Tbps Cloudflare
Mirai botnet (Q4 2024) — 5.6 Tbps 5.6 Tbps Cloudflare
Record packet rate (Q1 2025) — 4.8 Bpps 4.8 Bpps Cloudflare
Global Secure Layer — 3.15 Bpps packet record 3.15 Bpps Global Secure Layer
Previous bandwidth record (Oct 2024) — 3.8 Tbps 3.8 Tbps Cloudflare

DDoS Record Timeline: The Escalation

How DDoS attack records scaled from 3.8 Tbps to 31.4 Tbps in just 14 months. Click a bar for details.

Oct 2024
3.8 Tbps
Q4 2024
5.6 Tbps
May 2025
7.3 Tbps
Oct 2025
15.7 Tbps
2025
22.2 Tbps
Dec 2025
31.4 Tbps
Click any bar to see attacker and defender details
An 726% increase in peak attack bandwidth in 14 months

Nathan House's Analysis: ${recordGrowth}% Bandwidth Growth in 14 Months

In October 2024, the DDoS bandwidth record stood at 3.8 Tbps. By December 2025, it reached 31.4 Tbps — an ${recordGrowth}% increase in just 14 months. Cross-referencing the timeline: 3.8 Tbps (Oct 2024) to 5.6 Tbps (Q4 2024) to 7.3 Tbps (May 2025) to 15.7 Tbps (Oct 2025) to 31.4 Tbps (Dec 2025). Each new record stood for weeks, not years. The arms race between botnets and mitigation providers is accelerating faster than at any point in DDoS history.

Bandwidth Records (Tbps)

  • 31.4 Tbps — Aisuru botnet (Dec 2025)
  • 22.2 Tbps — Unnamed (2025)
  • 15.7 Tbps — Azure cloud record (Oct 2025)
  • 7.3 Tbps — Cloudflare (May 2025)

Packet Rate Records (Bpps)

  • 10.6 Bpps — With 22.2 Tbps attack
  • 4.8 Bpps — Cloudflare Q1 2025
  • 3.15 Bpps — Global Secure Layer
  • 3.64 Bpps — Azure Oct 2025

🛠 Types of DDoS Attacks

16.8 million network-layer (L3/L4) attacks in Q1 2025 (Cloudflare). Application-layer (L7) attacks rose 74% year over year in Q2 2025. The shift toward L7 is strategic: as network-layer defenses improve, attackers move to application-layer attacks that mimic legitimate traffic and slip past volumetric filters.

Finding Value Source
Network-layer (L3/L4) attacks (Q1 2025) 16.8 million Cloudflare
HTTP (L7) attack increase YoY 118% Cloudflare
Application-layer DDoS increase (Q2 2025) 74% Cloudflare
L3/L4 attacks under 1 Gbps 99% Cloudflare
CLDAP amplification spike (QoQ) 3,488% Cloudflare
Web DDoS attacks under 100K RPS 94.4% Radware
Application/API attack increase YoY 128% Radware
Donut chart showing DDoS attack types: Volumetric 45%, Protocol 30%, Application Layer 25%
BREAKDOWN
Network-Layer (L3/L4) 16.8M (82%)
HTTP/Application (L7) 3.7M (18%)

Three main DDoS attack categories dominate the landscape:

Volumetric

Overwhelm bandwidth with massive traffic floods. SYN floods remain the most common vector. 99% of L3/L4 attacks are under 1 Gbps — but the top 1% now reach 31.4 Tbps.

Protocol

Exploit protocol weaknesses to exhaust server resources. CLDAP amplification attacks surged 3,488% QoQ in Q1 2025 (Cloudflare). DNS flood attacks are the second most common vector.

Application-Layer

Target specific services with legitimate-looking requests. L7 attacks rose 74% YoY (Q2 2025). 94.4% of web DDoS are under 100K RPS — small enough to evade traditional detection.

The Stealth Shift: 94.4% of Web DDoS Fly Under the Radar

Radware reports 94.4% of web DDoS attacks measure under 100,000 requests per second. These are not the headline-grabbing Tbps assaults. They are small, persistent floods designed to slip past detection thresholds. Cross-referencing with Cloudflare's finding that 99% of L3/L4 attacks are under 1 Gbps, the picture is clear: the median DDoS attack is tiny. The dangerous ones are the outliers — and those outliers are getting exponentially larger.

🏭 DDoS Attacks by Industry

Telecommunications and education each claimed 24% of DDoS attacks in 2025 (Zayo). The biggest shift: telecom's share dropped from 42% to 24%, while education jumped from 15% to 24%. Attackers are diversifying targets. Manufacturing faces the largest average attack size at 11.6 Gbps.

Finding Value Source
Telecommunications (down from 42%) 24% Zayo
Education (up from 15%) 24% Zayo
Government (up from 5%) 12% Zayo
Financial services 19% StormWall
Gaming & gambling (down from 34%) 19% Gcore
Technology (network-layer attacks) 45% Cloudflare
Manufacturing (avg attack size) 11.6 Gbps Zayo
Financial services DDoS growth YoY 83% StormWall
Average attack size growth YoY 70% Zayo
Horizontal bar chart showing DDoS attacks by industry: Financial 19%, Gaming 18%, Government 15%, Ecommerce 12%, Technology 11%, Telecom 10%, Healthcare 8%, Other 7%

DDoS Industry Risk Profile

Select an industry to see its DDoS attack profile based on Zayo, StormWall, and Gcore data.

Attack Share
24%
YoY Change
Down from 42%
Avg Attack Size
5.5 Gbps
Declining share as enterprises become primary targets
BREAKDOWN
Telecom 24% (24%)
Education 24% (24%)
Gaming 19% (19%)
Financial 19% (19%)
Government 12% (12%)
Other 2% (2%)

Nathan House's Analysis: Education Is the New Soft Target

Zayo reports education jumped from 15% to 24% of all DDoS attacks in 2025, with 45% of those attacks hitting in April and May during peak academic periods. Meanwhile, gaming dropped from 34% to 19% as improved defenses pushed attackers to softer targets. Cross-referencing with Stormwall data showing financial services DDoS grew 83% year over year, the pattern is clear: attackers follow the path of least resistance. Education and government sectors with smaller security budgets are bearing the brunt.

💰 DDoS Attack Duration & Cost

89% of DDoS attacks now last under 10 minutes (Cloudflare/Zayo). The average dropped to 20 minutes, down from 39 minutes the prior year. Short does not mean cheap — every minute of downtime costs an average of $22,000 (MazeBolt). A 30-minute outage for a mid-market company costs roughly $660,000.

20 min
Average duration
89%
Under 10 minutes
$22K
Cost per minute
$${costPerHour}
Cost per hour
Finding Value Source
Average attack duration (2025) 20 minutes Zayo / Industry Reports
Attacks lasting under 10 minutes 89% Cloudflare / Zayo
Duration of 31.4 Tbps record attack 35 seconds Bleeping Computer
Cost per minute of downtime $22,000 MazeBolt
SMB average recovery cost $120,000 Corero / Industry Reports
Enterprise financial loss potential $1 million+ Corero / Industry Reports
DDoS-for-hire (booter) hourly cost $38 Imperva / FastNetMon
Horizontal bar chart showing 89% of DDoS attacks last under 10 minutes, 6% last 10-30 min, 3% last 30-60 min, 1.5% last 1-3 hours, 0.5% last 3+ hours

DDoS Downtime Cost Calculator

Estimate the financial impact of a DDoS attack on your organisation based on attack duration and company size.

Estimated DDoS Cost
$660,000
30 min x $22,000/min x 1.0 size factor
Based on $22,000/minute average downtime cost (MazeBolt 2025). Actual costs vary by industry and incident specifics.

Nathan House's Analysis: The $38 vs $120,000 Asymmetry

A DDoS-for-hire (booter) service costs $38/hour (Imperva). The average SMB recovery cost from a DDoS attack is $120,000 (Corero). That is a 1:${attackerCostRatio} attacker-to-defender cost ratio. For large enterprises, losses exceed $1 million. This is one of the most asymmetric cost ratios in cybersecurity — an attacker with pocket change can inflict six-figure damage. Proactive DDoS mitigation is not a cost, it is a fraction of the alternative.

Cost to Attack

  • $38/hour — DDoS-for-hire service
  • $20/day — Basic booter subscription
  • No technical skill required
  • AI chatbots lower barrier further

Cost to Defend

  • $120,000 — SMB recovery cost
  • $1M+ — Enterprise losses
  • $22,000 per minute of downtime
  • $5.8B — Global protection market

🌎 DDoS and Geopolitics

Europe absorbed 48.4% of all claimed DDoS attacks in 2025 (Radware). Israel was the most targeted country at 12.2%, followed by the United States (9.4%) and Ukraine (8.9%). DDoS has become a primary weapon of digital warfare — NoName057(16) alone claimed 4,693 attacks in 2025.

🇮🇱 Israel
12.2%
🇺🇸 United States
9.4%
🇺🇦 Ukraine
8.9%
🇪🇺 Europe (total)
48.4%
Finding Value Source
Europe's share of claimed attacks 48.4% Radware
Israel (most targeted country) 12.2% Radware
United States 9.4% Radware
Ukraine 8.9% Radware
Government services targeted 38.8% Radware
NoName057(16) claimed attacks 4,693 Radware
DDoS surge after Israel-Iran escalation 800% TeckPath
US election DDoS requests mitigated 6 billion+ Cloudflare
4,693
Attacks by NoName057(16)
Most active hacktivist group in history (Radware 2025)

Nathan House's Analysis: DDoS as Digital Warfare

Three geopolitical conflicts dominate the DDoS landscape: Russia-Ukraine, Israel-Iran, and India-Pakistan. Cross-referencing Radware (government services = 38.8% of hacktivist targets) with the 800% DDoS surge following the June 2025 Israel-Iran escalation, and Cloudflare's 6 billion+ requests mitigated targeting US election websites in November 2024, the evidence is unambiguous: DDoS is a state-level weapon. The 4,693 attacks claimed by NoName057(16) alone exceed the annual output of most cybercrime groups.

Election Infrastructure Under Siege

Cloudflare mitigated over 6 billion HTTP DDoS requests targeting US election websites on October 31 and November 1, 2024 alone. Following Israeli airstrikes on Iran in June 2025, hacktivist groups launched an 800% DDoS surge against US businesses within 24 hours. Territorial disputes drove nearly two-thirds of all observed cyber activity in 2025.

🛡 DDoS Protection Market & Mitigation

$5.80 billion — that is the current DDoS protection market (MarketsandMarkets 2025). It is projected to reach $10.39 billion by 2030, a 79% total increase at 12.3% CAGR. The growth tracks the threat: as attacks double year over year, so does the mitigation spending.

DDoS Protection Market
$5.80B
$10.39B by 2030
Finding Value Source
DDoS protection market (2025) $5.80 billion MarketsandMarkets
Projected market size (2030) $10.39 billion MarketsandMarkets
Market CAGR (2025-2030) 12.3% MarketsandMarkets
Attacks forecast for 2026 58 million StormWall
DDoS weapons tracked globally 12.3 million A10 Networks
Market Growth to 2030 $5.80B / $10.39B
56%

12.3 Million DDoS Weapons Ready to Fire

A10 Networks tracks 12.3 million DDoS weapons (attack-capable systems) worldwide. StormWall forecasts it will mitigate 58 million attacks in 2026 — nearly three times more than in 2025. The protection market growth is not speculative; it is a direct response to an exponentially growing threat.

🤖 AI and DDoS

AI is transforming both sides of the DDoS equation. On offense, AI-assisted DDoS-as-a-Service platforms let attackers prompt chatbots like GhostGPT with simple commands. On defense, NETSCOUT's Arbor suite processes 700+ Tbps of real-time traffic and neutralises 80% of attacks without human intervention.

Finding Value Source
Real-time traffic data for AI mitigation 700+ Tbps NETSCOUT
Attacks auto-neutralised by AI defense 80% NETSCOUT
Hyper-volumetric attacks blocked (Q1 2025) 700+ Cloudflare
Small stealth DDoS attacks (evasion tactic) 94.4% Radware

AI-Powered Attacks

  • DDoS-as-a-Service with AI chatbots (GhostGPT, WormGPT)
  • Attacks instantly adapt strategy mid-assault
  • Switch between network layers to bypass filters
  • 94.4% of web DDoS stay under detection thresholds

AI-Powered Defense

  • 700+ Tbps of real-time traffic data analysed
  • 80% of attacks neutralised without human intervention
  • ML detects anomalies before traditional tools alert
  • 700+ hyper-volumetric attacks blocked in Q1 2025

Nathan House's Analysis: AI Lowers Both Barriers

AI is democratising both DDoS attacks and DDoS defense simultaneously. On the attack side, services like GhostGPT let non-technical users launch sophisticated attacks with simple prompts. On the defense side, NETSCOUT reports 80% automatic mitigation. The question is whether AI-powered defense scales faster than AI-powered offense. Given that Cloudflare blocked 700+ hyper-volumetric attacks in Q1 2025 alone — attacks that would have been unmitigable five years ago — the defense side is holding. But the margin is thin.

💡 Key Takeaways

  1. 1. Volume is compounding, not spiking. 20.5 million attacks in Q1 2025. 47.1 million for the full year. Radware customers face 139 attacks per day. This is the new normal — not a temporary escalation.
  2. 2. Records are breaking monthly. The DDoS bandwidth record was broken at least five times in 2025, going from 3.8 Tbps to 31.4 Tbps in 14 months. Each new record lasted weeks, not years.
  3. 3. Short attacks, massive damage. 89% last under 10 minutes, but at $22,000 per minute, even a brief outage costs six figures. The 31.4 Tbps record attack lasted just 35 seconds.
  4. 4. The cost asymmetry is extreme. $38 to attack. $120,000+ to recover. Proactive mitigation is orders of magnitude cheaper than incident response.
  5. 5. Geopolitics drives volume. DDoS is now a primary weapon in nation-state conflicts. Israel, the US, and Ukraine are the top targets. Elections, diplomatic crises, and military actions all trigger attack surges.
  6. 6. Industry targeting is shifting. Education and government are the new growth targets. Gaming and telecom defenses improved, so attackers moved to sectors with weaker protection.
  7. 7. AI is the force multiplier on both sides. AI-powered attacks adapt mid-assault. AI-powered defense neutralises 80% automatically. The arms race is accelerating — and whoever scales AI faster wins.

Frequently Asked Questions

How many DDoS attacks happen per day?
Approximately 44,000 DDoS attacks are launched worldwide every day (SentinelOne/Industry Reports). Radware reports its average customer faces 139 attempted DDoS attacks per day. Cloudflare blocked 20.5 million in Q1 2025 alone, which averages to roughly 227,000 per day across its network.
What is the largest DDoS attack ever recorded?
The largest DDoS attack ever recorded peaked at 31.4 Tbps, launched by the Aisuru botnet in December 2025. It lasted just 35 seconds. The previous record was 22.2 Tbps (also in 2025). For context, the record in October 2024 was 3.8 Tbps — meaning the record increased by over 700% in 14 months.
How much does a DDoS attack cost a business?
Every minute of DDoS-caused downtime costs an average of $22,000 (MazeBolt 2025). SMBs spend approximately $120,000 to recover from a DDoS attack, while large enterprises face losses exceeding $1 million. A DDoS-for-hire service, by contrast, costs as little as $38 per hour — making the attacker-to-defender cost ratio roughly 1:3,000.
Which industries are most targeted by DDoS attacks?
In 2025, telecommunications and education each accounted for 24% of all DDoS attacks (Zayo). Gaming and financial services each represented 19%, while government's share grew from 5% to 12%. The technology sector dominated network-layer attacks at 45% (Cloudflare). Manufacturing saw the largest average attack size at 11.6 Gbps.
How long does a typical DDoS attack last?
The average DDoS attack lasted 20 minutes in 2025, down from 39 minutes the previous year. 89% of attacks last under 10 minutes. These short "hit-and-run" assaults are designed to evade detection and test defenses. Even the record 31.4 Tbps attack lasted only 35 seconds — short but devastating.
What are the three main types of DDoS attacks?
The three main types are: (1) Volumetric attacks that overwhelm bandwidth with traffic floods — SYN floods are the most common; (2) Protocol attacks that exploit weaknesses in network protocols to exhaust server resources — CLDAP amplification surged 3,488% in Q1 2025; and (3) Application-layer (L7) attacks that target specific services with legitimate-looking requests — these rose 74% year-over-year in Q2 2025 and are the hardest to detect.

About This Data

This article draws from 52 statistics aggregated from 50+ authoritative sources including IBM Cost of a Data Breach, Verizon DBIR, CrowdStrike Global Threat Report, WEF Global Cybersecurity Outlook, FBI IC3, ISC2 Cybersecurity Workforce Study, Sophos, Gartner, Mandiant M-Trends, and Ponemon Institute reports.

Derived statistics (marked "Nathan House's Analysis") are computed by cross-referencing data from multiple sources — for example, comparing breach costs across industries using IBM data, or validating ransomware trends across Verizon, Sophos, and HIPAA Journal findings.

All statistics include inline source citations with links to primary sources. Data spans 2023-2026, with preference given to the most recent available figures. Last updated: March 2026.

About the Author

Nathan House

Nathan House, StationX

Nathan House is a cybersecurity expert with 30 years of hands-on experience. He holds OSCP, CISSP, and CEH certifications, has secured £71 billion in UK mobile banking transactions, and has worked with clients including Microsoft, Cisco, BP, Vodafone, and VISA. Named Cyber Security Educator of the Year 2020 and a UK Top 25 Security Influencer 2025, Nathan is a featured expert on CNN, Fox News, and NBC. He founded StationX, which has trained over 500,000 students in cybersecurity.