Europe, Middle East, and Africa
Flag of United Republic of Tanzania

United Republic of Tanzania

The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, largest attack by bandwidth and throughput, most vectors used in an attack, and total attack frequency.

Max Multivector Attack

Max number of vectors seen in a single attack

8

Attack Vectors Used

1. DNS
2. DNS Amplification
3. TCP ACK
4. TCP RST
5. TCP SYN
6. TCP SYN/ACK Amplification
7. UDP

Top Attack Vectors

Dn

DNS Amplification

Number of Attacks

164

Tr

TCP RST

Number of Attacks

128

Lt

L2TP Amplification

Number of Attacks

10

Ts

TCP SYN

Number of Attacks

4

Tk

TCP SYN/ACK Amplification

Number of Attacks

3

Top Four Industries Under Attack

The following table lists the top vertical industries under attack from January 2025 to June 2025 by number of attacks.

Rank Vertical Frequency Max Attack Max Impact Average Duration
1
Computing Infrastructure Providers Data Processing Web Hosting and Related Services
94 0.01 Gbps 0.02 Mpps 33 Minutes
2
Wireless Telecommunications Carriers (except Satellite)
11 0.11 Gbps 0.02 Mpps 6 Minutes
3
Hotels (except Casino Hotels) and Motels
4 0.07 Gbps 0.01 Mpps 20 Minutes
4
New Car Dealers
3 0.06 Gbps 0.01 Mpps 23 Minutes