{"id":98905,"date":"2025-06-24T17:20:17","date_gmt":"2025-06-24T13:20:17","guid":{"rendered":"https:\/\/techxmedia.com\/en\/?p=98905"},"modified":"2025-06-24T17:20:18","modified_gmt":"2025-06-24T13:20:18","slug":"cloudflare-blocks-record-7-3-tbps-ddos-attack","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/cloudflare-blocks-record-7-3-tbps-ddos-attack\/","title":{"rendered":"Cloudflare Blocks Record 7.3 Tbps DDoS Attack"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cloudflare\">Cloudflare<\/a> has revealed that it blocked the largest Distributed Denial-of-Service (DDoS) attack ever recorded in mid-May 2025. The attack peaked at 7.3 terabits per second (Tbps), surpassing previously recorded threats.<\/p>\n\n\n\n<p>This news follows the company&#8217;s Q1 2025 DDoS threat report, released on April 27, which highlighted major attacks reaching 6.5 Tbps and 4.8 billion packets per second (pps).<\/p>\n\n\n\n<p>The target was a hosting provider using Cloudflare\u2019s Magic Transit service to protect its IP network. Attacks on hosting and infrastructure providers are reportedly increasing, according to Cloudflare\u2019s threat report.<\/p>\n\n\n\n<p>The 7.3 Tbps attack transferred 37.4 terabytes of data in just 45 seconds. This is equivalent to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Streaming 7,480 hours of HD video nonstop<\/li>\n\n\n\n<li>Downloading 9.35 million songs in under a minute<\/li>\n<\/ul>\n\n\n\n<p>Cloudflare\u2019s systems detected and blocked the attack automatically, ensuring zero service disruption.<\/p>\n\n\n\n<p>The attack used a newly emerging method exploiting HTTP\/2, a common <a href=\"https:\/\/techxmedia.com\/en\/?s=web+protocol\">web protocol<\/a>. At its peak, it delivered over 200 million requests per second, aiming to overwhelm robust infrastructure.<\/p>\n\n\n\n<p>Cloudflare reported that the attack:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Targeted an average of 21,925 ports on a single IP address<\/li>\n\n\n\n<li>Peaked at 34,517 destination ports per second<\/li>\n\n\n\n<li>Originated from over 122,145 source IPs across 5,433 autonomous systems in 161 countries<\/li>\n<\/ul>\n\n\n\n<p>About 50% of the traffic came from Brazil and Vietnam. Other sources included Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the U.S., and Saudi Arabia.<\/p>\n\n\n\n<p>The multivector attack was mostly composed of UDP floods, with smaller volumes of QOTD reflection, Echo, NTP, Mirai, Portmap, and RIPv1 amplification attacks.<\/p>\n\n\n\n<p>To help providers respond to such threats, Cloudflare offers a free DDoS Botnet Threat Feed. Over 600 global organizations have subscribed to this API-based feed to identify abusive IPs within their networks.<\/p>\n\n\n\n<p>Cloudflare confirmed that its DDoS protection systems neutralized the threat without human intervention, alerts, or incidents. The company emphasized its commitment to building a safer Internet and providing free, unmetered DDoS protection.<\/p>\n\n\n\n<p>Cloudflare\u2019s global network spans over 300 cities in more than 100 countries. Its automated systems are designed to respond quickly and effectively to evolving cyber threats.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloudflare has revealed that it blocked the largest Distributed Denial-of-Service [&hellip;]<\/p>\n","protected":false},"author":58,"featured_media":98908,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1595,9621],"tags":[1051],"contributor":[9732],"class_list":["post-98905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-emerging-technologies","tag-vendors","contributor-news-desk"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/06\/cloudfare-12.jpg","author_info":{"display_name":"Lubna","author_link":"https:\/\/techxmedia.com\/en\/author\/lubna\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/98905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=98905"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/98905\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/98908"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=98905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=98905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=98905"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=98905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}