The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for DDoS Attack Statistics
Cybersecurity 101/Cybersecurity/DDoS Attack Statistics

DDoS Attack Statistics

DDoS attacks are becoming more frequent, shorter, and harder to ignore. Our DDoS attack statistics post walks you through who is getting targeted right now, how campaigns are unfolding, and more.

CS-101_Cybersecurity.svg
Table of Contents
Global DDoS Attack Statistics
DDoS Attacks by Industry Statistics
DDoS Attacks by Organization Size
DDoS Attack Types and Techniques Statistics
DDoS Attack Size and Bandwidth Statistics
DDoS Attack Duration Statistics
DDoS Attack Frequency and Repeat Attack Statistics
Botnet and Infrastructure Statistics in DDoS Attacks
DDoS Attack Motivations and Threat Actor Statistics
DDoS Detection and Mitigation Statistics
Cost and Financial Impact of DDoS Attacks
Key Takeaways from DDoS Attack Statistics

Related Articles

  • What Is OS Command Injection? Exploitation, Impact & Defense
  • Malware Statistics
  • Data Breach Statistics
  • Insider Threat Statistics
Author: SentinelOne | Reviewer: Dianna Marks
Updated: May 6, 2026

DDoS attacks are bombing organizations and if you haven’t been keeping up with the news lately, then it’s time to check-in and get the latest updates. We’ve done our best research and curated live data from official sources. By checking out our DDoS attack statistics, you’ll immediately know what steps your company needs to take and where we are currently headed. So, read on and catch up below!

Global DDoS Attack Statistics

Here are some key takeaways from global DDoS statistics that you should know about:

  • Network-layer DDoS attackers have gone up by 168.2% year-over-year in early 2026
  • DDoS attacks have hit their peak at 31.4 Tbps in late 2025.  It was mainly due to the Aisuru botnet which was responsible for around 1 to 4 million infected hosts.
  • Cybercriminals are launching an average of 44,000 DDoS attacks daily. This isn't going down anytime soon and many individual organizations report 139 attacks daily on average.
  • Some of the longest recorded DDoS attacks have lasted 12,388 minutes which is over 8 days! The shortest DDoS attacks last usually less than a minute.
  • Web DDoS attacks have gone up by 101.4%; North America is one of the top targets, accounting for 63.1% of DDoS attacks in the world. It is closely followed by the Middle East at 16.1% and Europe at 13.7% .

DDoS Attacks by Industry Statistics

If we look at DDoS attack statistics by different industries, then here’s what we find out:

  • The most targeted industrial sectors are financial services, technology, gaming, e-commerce, and telecommunications. In 2026, the technology sector is a top target. It has a network-layer share of 45% for DDoS attacks and is currently facing the highest levels of exploitation.
  • The gaming industry gets around 57% for the number of DDoS attacks it receives. It is a persistent target especially for volumetric DDoS threats. The financial and telecommunications segments each record a network-layer share of 16.1% for DDoS attacks in 2026. E-commerce gets the highest volumes of web DDoS activity at 22% network-layer share.
  • Government services are also targets of 38.8% of DDoS attacks (especially activist attacks) in the world. NoName057(16) botnet specifically chooses government bodies as its primary target for DDoS attacks.

DDoS Attacks by Organization Size

Now let's explore some DDoS attack statistics by organization size in 2026. Here are the latest updates:

  • Large enterprises hold a market share of 63% to 65% for DDoS protection. They are targeted by 30+ Tbps hyper-volumetric DDoS attacks. SMEs are experiencing a 12x surge in API-based DDoS attacks. A 5x hike in API attacks per host has been noted as of 2026.
  • Businesses with fewer than 1,000 employees are now impacted by 46% of all cyber breaches. DDoS attackers are switching from long campaigns to short-burst attacks. This means API-based DDoS attacks will skyrocket by 12x (1200%) after 2026.
  • 59% of small business owners believe that they are too small to be targets but that's not true. About 51% of them don't have any cybersecurity measures in place to guard against DDoS attacks.
  • 91% of companies face an average loss of more than USD 30,000 for a single hour of downtime caused by DDoS attacks. DDoS attack statistics also tell us that 75% of SMBs can't continue operating if they're struck by an extortion event or major ransomware strain.

DDoS Attack Types and Techniques Statistics

Here are the latest DDoS attack types and techniques statistics:

  • The average DDoS attack duration has gone up to 45 minutes. Unprotected companies pay up to USD 6,000 per minute in downtime alone!
  • 31% of companies face DDoS attack attempts weekly. A 22.2 Tbps volumetric attack was the latest record peak while app-layer floods reached 201 million requests per second (Rps).
  • The USA accounts for nearly 50% of global DDoS attack frequency, while the EMEA region (Europe, Middle East, Africa) accounted for 65% of global DDoS attack volumes.

DDoS Attack Size and Bandwidth Statistics

Here’s what you need to know about the latest DDoS attack size and bandwidth statistics:

  • The average DDoS attack size is increasing 69% year over year, with peak events reaching 962.2 Gbps across its monitored networks, a sign of how much raw bandwidth attackers can now rent or control.
  • DDoS attacks 2026 show high ceilings. In January 2026, over 41 “mega” events above 100 Gbps in a single month were logged.
  • 78% of DDoS attacks end in 5 minutes and 37% of them finish in under 2 minutes.
  • A 70% chance exists that a follow-up DDoS attack will happen after an initial one. An average of 2.8 follow-up attacks happen per incident.
  • Some systems around the world are under active DDoS attacks 88% of the time all year round.

DDoS Attack Duration Statistics

Here are some of the latest DDoS attack duration statistics:

  • A majority of high-impact web DDoS attacks last less than 60 seconds in 2026. 71% of HTTPs DDoS attacks last for under a minute.
  • 89% of network-layer attacks finish within 10 minutes. 86% of terabit-level network incidents last for more than 10 minutes.
  • Extra-long DDoS attacks (that last more than 24h) have hiked by 17% in 2026.

DDoS Attack Frequency and Repeat Attack Statistics

Here are the recent DDoS attack frequency and repeat attack statistics:

  • The total DDoS attacks worldwide is forecasted to be up to 58 million mitigations in 2026. DDoS attacks globally on company infrastructures are also growing and it hiked from 6.6 million to 19.4 million, which is a 198% increase since last year.
  • Typical enterprises have faced about 3.85 DDoS incidents in the last 12 months.
  • Link11’s European Cyber Report 2026 highlights repeat activity. More than 70% of organizations targeted once were hit again, and on average each initial incident triggered 2.8 follow up attacks, showing how rarely adversaries stop after one try.
  • Cloudflare’s 2025 Q4 threat report notes 47.1 million DDoS attacks mitigated across the year, a 121% increase that translated into an average of 5,376 attacks every hour worldwide, illustrating how dense DDoS attack statistics worldwide have become for large providers.

Botnet and Infrastructure Statistics in DDoS Attacks

Here are the latest botnet and infrastructure statistics in DDoS attacks:

  • Qrator Labs monitored what is arguably the biggest DDoS botnet seen to date, increasing in size from 1.33 million to 5.76 million infected devices in the course of a year. This is large enough for the botnet to launch multi-terabit floods at will.
  • Cloudflare’s analysis of the Aisuru or Aisuru Kimwolf botnet estimates that the botnet compromised anywhere from 1 to 4 million Android TV devices and others worldwide. The botnet launched thousands of hyper volumetric attacks, including record terabit-scale floods.
  • StormWall’s statistics based on the first half of last year report that the average DDoS botnet size they monitored increased in size from about 90,000 devices to about 150,000 in the span of a single quarter. This is an increase of close to 70%. This increases the baseline volume for many botnet attacks
  • DDoS-Guard’s mid-year analysis of last year described an attack that included over 2,050,000 unique IP addresses. This is not an isolated event, as attacks with over a million sources are no longer rare.

DDoS Attack Motivations and Threat Actor Statistics

Here are the latest DDoS attack motivations and threat actor statistics:

  • Hacktivism remains the primary driver behind many large scale DDoS campaigns, with hundreds of Telegram channels coordinating target lists and amplifying claims to maximize political impact and visibility.
  • 149 hacktivist DDoS attacks against 110 organizations have been counted  in only a few days across 16 countries, with 74.6% of activity linked to 12 groups such as Keymous+, DieNet, and NoName057(16).
  • Financial extortion still features heavily. Providers tracking ransom driven DDoS describe campaigns against online services, finance, and telecom targets, often timed for peak usage hours so that even short outages create strong pressure to pay.
  • Commercial DDoS for hire operators sit alongside ideologically motivated actors. Hacktivism research notes groups that openly advertise “stress test” services on Telegram, using claimed DDoS attacks as live demonstrations to attract paying clients.

DDoS Detection and Mitigation Statistics

Below is an overview of recent DDoS detection and mitigation statistics:

  • DDoS detection and mitigation statistics reveal that autonomous defense systems have blocked 8.3 million DDoS attacks in just three months within the last year, averaging about 3,780 mitigations each hour.
  • Cloudflare recorded 20.5 million blocked attacks in Q1 2025, which included close to 700 hyper volumetric attacks above 1 Tbps or 1 billion packets per second and were fully automated without any need for tuning each event.
  • GTT’s automated systems have successfully mitigated two distinct attacks above 1 Tbps in the last week of Q1 2025, and this is just a sample case in which three quarters of attacks were between 100 Mbps and 9 Gbps, which is still a high volume that will be problematic for unprotected networks.
  • 2026 DDoS attack analysis records 41 “mega attacks” above 100 Gbps in a single month, a 78% increase over December, yet all were mitigated without customer facing service degradation across its protected platforms.

Cost and Financial Impact of DDoS Attacks

Here are the latest DDoS attack statistics related to costs and financial impacts:

  • It’s forecasted that there’s an average network downtime at about 5,600 dollars per minute, or roughly 300,000 dollars per hour, when lost productivity and stalled digital operations are included in the calculation.
  • Recent DDoS cost surveys suggest a medium sized enterprise now loses around 50,000 dollars per hour during an attack, while some small businesses face average recovery costs of 120,000 dollars per incident.  
  • DDoS attack datasets note that 12% of small businesses hit by a major DDoS event shut down permanently afterward, and 40% of victims cite loss of customer trust as the main non-financial impact, beyond direct remediation spending.
  • DDoS attack data from the latest sources online estimate per incident costs near 2 million dollars for large enterprises, with downtime running to hundreds of thousands of dollars per hour in worst case outages.

Key Takeaways from DDoS Attack Statistics

Here’s what we can learn from the latest 2026 DDoS attack statistics so far:

  • DDoS attacks are moving towards AI-powered automation and application-layer precision. They are being defined at hyper-volumetric scales and turning from disruptive one-off events to permanent structural burdens across global digital infrastructure.
  • Organizations are now facing a state of emergency as their norm since their systems are being actively attacked 88% of the time. The high attack frequency is hitting them hard, and follow-up DDoS attacks make their chances of recovery or business continuity that much worse.
  • Web DDoS attacks are climbing by 101% and use a mix of low and slow tactics. These evade traditional detection and can mimic legit user behaviors. AI-powered botnets are automating high-velocity DDoS operations which let attackers do real-time network mapping and help them discover new exploits.
  • Malicious API transactions have increased by 128% as well, which confirms that the app layer is the main battleground for modern DDoS warfare. Geopolitical tensions worldwide are also fueling a vast majority of DDoS attacks.
  • Static firewalls no longer work against DDoS attacks. Companies need to use WAAP (web app and API protection) in combination with behavioral analytics and AI-supported bot detection to stay protected. They also have to use agentic SOCs and do routine triaging powered by AI.

Note: Our DDoS attack statistics are collected from trusted industry reports, breach disclosures, and ongoing threat research. All our sources are verified, active, and aggregated by leading industry experts.

SentinelOne does provide DDoS protection by preventing your endpoints from being hijacked by botnets. It can protect against protocol-based and application-based denial-of-service threats.

It can secure your entry points and provide deep visibility into the network traffic which can warn you of any signs of incoming DDoS attacks, thus helping you prevent such cases. SentinelOne's behavioral AI can detect and block malicious code, and even prevents corporate devices from being misused by botnets. SentinelOne can integrate with DDoS defense leaders like Cloudflare via the Singularity™ Marketplace to provide global network-layer and endpoint protection against DDoS threats.

The best products to protect against DDoS attacks are Singularity™ Complete and Singularity™ Network Discovery. If you want to extend DDoS protection to containers, cloud workloads, and Kubernetes clusters, then use Singularity™ Cloud Security.

Book a live demo to learn more.

FAQs on DDoS Attack Statistics

They are way more common than they used to be. Network-layer attacks jumped 168% last year, and you're looking at peak volumes hitting almost 30 Tbps now. The thing is, most websites will get targeted at some point. It's gotten to where you should just expect that you might be a target, and if you fail to prepare, your services will go offline fast. Attackers are constantly scanning for weak spots.

You have your volumetric floods that just clog up the pipes, and those are still everywhere. But there's been a big shift to multi-vector attacks, where they hit you at layers 3, 4, and 7 all at once . They also love using those short, quick Web DDoS bursts now. Most of them last under a minute, so if your defenses aren't automated, they will be over before you even know what hit you.

They can get absolutely massive. Security firms have recorded attacks exceeding 30 Tbps, which is enough to take down huge infrastructure . You also see these "carpet bombing" attacks where they spread the traffic out across entire IP ranges to avoid getting blocked. A good example is that 4.8 Tbps attack they saw in 2025. The numbers just keep going up every year.

Botnets are the engine behind most large-scale DDoS attacks. They are using huge networks of infected devices, like routers, cameras, and even TV boxes, to generate all that traffic. There are botnets out there controlling millions of devices, and they will stay dormant until it's time to strike. You also see new ones popping up that target cloud servers and IoT gadgets specifically to add more firepower.

If you rely on manual detection, you're in trouble. Most of these high-impact attacks last less than 60 seconds, so they are over before a human can react. You need automated tools that can spot anomalies in real time, otherwise, your services will go down. The bad guys are counting on you being slow, and they will switch tactics immediately if they see you blocking one vector.

You should prepare for smarter attacks. Attackers are using AI now to generate attack scripts and mimic real user behavior, which makes them harder to block . They also do these short reconnaissance attacks first to map your defenses . Botnets are getting bigger, and you will see more kernel-level implants that are tough to remove . If you don't have adaptive defenses, they will find a way through.

Discover More About Cybersecurity

Cyber Insurance StatisticsCybersecurity

Cyber Insurance Statistics

Cyber insurance statistics for 2026 reveal a fast growing market. We see shifting claim patterns, stricter underwriting, and widening protection gaps between large enterprises and smaller firms.

Read More
What Is an Infostealer? How Credential-Stealing Malware WorksCybersecurity

What Is an Infostealer? How Credential-Stealing Malware Works

Infostealers silently extract passwords, session cookies, and browser data from infected systems. Stolen credentials fuel ransomware, account takeover, and fraud.

Read More
What Is Application Security? A Complete GuideCybersecurity

What Is Application Security? A Complete Guide

Application security protects software throughout the SDLC using tools like SAST, DAST, SCA, and runtime defenses. Learn how to build an AppSec program.

Read More
Backup Retention Policy Best Practices: A Complete GuideCybersecurity

Backup Retention Policy Best Practices: A Complete Guide

Backup Retention Policy Best Practices for ransomware defense. Covers immutable storage, air-gapped backups, 3-2-1-1-0 framework, and HIPAA/GDPR compliance.

Read More
CS- 101 Cybersecurity - Prefooter | Experience the Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Get a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English