South Africa
The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, most vectors used in an attack, and total attack frequency.
Max Multivector Attack
Max number of vectors seen in a single attack
26
Attack Vectors Used
1. CLDAP Amplification
2. DNS
3. DNS Amplification
4. ICMP
5. ISAKMP
6. L2TP Amplification
7. MS SQL RS Amplification
8. NTP Amplification
9. NetBIOS Amplification
10. OpenVPN Amplification
11. RIPv1 Amplification
12. SNMP Amplification
13. SSDP Amplification
14. STUN Amplification
15. TCP ACK
16. TCP RST
17. TCP SYN
18. TCP SYN/ACK Amplification
19. UDP
20. VSE Amplification
21. chargen Amplification
22. mDNS Amplification
23. memcached Amplification
24. rpcbind Amplification
Top Attack Vectors
Ta
TCP ACK
Number of Attacks
73,820
Tr
TCP RST
Number of Attacks
38,613
Dn
DNS Amplification
Number of Attacks
37,735
Ts
TCP SYN
Number of Attacks
32,542
Tk
TCP SYN/ACK Amplification
Number of Attacks
32,511
Top Eight Industries Under Attack
The following table lists the top vertical industries under attack from July 2025 to December 2025 by number of attacks.
| Rank | Vertical | Frequency | Average Duration |
|---|---|---|---|
| 1 |
|
109,514 | 36 Minutes |
| 2 |
|
15,152 | 57 Minutes |
| 3 |
|
6,836 | 54 Minutes |
| 4 |
|
6,308 | 642 Minutes |
| 5 |
|
5,837 | 50 Minutes |
| 6 |
|
4,289 | 270 Minutes |
| 7 |
|
2,921 | 389 Minutes |
| 8 |
|
1,938 | 20 Minutes |