Zambia
The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, most vectors used in an attack, and total attack frequency.
Max Multivector Attack
Max number of vectors seen in a single attack
20
Attack Vectors Used
1. Bittorrent Amplification
2. CLDAP Amplification
3. DNS Amplification
4. ICMP
5. MS SQL RS Amplification
6. NTP Amplification
7. Quake Amplification
8. RIPv1 Amplification
9. SNMP Amplification
10. STUN Amplification
11. TCP ACK
12. TCP RST
13. TCP SYN
14. TCP SYN/ACK Amplification
15. UDP
16. mDNS Amplification
17. memcached Amplification
18. rpcbind Amplification
Top Attack Vectors
Tk
TCP SYN/ACK Amplification
Number of Attacks
2,407
Dn
DNS Amplification
Number of Attacks
2,226
Ta
TCP ACK
Number of Attacks
2,225
Tr
TCP RST
Number of Attacks
2,211
Im
ICMP
Number of Attacks
2,197
Top Three Industries Under Attack
The following table lists the top vertical industries under attack from July 2025 to December 2025 by number of attacks.
| Rank | Vertical | Frequency | Average Duration |
|---|---|---|---|
| 1 |
|
2,202 | 15 Minutes |
| 2 |
|
223 | 14 Minutes |
| 3 |
|
2 | 9 Minutes |