Q2 2025 DDoS, bots and BGP incidents statistics and overview

11 July 2025

Q2 2025 DDoS, bots and BGP incidents statistics and overview

 

Executive summary

  • The total number of L3-L4 DDoS attacks in Q2 2025 increased significantly compared to Q2 2024 (+43%).
  • The largest share of L3-L4 DDoS attacks in Q2 targeted the “FinTech” (22.6%), “E-commerce” (20.6%), and “Information and communication technology” (16.1%).
  • The most intense L3-L4 DDoS attack of Q2 reached a peak bitrate of 965 Gbps — just shy of last year’s record (1,140 Gbps). The attack targeted an organization in the “Betting shops” microsegment and was likely linked to Alexander Ovechkin setting a new NHL all-time scoring record.
  • The longest L3-L4 DDoS attack of Q2 lasted just over four days (96.5 hours). For comparison, the 2024 record was 19 days (463.9 hours).
  • The number of L7 DDoS attacks in Q2 2025 rose dramatically compared to Q2 2024 (+74%).
  • The most frequent targets of L7 DDoS attacks in Q2 2025 were the “FinTech” (43.6%), “E-commerce” (22.6%), and “Information and communication technology” (18.2%) segments.
  • At the microsegment level, the largest share of L7 DDoS attacks targeted “Banks” (24.7%), “Software services” (12.9%), “Food retail” (10.9%), “Payment systems” (8.5%), and “Online retail” (6.1%).
  • The longest L7 DDoS attack in Q2 2025 lasted 65.5 hours.
  • In Q2, we recorded an attack that involved the largest DDoS botnet to date, comprising 4.6 million devices. This is 3.5 times larger than the previous record set in Q1 (1.3 million) and 20 times larger than the biggest botnet we detected in 2024 (227,000 devices).
  • The top three countries from which L7 DDoS attacks originated in Q2 2025 remained unchanged from 2024: “Russia” (17%), the “United States” (16.6%), and “Brazil” (13.2%), with Brazil’s share continuing to grow steadily over several consecutive quarters.
  • Bad bot activity in Q2 2025 increased by 31% compared to the previous quarter, with most of the traffic surge occurring in April and May.
  • This growth was primarily driven by a single prolonged attack targeting the “E-commerce” segment, which began in April and lasted for over a month, ending in May. As part of the mitigation efforts, we blocked approximately 2 billion bad bot requests — equivalent to an entire month’s worth of bot traffic.
  • The number of unique autonomous systems involved in route leaks and BGP hijacks in Q2 2025 remained roughly in line with the levels observed over the previous several quarters.
  • After a sharp decline recorded in the previous quarter, the number of global BGP incidents rose significantly in Q2 and set a new quarterly record. We observed 14 such incidents: 10 global route leaks and 4 global BGP hijacks.

 

DDoS attacks targeting the network and transport layers (L3-L4)

The number of L3-L4 DDoS attacks exceeding 1 Gbps in Q2 2025 increased significantly compared to the same period last year: we recorded 43% more such attacks than in Q2 2024. As a reminder, since the beginning of last year, we have excluded incidents with an intensity below 1 Gbps from our statistics.

The number of multivector attacks in Q2 2025 grew even slightly faster than the overall number of L3-L4 attacks, rising by 49% year over year. As a result, their share increased by nearly one percentage point — from 17.8% last year to 18.5%.

 

Multivector L3-L4 DDoS attacks

The distribution of “pure” attack vectors in Q2 2025 was as follows: IP flood took the lead, accounting for almost two-thirds of all L3-L4 DDoS attacks (64.7%) during the quarter. Far behind were UDP flood (14.9%), TCP flood (11.5%), and SYN flood (8.8%).

ICMP flood attacks appear to have completely fallen out of favor with attackers — in Q2, their share was negligible (0.2%), while in Q1 2025, we did not record any such attacks at all.

 

Number of L3-L4 DDoS attacks by attack vector

 

Duration of L3-L4 DDoS attacks

The top three longest L3-L4 DDoS attacks in Q2 2025 were as follows: the longest targeted the “Betting shops” microsegment and lasted just over four days — 96.5 hours. It was followed by attacks targeting the “Telecom operators” microsegment (42.8 hours) and the “Hosting platforms” microsegment (20.7 hours). For comparison, the 2024 record was 19 days (463.9 hours).

Overall, most attacks in Q2 2025 were slightly shorter than in the same quarter of the previous year. For example, the average attack duration decreased from 40 minutes last year to 36.8 minutes in Q2 this year. The median duration dropped even more significantly: from 150 seconds to just 60 seconds.

 

L3-L4 DDoS attack duration in seconds

 

Intensity of L3-L4 DDoS attacks

The most intense DDoS incident of Q2 and the entire first half of 2025 was recorded on April 3. The attack targeted an organization in the “Betting shops” microsegment and peaked at 965 Gbps — just slightly below last year’s record of 1,140 Gbps.

The attack lasted about an hour and a half and unfolded in several waves, with the peak occurring around the 20-minute mark. It was a multivector attack, with the following peak intensities across different vectors: UDP flood — 965 Gbps, SYN flood — 229 Gbps, IP flood — 214 Gbps, and TCP flood — 169 Gbps.

The timing of the attack suggests a likely connection to a historic moment in NHL history — Alexander Ovechkin’s record-breaking achievement. On April 3, Ovechkin scored his 892nd goal, followed by his 894th on April 5 (tying Wayne Gretzky’s all-time record) and his 895th on April 6 (breaking the record). We believe that the surge in betting activity linked to this event likely triggered the attack.

 

L3-L4 DDoS attack volume in bits per second (bps) by attack vector

 

The largest attack of the quarter in terms of maximum packet rate was significantly higher than the previous year: 106.8 Mpps in Q2 2025 versus 63.6 Mpps in Q2 2024.

 

L3-L4 DDoS attack volume in packets per second (pps) by attack vector

 

Distribution of L3-L4 DDoS attacks across industries

In Q2 2025, most L3-L4 DDoS attacks targeted the “FinTech” (22.6%), “E-commerce” (20.6%), and “Information and communication technology” (16.1%) segments. Combined, these three industries accounted for 59.3% of all L3-L4 attacks recorded during the quarter.

 

Macro segmentation of L3-L4 DDoS attacks

 

Looking at a more detailed breakdown, the most targeted microsegments in Q2 2025 were “Online retail” (11.6%), “Media, TV, radio, and bloggers” (11%), “Software services” (8.8%), “Banks” (7.1%), and “Betting shops” (6.5%). Together, these five microsegments accounted for nearly half (44.9%) of all attacks observed during the reporting period.

 

Micro segmentation of L3-L4 DDoS attacks

 

Duration of L3-L4 DDoS attacks across industries

After a dip in Q1 2025, the duration of L3-L4 DDoS attacks returned to more typical levels. The longest attack targeted the “Betting shops” microsegment and lasted over four days — 96.5 hours.

The second-longest attack hit the “Telecom operators” microsegment, lasting about one and a half days (42.8 hours). In third place was an attack targeting the “Hosting platforms” microsegment, which continued for 20.7 hours.

For comparison, the record for the longest L3-L4 DDoS attack in 2024 was nearly 19 days (463.9 hours). In the previous quarter, the longest attack lasted 9.6 hours, while the longest L3-L4 incident in Q2 2024 lasted exactly three days — 72 hours.

Intensity of L3-L4 DDoS attacks across industries

The top five microsegments that experienced the most intense L3-L4 DDoS attacks in Q2 2025 were: “Betting shops” (965 Gbps), “Banks” (152 Gbps), “Telecom operators” (141 Gbps), “Game platforms” (132 Gbps), and “Payment systems” (107 Gbps).

 

Max L3-L4 DDoS attack bitrate by industry

 

The top five microsegments by maximum packet rate in Q2 included: “Software services” (107 Mpps), “Betting shops” (87 Mpps), “Online retail” (68 Mpps), “Media, TV, radio, and bloggers” (32 Mpps), and “Various online services” (30 Mpps).

 

Max L3-L4 DDoS attack packet rate by industry

 

As with attack duration, following a noticeable dip in Q1, the intensity of L3-L4 attacks returned to levels comparable to last year.

 

DDoS attacks targeting the application layer (L7)

Q2 2025 saw a surge in the number of L7 DDoS attacks, with a 74% increase compared to the same quarter last year.

The top three classes of L7 attacks remained unchanged from the previous quarter. The most common were attacks classified as “Request Rate Patterns” (36.9%), characterized by request frequencies that deviate from the expected behavior of legitimate users.

In second place were “Rotating Client Secondary Attributes” attacks (24.5%), which involve unusual sets of request headers. The third most common were “Abnormal URL Traversal” attacks (13.9%), involving actions that legitimate users would typically not be able to perform.

 

L7 DDoS attacks by type

 

Distribution of L7 DDoS attacks across industries

As in the previous several quarters, the largest share of L7 DDoS attacks in Q2 2025 targeted the “FinTech” macrosegment. However, its share declined significantly over the past year — from 56.8% in Q2 2024 to 43.6% in Q2 2025.

The second and the third positions also remained unchanged: “E-commerce” accounted for 22.6% of attacks, and “Information and communication technology” for 18.2%. Both shares grew noticeably compared to Q2 2024, when they stood at 13.8% and 7.8%, respectively.

 

Macro segmentation of L7 DDoS attacks

 

Looking at microsegments, the most frequently targeted in Q2 2025 were “Banks” (24.7%), though their share also declined year over year (from 32.2% in Q2 2024). A significant number of L7 DDoS attacks also targeted “Software services” (12.9%), “Food retail” (10.9%), “Payment systems” (8.5%), and “Online retail” (6.1%).

 

Micro segmentation of L7 DDoS attacks

 

Duration of L7 DDoS attacks across industries

The top five longest L7 DDoS attacks recorded in Q2 2025 were as follows: the longest targeted the “Online retail” microsegment and lasted 65.5 hours.

Next were attacks against the “Logistics” (45.7 hours), “Telecom operators” (40 hours), “Software services” (17.2 hours), and “Media, TV, radio, and bloggers” (15.9 hours) microsegments.

For comparison, the longest L7 incident in all of 2024 lasted 49 hours. Thus, one attack in Q2 2025 significantly exceeded this record, while two others came close to it.

 

The largest DDoS botnet

At the end of the previous quarter, on March 26, 2025, we recorded an attack by the largest DDoS botnet to date, consisting of 1.33 million devices, most of which were located in Brazil (51%), as well as in Argentina, Russia, Iraq, Mexico, and several other countries.

In the middle of Q2, on May 16, 2025, we observed another attack by this botnet. This time, it involved 3.5 times more devices: in total, we blocked approximately 4.6 million unique IP addresses during the mitigation of this attack. This is roughly 20 times larger than the biggest botnet we detected in 2024 (227,000 devices) and almost 34 times larger than the 2023 record (136,000 devices).

 

The largest botnet

 

The attack targeted an organization in the “Government resources” segment, lasted just over an hour, and unfolded in several phases:

  • In the first phase, approximately 2.2 million devices were involved.
  • In the second phase, attackers added about 1.5 million more devices.
  • In the third phase, another 0.9 million devices joined, bringing the total to 4.6 million.

The botnet’s geography became noticeably more diverse in the month and a half between these two incidents: although IP addresses from Brazil still dominated, their share decreased from 51% to 30%. We also blocked a significant number of IP addresses from the United States (12.1%), Vietnam (7.9%), India (2.9%), and Argentina (2.8%). At the same time, the share of other countries increased significantly — from 33% in March to around 45% in May.

 

Geographic distribution of the largest botnet

 

Geographical distribution of L7 DDoS attack sources

In Q2 2025, the countries most frequently serving as sources of application-layer (L7) DDoS attacks were led by Russia (17%) and the United States (16.6%), with their shares nearly equal. Brazil firmly held third place with 13.2%, showing a significant increase over the past year.

 

Geographical distribution of DDoS attack sources

 

Also making the top ten sources of malicious traffic were the Netherlands (3.5%), Vietnam (3.1%), Germany (3%), the United Kingdom (2.4%), Singapore (2.3%), India (1.9%), and China (1.8%). Together, these ten countries accounted for approximately two-thirds (64.8%) of all IP addresses we blocked during DDoS mitigation in Q2 2025.

 

Bad bot protection statistics — Qrator.AntiBot

To avoid confusion, it’s important to clarify that “bad bots” refer to automated systems that attempt to interact with websites while pretending to be legitimate users. Unlike destructive DDoS bots, bad bots do not aim to disrupt a site’s functionality. Their goals typically include data scraping, artificially inflating metrics, brute-forcing accounts, and other unwanted activities.

In Q2 2025, we observed a sharp rise in bad bot traffic (+31%), significantly outpacing the growth in the number of protected resources.

 

Blocked bot requests history

 

The surge in bot traffic peaked in April–May, followed by a decline in June. This spike was largely driven by the longest-lasting bot attack of the quarter, which we will cover later.

 

Blocked bot requests in Q2 2025

 

Most bad bot attacks in Q2 2025 targeted the “E-commerce” segment, with its share rising to 59.6%. Far behind were “Betting” (16.5%) and “Media” (9.6%). Combined, these three segments accounted for more than 85% of all bad bot traffic during the quarter.

 

Bad bot activity by industry in Q2 2025

 

Starting this quarter, we also began analyzing the share of bad bot traffic relative to total traffic across protected resources — essentially, a “bad bot index.” According to our analytics system, this index averaged 2.34% in Q2 2025.

Interestingly, the botness index varied significantly across industries. The three segments most exposed to bot traffic were: “Media” (15%), “EdTech” (6.4%), and “Betting” (4.9%).

It’s worth noting that Qrator.AntiBot allows customers to configure on which pages and domains bot protection is enabled. As a result, this statistic may not reflect a significant portion of overall bot traffic.

 

Share of bot requests by industry in Q2 2025

 

We also improved our bot classification and now distinguish four categories instead of three:

  • Simple bots — scripts using cURL, Python, and other languages, without browser emulation.
  • Puppeteer bots — bots that mimic a regular user environment but are externally automated.
  • Smart bots — bots that are aware of bot checks and designed to bypass them.
  • API bots — scripts that ignore normal user interaction and primarily target APIs.

That is, the category of “browser bots” that we were using previously, has been split into two distinct types: “puppeteer bots” and “smart bots.”

In Q2 2025, the distribution of bad bots by type was as follows: as usual, simple bots made up the majority (59.2%). They were followed by API bots (38%), while puppeteer bots and smart bots accounted for just 2.58% and 0.23% of traffic, respectively.

 

Bad bot activity by type in Q2 2025

 

Most notable bad bot attacks

Let’s return to the longest bot attack of the quarter, which we already mentioned earlier — it was also the largest in scale. In early April, we started protecting a high-traffic resource from the “E-commerce” industry segment.

However, the attackers did not immediately notice that their requests were no longer having the intended effect and continued their activity for just over a month after our protection was activated. During this time, the attackers sent — and we blocked — 1,934,485,130 requests, roughly equivalent to our average monthly volume of bad bot traffic.

The fastest bot attack of the quarter also targeted the “E-commerce” segment. The peak request rate of this attack reached 441,147 requests per second.

 

BGP incidents

The number of unique autonomous systems (ASes) responsible for route leaks and BGP hijacks in Q2 2025 remained relatively stable, showing no significant change compared to the previous several quarters. This indicates that the underlying risks associated with BGP misconfigurations and malicious activity continue to persist.

 

BGP Incidents in Q2 2025

 

Global BGP incidents

Note: The Qrator.Radar team identifies global BGP incidents using a set of threshold criteria. These include the number of affected prefixes and autonomous systems, as well as the extent of the anomaly’s propagation across routing tables.

The number of global BGP incidents in Q2 2025 increased significantly compared to the previous reporting period, which saw an unexpected period of calm. In fact, Q2 2025 set a new record for the past two years in terms of global incidents: in total, we recorded 14 such events — 10 global route leaks and 4 global BGP hijacks.

 

Global BGP Incidents in Q2 2025

 

The global route leaks observed in Q2 affected various providers across multiple regions. We expect such incidents to continue in the near future, as protective mechanisms like RFC 9234 and ASPA are still far from widespread adoption.

Detailed findings

  • The total number of L3-L4 DDoS attacks in Q2 2025 increased by 43% compared to Q2 2024.
  • The share of multivector attacks rose slightly from 17.8% in Q2 2024 to 18.5% in Q2 2025.
  • The dominant attack vector was IP flood, accounting for 64.7% of all L3-L4 DDoS attacks. The least popular vector among attackers was ICMP flood (0.2%).
  • Most L3-L4 DDoS attacks in Q2 targeted the “FinTech” (22.6%), “E-commerce” (20.6%), and “Information and communication technology” (16.1%) segments.
  • At the microsegment level, L3-L4 attacks were primarily aimed at “Online retail” (11.6%), “Media, TV, radio, and bloggers” (11.0%), “Software services” (8.8%), “Banks” (7.1%), and “Betting shops” (6.5%).
  • The most intense L3-L4 DDoS attack was recorded in the “Betting shops” microsegment and was likely linked to Alexander Ovechkin’s record-breaking achievement in the NHL. The peak bitrate of this attack reached 965 Gbps, just slightly below last year’s record of 1,140 Gbps.
  • The three longest L3-L4 DDoS attacks of the quarter targeted the “Betting shops” (96.5 hours), “Telecom operators” (42.8 hours), and “Hosting platforms” (20.7 hours) microsegments. For comparison, the longest recorded attack in 2024 lasted nearly 19 days (463.9 hours).
  • The total number of L7 DDoS attacks in Q2 2025 increased sharply compared to Q2 2024 (+74%).
  • The largest share of L7 DDoS attacks in Q2 2025 targeted the “FinTech” (43.6%), “E-commerce” (22.6%), and “Information and communication technology” (18.2%) macrosegments.
  • At the microsegment level, the most frequently targeted industries were “Banks” (24.7%), “Software services” (12.9%), “Food retail” (10.9%), “Payment systems” (8.5%), and “Online retail” (6.1%).
  • The top three longest L7 DDoS attacks in Q2 2025 targeted the “Online retail” (65.5 hours), “Logistics” (45.7 hours), and “Telecom operators” (40 hours) microsegments.
  • The largest DDoS botnet we detected in Q2 2025 consisted of 4.6 million devices (compared to approximately 227,000 devices in the largest botnet of 2024). The majority of these devices were located in Brazil (29.7%), the United States (12.1%), Vietnam (7.9%), India (2.9%), and Argentina (2.8%).
  • Overall, the top three countries serving as sources of L7 DDoS attacks remained unchanged from the previous year: Russia ranked first (17%), followed by the United States (16.6%) and Brazil (13.2%), with Brazil’s share continuing to grow steadily over the past several quarters.
  • Bad bot activity in Q2 2025 was significantly higher (+31%) than in the previous quarter.
  • The main surge in bot traffic occurred in April–May and was driven by a long-running attack targeting the “E-commerce” segment. This attack lasted over a month, during which we blocked approximately 2 billion bot requests.
  • The largest number of bad bot attacks in Q2 2025 targeted the “E-commerce” (59.6%), “Betting” (16.5%), and “Media” (9.6%) segments.
  • On average, the share of bad bot traffic relative to total traffic on protected resources in Q2 2025 was 2.34%. However, in several industries, this bad bot index was significantly higher: the leading segments by this metric were “Media” (15%), “EdTech” (6.4%), and “Betting” (4.9%).
  • The number of unique ASes responsible for route leaks and BGP hijacks in Q2 2025 remained roughly at the same level as in several previous quarters.
  • At the same time, the number of global BGP incidents in Q2 2025 increased significantly, setting a new quarterly record: we recorded 14 global incidents — 10 route leaks and 4 BGP hijacks.

Get your Report

Full name *
Work email *
Job Title *
Company name *

I acknowledge and agree to the terms and conditions set forth in Qrator Labs’ Privacy Policy.

Survey

Share your experience and expectations regarding DDoS protection. Your answers will help us tailor solutions to meet your cybersecurity needs.

Tell us about your company’s infrastructure and critical systems. This will help us understand the scope of protection you require.

Help us learn about how decisions are made in your company. This information will guide us in offering the most relevant solutions.

Let us know what drives your choices when it comes to DDoS protection. Your input will help us focus on what matters most to you.

1/4. Questions about Awareness and Needs Questions about Infrastructure Questions about Decision-Making Questions about Motivation
Have you encountered DDoS attacks before?
What is your company's average internet traffic volume?
Mb
Who in your company makes decisions about cybersecurity solutions?
What is most important to you when choosing an Anti-DDoS solution? (select multiple options)
What key risks do you want to minimize with DDoS protection?
Does your company have a solution to protect against DDoS attacks?
Which systems are critical for your business to protect? (select multiple options)
When do you plan to consider a solution for DDoS protection?
What is your company’s primary type of activity?
What level of DDoS protection do you consider sufficient?
Team size:
Thank you for completing the survey!
Your participation will help us produce better market analytics.
Thank you for staying with us!
If the document does not load, please click the "Download" button. Help us better understand the market and prepare better analytics, take the survey.
Your subscription successfully activated