
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 06:34:22 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/radar-2025-year-in-review/</link>
            <pubDate>Mon, 15 Dec 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We present our 6th annual review of Internet trends and patterns observed across the globe, revealing the disruptions, advances and metrics that defined 2025.  ]]></description>
            <content:encoded><![CDATA[ <p>The <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>2025 Cloudflare Radar Year in Review</u></a> is here: our sixth annual review of the Internet trends and patterns we observed throughout the year, based on Cloudflare’s expansive network view.</p><p>Our view is unique, due to Cloudflare’s global <a href="https://cloudflare.com/network"><u>network</u></a>, which has a presence in 330 cities in over 125 countries/regions, handling over 81 million HTTP requests per second on average, with more than 129 million HTTP requests per second at peak on behalf of millions of customer Web properties, in addition to responding to approximately 67 million (<a href="https://www.cloudflare.com/learning/dns/dns-server-types/"><u>authoritative + resolver</u></a>) DNS queries per second. <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> uses the data generated by these Web and DNS services, combined with other complementary data sets, to provide near-real time insights into <a href="https://radar.cloudflare.com/traffic"><u>traffic</u></a>, <a href="https://radar.cloudflare.com/bots"><u>bots</u></a>, <a href="https://radar.cloudflare.com/security/"><u>security</u></a>, <a href="https://radar.cloudflare.com/quality"><u>connectivity</u></a>, and <a href="https://radar.cloudflare.com/dns"><u>DNS</u></a> patterns and trends that we observe across the Internet. </p><p>Our <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>Radar Year in Review</u></a> takes that observability and, instead of a real-time view, offers a look back at 2025: incorporating interactive charts, graphs, and maps that allow you to explore and compare selected trends and measurements year-over-year and across geographies, as well as share and embed Year in Review graphs. </p><p>The 2025 Year In Review is organized into six sections: <a href="https://radar.cloudflare.com/year-in-review/2025#internet-traffic-growth"><u>Traffic</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#robots-txt"><u>AI</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#ios-vs-android"><u>Adoption &amp; Usage</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#internet-outages"><u>Connectivity</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#mitigated-traffic"><u>Security</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025#malicious-emails"><u>Email Security</u></a>, with data spanning the period from January 1 to December 2, 2025. To ensure consistency, we kept underlying methodologies unchanged from previous years’ calculations. We also incorporated several new data sets this year, including multiple AI-related metrics, <a href="https://radar.cloudflare.com/year-in-review/2025#speed-tests"><u>global speed test activity</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025#ddos-attacks"><u>hyper-volumetric DDOS size progression</u></a>. Trends for over 200 countries/regions are available on the microsite; smaller or less-populated locations are excluded due to insufficient data. Some metrics are only shown worldwide and are not displayed if a country/region is selected. </p><p>In this post, we highlight key findings and interesting observations from the major Year In Review microsite sections, and we have again published a companion <i>Most Popular Internet Services </i><a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>blog post</u></a> that specifically explores trends seen across <a href="https://radar.cloudflare.com/year-in-review/2025#internet-services"><u>top Internet Services</u></a>.</p><p>We encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>2025 Year in Review microsite</u></a> to explore the datasets and metrics in more detail, including those for your country/region to see how they have changed since 2024, and how they compare to other areas of interest. </p><p>We hope you’ll find the Year in Review to be an insightful and powerful tool — to explore the disruptions, advances, and metrics that defined the Internet in 2025. </p><p>Let’s dig in.</p>
    <div>
      <h2>Key Findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic</h3>
      <a href="#traffic">
        
      </a>
    </div>
    <ul><li><p>Global Internet traffic grew 19% in 2025, with significant growth starting in August. <a href="#global-internet-traffic-grew-19-in-2025-with-significant-growth-starting-in-august"><u>➜</u></a></p></li><li><p>The top 10 most popular Internet services saw a few year-over-year shifts, while a number of new entrants landed on category lists. <a href="#the-top-10-most-popular-internet-services-saw-some-year-over-year-shifts-while-the-category-lists-saw-a-number-of-new-entrants"><u>➜</u></a></p></li><li><p>Starlink traffic doubled in 2025, including traffic from over 20 new countries/regions. <a href="#starlink-traffic-doubled-in-2025-including-traffic-from-over-20-new-countries-regions"><u>➜</u></a></p></li><li><p>Googlebot was again responsible for the highest volume of request traffic to Cloudflare in 2025 as it crawled millions of Cloudflare customer sites for search indexing and AI training. <a href="#googlebot-was-again-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2025-as-it-crawled-millions-of-cloudflare-customer-sites-for-search-indexing-and-ai-training"><u>➜</u></a></p></li><li><p>The share of human-generated Web traffic that is post-quantum encrypted has grown to 52%. <a href="#the-share-of-human-generated-web-traffic-that-is-post-quantum-encrypted-has-grown-to-52"><u>➜</u></a></p></li><li><p>Googlebot was responsible for more than a quarter of Verified Bot traffic. <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic"><u>➜</u></a></p></li></ul>
    <div>
      <h3>AI</h3>
      <a href="#ai">
        
      </a>
    </div>
    <ul><li><p>Crawl volume from dual-purpose Googlebot dwarfed other AI bots and crawlers. <a href="#crawl-volume-from-dual-purpose-googlebot-dwarfed-other-ai-bots-and-crawlers"><u>➜</u></a></p></li><li><p>AI “user action” crawling increased by over 15x in 2025. <a href="#ai-user-action-crawling-increased-by-over-15x-in-2025"><u>➜</u></a></p></li><li><p>While other AI bots accounted for 4.2% of HTML request traffic, Googlebot alone accounted for 4.5%. <a href="#while-other-ai-bots-accounted-for-4-2-of-html-request-traffic-googlebot-alone-accounted-for-4-5"><u>➜</u></a></p></li><li><p>Anthropic had the highest crawl-to-refer ratio among the leading AI and search platforms. <a href="#anthropic-had-the-highest-crawl-to-refer-ratio-among-the-leading-ai-and-search-platforms"><u>➜</u></a></p></li><li><p>AI crawlers were the most frequently fully disallowed user agents found in robots.txt files. <a href="#ai-crawlers-were-the-most-frequently-fully-disallowed-user-agents-found-in-robots-txt-files"><u>➜</u></a></p></li><li><p>On Workers AI, Meta’s llama-3-8b-instruct model was the most popular model, and text generation was the most popular task type. <a href="#on-workers-ai-metas-llama-3-8b-instruct-model-was-the-most-popular-model-and-text-generation-was-the-most-popular-task-type"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Adoption &amp; Usage</h3>
      <a href="#adoption-usage">
        
      </a>
    </div>
    <ul><li><p>iOS devices generated 35% of mobile device traffic globally — and more than half of device traffic in many countries. <a href="#ios-devices-generated-35-of-mobile-device-traffic-globally-and-more-than-half-of-device-traffic-in-many-countries"><u>➜</u></a></p></li><li><p>The shares of global Web requests using HTTP/3 and HTTP/2 both increased slightly in 2025. <a href="#the-shares-of-global-web-requests-using-http-3-and-http-2-both-increased-slightly-in-2025"><u>➜</u></a></p></li><li><p>JavaScript-based libraries and frameworks remained integral tools for building Web sites. <a href="#javascript-based-libraries-and-frameworks-remained-integral-tools-for-building-web-sites"><u>➜</u></a></p></li><li><p>One-fifth of automated API requests were made by Go-based clients. <a href="#one-fifth-of-automated-api-requests-were-made-by-go-based-clients"><u>➜</u></a></p></li><li><p>Google remains the top search engine, with Yandex, Bing, and DuckDuckGo distant followers. <a href="#google-remains-the-top-search-engine-with-yandex-bing-and-duckduckgo-distant-followers"><u>➜</u></a></p></li><li><p>Chrome remains the top browser across platforms and operating systems – except on iOS, where Safari has the largest share. <a href="#chrome-remains-the-top-browser-across-platforms-and-operating-systems-except-on-ios-where-safari-has-the-largest-share"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Connectivity</h3>
      <a href="#connectivity">
        
      </a>
    </div>
    <ul><li><p>Almost half of the 174 major Internet outages observed around the world in 2025 were due to government-directed regional and national shutdowns of Internet connectivity. <a href="#almost-half-of-the-174-major-internet-outages-observed-around-the-world-in-2025-were-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity"><u>➜</u></a></p></li><li><p>Globally, less than a third of dual-stack requests were made over IPv6, while in India, over two-thirds were. <a href="#globally-less-than-a-third-of-dual-stack-requests-were-made-over-ipv6-while-in-india-over-two-thirds-were"><u>➜</u></a></p></li><li><p>European countries had some of the highest download speeds, all above 200 Mbps. Spain remained consistently among the top locations across measured Internet quality metrics. <a href="#european-countries-had-some-of-the-highest-download-speeds-all-above-200-mbps-spain-remained-consistently-among-the-top-locations-across-measured-internet-quality-metrics"><u>➜</u></a></p></li><li><p>London and Los Angeles were hotspots for Cloudflare speed test activity in 2025. <a href="#london-and-los-angeles-were-hotspots-for-cloudflare-speed-test-activity-in-2025"><u>➜</u></a></p></li><li><p>More than half of request traffic comes from mobile devices in 117 countries/regions. <a href="#more-than-half-of-request-traffic-comes-from-mobile-devices-in-117-countries-regions"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Security</h3>
      <a href="#security">
        
      </a>
    </div>
    <ul><li><p>6% of global traffic over Cloudflare’s network was mitigated by our systems — either as potentially malicious or for customer-defined reasons. <a href="#6-of-global-traffic-over-cloudflares-network-was-mitigated-by-our-systems-either-as-potentially-malicious-or-for-customer-defined-reasons"><u>➜</u></a></p></li><li><p>40% of global bot traffic came from the United States, with Amazon Web Services and Google Cloud originating a quarter of global bot traffic. <a href="#40-of-global-bot-traffic-came-from-the-united-states-with-amazon-web-services-and-google-cloud-originating-a-quarter-of-global-bot-traffic"><u>➜</u></a></p></li><li><p>Organizations in the "People and Society” sector were the most targeted during 2025. <a href="#organizations-in-the-people-and-society-vertical-were-the-most-targeted-during-2025"><u>➜</u></a></p></li><li><p>Routing security, measured as the shares of RPKI valid routes and covered IP address space, saw continued improvement throughout 2025. <a href="#routing-security-measured-as-the-shares-of-rpki-valid-routes-and-covered-ip-address-space-saw-continued-improvement-throughout-2025"><u>➜</u></a></p></li><li><p>Hyper-volumetric DDoS attack sizes grew significantly throughout the year. <a href="#hyper-volumetric-ddos-attack-sizes-grew-significantly-throughout-the-year"><u>➜</u></a></p></li><li><p>More than 5% of email messages analyzed by Cloudflare were found to be malicious. <a href="#more-than-5-of-email-messages-analyzed-by-cloudflare-were-found-to-be-malicious"><u>➜</u></a></p></li><li><p>Deceptive links, identity deception, and brand impersonation were the most common types of threats found in malicious email messages. <a href="#deceptive-links-identity-deception-and-brand-impersonation-were-the-most-common-types-of-threats-found-in-malicious-email-messages"><u>➜</u></a></p></li><li><p>Nearly all of the email messages from the .christmas and .lol Top Level Domains were found to be either spam or malicious. <a href="#nearly-all-of-the-email-messages-from-the-christmas-and-lol-top-level-domains-were-found-to-be-either-spam-or-malicious"><u>➜</u></a></p></li></ul>
    <div>
      <h2>Traffic trends</h2>
      <a href="#traffic-trends">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3EqqyX4A0PI27tBdVijUq2/9102522d8661d7d5911ece00c1b1e678/BLOG-3077_2.png" />
          </figure>
    <div>
      <h3>Global Internet traffic grew 19% in 2025, with significant growth starting in August</h3>
      <a href="#global-internet-traffic-grew-19-in-2025-with-significant-growth-starting-in-august">
        
      </a>
    </div>
    <p>To determine the traffic trends over time for the Year in Review, we use the average daily traffic volume (excluding bot traffic) over the second full calendar week (January 12-18) of 2025 as our baseline. (The second calendar week is used to allow time for people to get back into their “normal” school and work routines after the winter holidays and New Year’s Day.) The percent change shown in the traffic trends chart is calculated relative to the baseline value — it does not represent absolute traffic volume for a country/region. The trend line represents a seven-day trailing average, which is used to smooth the sharp changes seen with data at a daily granularity. </p><p>Traffic growth in 2025 appeared to occur in several phases. Traffic was, on average, somewhat flat through mid-April, generally within a couple of percent of the baseline value. However, it then saw growth through May to approximately 5% above baseline, staying in the +4-7% range through mid-August. It was at that time that growth accelerated, climbing steadily through September, October, and November, <a href="https://radar.cloudflare.com/year-in-review/2025#internet-traffic-growth"><u>peaking at 19% growth</u></a> for the year. Aided by a late-November increase, 2025’s rate of growth is about 10% higher than the 17% growth observed in 2024. In <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#global-internet-traffic-grew-17-2-in-2024"><u>past years</u></a>, we have also observed traffic growth accelerating in the back half of the year, although in 2022-2024, that acceleration started in July. It’s not clear why this year’s growth was seemingly delayed by several weeks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3I9BSisZlIKlCrANpDTBtx/deb202dba9ca9aa7e23379bab6d81412/BLOG-3077_3_-_traffic-internet_traffic_growth_-_worldwide.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, worldwide</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2025/bw#internet-traffic-growth"><u>Botswana</u></a> saw the highest peak growth, reaching 298% above baseline on November 8, and ending the period 295% over baseline. (More on what accounts for that growth in the Starlink section below.) Botswana and <a href="https://radar.cloudflare.com/year-in-review/2025/sd#internet-traffic-growth"><u>Sudan</u></a> were the only countries/regions to see traffic more than double over the course of the year, although some others experienced peak increases over 100% at some point during the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1z4fQNQvLZM5li5h7JWeIq/ed3afd5c7d2412a7426f3e7c4985be33/BLOG-3077_4_-_traffic-internet_traffic_growth_-_Botswana.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Botswana</i></sup></p><p>The impact of extended Internet disruptions are clearly visible within the graphs as well. For example, on October 29, the <a href="https://radar.cloudflare.com/year-in-review/2025/tz#internet-traffic-growth"><u>Tanzanian</u></a> government imposed an Internet shutdown there in response to election day protests. That shutdown lasted just a day, but another one followed from October 30 until November 3. Although traffic in the country had increased more than 40% above baseline ahead of the shutdowns, the disruption ultimately dropped traffic more than 70% below baseline — a rapid reversal. Traffic recovered quickly after connectivity was restored. A similar pattern was observed in <a href="https://radar.cloudflare.com/year-in-review/2025/jm#internet-traffic-growth"><u>Jamaica</u></a>, where Internet traffic spiked ahead of the arrival of <a href="https://x.com/CloudflareRadar/status/1983188999461319102?s=20"><u>Hurricane Melissa</u></a> on October 28, and then dropped significantly after the storm caused power outages and infrastructure damage on the island. Traffic began to rebound after the storm’s passing, returning to a level just above baseline by early December.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dVMnD0mQvl4sB1bbn6kka/a7c433aaf2df3319328b27156bf70618/BLOG-3077_5_-_traffic-internet_traffic_growth_-_Tanzania.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Tanzania</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dovYDK7vTfjsL9FBNAvjE/a80a0c8fe69cce81ecc03605ae874859/BLOG-3077_6_-_traffic-internet_traffic_growth_-_Jamaica.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Jamaica</i></sup></p>
    <div>
      <h3>The top 10 most popular Internet services saw some year-over-year shifts, while the category lists saw a number of new entrants</h3>
      <a href="#the-top-10-most-popular-internet-services-saw-some-year-over-year-shifts-while-the-category-lists-saw-a-number-of-new-entrants">
        
      </a>
    </div>
    <p>For the Year in Review, we look at the 11-month year-to-date period. In addition to an “overall” ranked list, we also rank services across nine categories, based on analysis of anonymized query data of traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> from millions of users around the world. For the purposes of these rankings, domains that belong to a single Internet service are grouped together.</p><p>Google and Facebook once again held the top two spots among the <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-services"><u>top 10</u></a>. Although the other members of the top 10 list remained consistent with 2024’s rankings, there was some movement in the middle. Microsoft, Instagram, and YouTube all moved higher; Amazon Web Services (AWS) dropped one spot lower, while TikTok fell four spots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vMi7DU13dkmLCkhEvvzVO/bdc5b0baa3b140c6112abf3b7414da83/BLOG-3077_7_-_traffic-topinternetservices.png" />
          </figure><p><sup><i>Top Internet services in 2025, worldwide</i></sup></p><p>Among Generative AI services, ChatGPT/OpenAI remained at the top of the list. But there was movement elsewhere, highlighting the dynamic nature of the industry. Services that moved up the rankings include Perplexity, Claude/Anthropic, and GitHub Copilot. New entries in the top 10 for 2025 include Google Gemini, Windsurf AI, Grok/xAI, and DeepSeek.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vUiNheIzMym9Mr3TPK3yN/c4684bb93696e31dcd689b1a150d35cd/BLOG-3077_8_-_Generative_AI.png" />
          </figure><p><sup><i>Top Generative AI services in 2025, worldwide</i></sup></p><p>Other categories saw movement within their lists as well – Shopee (“the leading e-commerce online shopping platform in Southeast Asia and Taiwan”) is a new entrant to the E-Commerce list, and HBO Max joined the Video Streaming ranking. These categorical rankings, as well as trends seen by specific services, are explored in more detail in <a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>a separate blog post</u></a>.</p><p>In addition, this year we are also providing top Internet services insights at a country/region level for the Overall, Generative AI, Social Media, and Messaging categories. (In 2024, we only shared Overall insights.)</p>
    <div>
      <h3>Starlink traffic doubled in 2025, including traffic from over 20 new countries/regions</h3>
      <a href="#starlink-traffic-doubled-in-2025-including-traffic-from-over-20-new-countries-regions">
        
      </a>
    </div>
    <p>SpaceX Starlink’s satellite-based Internet service continues to be a popular option for bringing connectivity to unserved or underserved areas, as well as to users on <a href="https://starlink.com/business/aviation"><u>planes</u></a> and <a href="https://starlink.com/business/maritime"><u>boats</u></a>. We analyzed aggregate request traffic volumes associated with Starlink's primary <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (<a href="https://radar.cloudflare.com/as14593"><u>AS14593</u></a>) to track the growth in usage of the service throughout 2025. The request volume shown on the trend line in the chart represents a seven-day trailing average. </p><p>Globally, <a href="https://radar.cloudflare.com/year-in-review/2025/#starlink-traffic-trends"><u>traffic from Starlink</u></a> continued to see consistent growth throughout 2025, with total request volume up 2.3x across the year. We tend to see rapid traffic growth when Starlink service becomes available in a country/region, and that trend continues in 2025. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4d7DF8FT1RuK8rbrFfUu1E/c05645dc7640e11794b35770bc0bcd70/BLOG-3077_9_-_traffic-starlink-worldwide.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, worldwide</i></sup></p><p>That’s exactly what we saw in the more than 20 new countries/regions where <a href="https://x.com/starlink"><u>@Starlink</u></a> announced availability: within days, Starlink traffic in those places increased rapidly. These included <a href="https://radar.cloudflare.com/year-in-review/2025/am#starlink-traffic-trends"><u>Armenia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ne#starlink-traffic-trends"><u>Niger</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/lk#starlink-traffic-trends"><u>Sri Lanka</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/sx#starlink-traffic-trends"><u>Sint Maarten</u></a>.</p><p>We also saw Starlink traffic from a number of locations that are not currently <a href="https://starlink.com/map"><u>marked for service availability</u></a>. However, there are IPv4 and/or IPv6 prefixes associated with these countries in Starlink’s <a href="https://geoip.starlinkisp.net/feed.csv"><u>published geofeed</u></a>. Given the ability for Starlink users to <a href="https://starlink.com/roam"><u>roam</u></a> with their service (and equipment), this traffic likely comes from roaming users in those areas.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4knmSgVn4FFyMm3ZRNRvuq/887455ee737217a7f9bad2cedbbff009/BLOG-3077_10_-_traffic-starlink-niger.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, Niger</i></sup></p><p>Of countries/regions where service was active before 2025, <a href="https://radar.cloudflare.com/year-in-review/2025/bj#starlink-traffic-trends"><u>Benin</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/tl#starlink-traffic-trends"><u>Timor-Leste</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/bw#starlink-traffic-trends"><u>Botswana</u></a> had some of the largest traffic growth, at 51x, 19x, and 16x respectively. Starlink service availability in <a href="https://x.com/Starlink/status/1720438167944499638"><u>Benin</u></a> was first announced in November 2023, <a href="https://x.com/Starlink/status/1866631930902622360"><u>Timor-Leste</u></a> in December 2024, and <a href="https://x.com/Starlink/status/1828840132688130322"><u>Botswana</u></a> in August 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PlOuYo67dUghmsSVtzd5k/d8ff2816e5703cc425c403c52bd56be1/BLOG-3077_11_-_traffic-starlink-botswana.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, Botswana</i></sup></p><p>Similar services, such as <a href="https://leo.amazon.com/"><u>Amazon Leo</u></a>, <a href="https://www.eutelsat.com/satellite-services/tv-internet-home/satellite-internet-home-business-konnect"><u>Eutelsat Konnect</u></a>, and China’s <a href="https://en.wikipedia.org/wiki/Qianfan"><u>Qianfan</u></a>, continue to grow their satellite constellations and move towards commercial availability. We hope to review traffic growth across these services in the future as well.</p>
    <div>
      <h3>Googlebot was again responsible for the highest volume of request traffic to Cloudflare in 2025 as it crawled millions of Cloudflare customer sites for search indexing and AI training</h3>
      <a href="#googlebot-was-again-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2025-as-it-crawled-millions-of-cloudflare-customer-sites-for-search-indexing-and-ai-training">
        
      </a>
    </div>
    <p>To look at the aggregate request traffic Cloudflare saw in 2025 from the entire IPv4 Internet, we can use a <a href="https://en.wikipedia.org/wiki/Hilbert_curve"><u>Hilbert curve</u></a>, which allows us to visualize a sequence of IPv4 addresses in a two-dimensional pattern that keeps nearby IP addresses close to each other, making them <a href="https://xkcd.com/195/"><u>useful</u></a> for surveying the Internet's IPv4 address space. Within the <a href="https://radar.cloudflare.com/year-in-review/2025/#ipv4-traffic-distribution"><u>visualization</u></a>, we aggregate IPv4 addresses into <a href="https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf"><u>/20</u></a> prefixes, meaning that at the highest zoom level, each square represents traffic from 4,096 IPv4 addresses. This level of aggregation keeps the amount of data used for the visualization manageable. See the <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2024-as-it-retrieved-content-from-millions-of-cloudflare-customer-sites-for-search-indexing"><u>2024 Year in Review blog post</u></a> for additional details about the visualization.</p><p>For the third year in a row, the IP address block that had the maximum request volume to Cloudflare during 2025 was Google’s <a href="https://radar.cloudflare.com/routing/prefix/66.249.64.0/20"><u>66.249.64.0/20</u></a> –  <a href="https://developers.google.com/static/search/apis/ipranges/googlebot.json"><u>one of several</u></a> used by the <a href="https://developers.google.com/search/docs/crawling-indexing/googlebot"><u>Googlebot</u></a> web crawler to retrieve content for search indexing and AI training. That a Googlebot IP address block ranked again as the top request traffic source is unsurprising, given the number of web properties on Cloudflare’s network and <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic"><u>Googlebot’s aggressive crawling activity</u></a>. The Googlebot prefix accounted for nearly 4x as much IPv4 request traffic as the next largest traffic source, 146.20.240.0/20, which is part of a <a href="https://radar.cloudflare.com/routing/prefix/146.20.0.0/16"><u>larger block of IPv4 address space announced by Rackspace Hosting</u></a>. As a cloud and hosting provider, Rackspace supports many different types of customers and applications, so the driver of the observed traffic to Cloudflare isn’t known.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NpjYc7D7ykOlLh837jarL/59c2bd9927a2fb16bb39973f4d8d1db8/BLOG-3077_12_-_traffic-ipv4distribution-googlebot.png" />
          </figure><p><i><sup>Zoomed Hilbert curve view showing the address block that generated the highest volume of requests in 2025</sup></i></p><p>This year, we’ve added the ability to search for an autonomous system (ASN) to the visualization, allowing you to see how broadly a network provider’s IP address holdings are distributed across the IPv4 universe. </p><p>One example is AS16509 (AMAZON-02, used with AWS), which shows the results of Amazon’s acquisitions of <a href="https://toonk.io/aws-and-their-billions-in-ipv4-addresses/index.html"><u>large amounts of IPv4 address space</u></a> over the years. Another example is AS7018 (ATT-INTERNET4, AT&amp;T), which is one of the largest <a href="https://radar.cloudflare.com/routing/us#ases-registered-in-united-states"><u>announcers of IPv4 address space in the United States</u></a>. Much of the traffic we see from this ASN comes from <a href="https://radar.cloudflare.com/routing/prefix/12.0.0.0/8"><u>12.0.0.0/8</u></a>, a block of over 16 million IPv4 addresses that has been <a href="https://wq.apnic.net/apnic-bin/whois.pl?searchtext=12.147.5.178"><u>owned by AT&amp;T since 1983</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42mehcaIRV4Kp9h6P86z6d/436e033e353710419fcc49865d765258/BLOG-3077_13_-_traffic-ipv4distribution-as7018.png" />
          </figure><p><sup><i>Hilbert curve showing the IPv4 address blocks from AS7018 that sent traffic to Cloudflare in 2025</i></sup></p>
    <div>
      <h3>The share of human-generated Web traffic that is post-quantum encrypted has grown to 52%</h3>
      <a href="#the-share-of-human-generated-web-traffic-that-is-post-quantum-encrypted-has-grown-to-52">
        
      </a>
    </div>
    <p>“<a href="https://en.wikipedia.org/wiki/Post-quantum_cryptography"><u>Post-quantum</u></a>” refers to a set of cryptographic techniques designed to protect encrypted data from “<a href="https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later"><u>harvest now, decrypt later</u></a>” attacks by adversaries that have the ability to capture and store current data for future decryption by sufficiently advanced quantum computers. The Cloudflare Research team has been <a href="https://blog.cloudflare.com/sidh-go/"><u>working on post-quantum cryptography since 2017</u></a>, and regularly publishes <a href="https://blog.cloudflare.com/pq-2025/"><u>updates</u></a> on the state of the post-quantum Internet.</p><p>After seeing <a href="https://radar.cloudflare.com/year-in-review/2024#post-quantum-encryption"><u>significant growth in 2024</u></a>, the global share of <a href="https://radar.cloudflare.com/year-in-review/2025/#post-quantum-encryption"><u>post-quantum encrypted traffic</u></a> nearly doubled throughout 2025, from 29% at the start of the year to 52% in early December. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qqehh1EqKIMi7xNcSr8SN/c24962ce446e153fbd37c9abe7254f78/BLOG-3077_14_-_traffic-postquantum-worldwide.png" />
          </figure><p><sup><i>Post-quantum encrypted TLS 1.3 traffic growth in 2025, worldwide</i></sup></p><p>Twenty-eight countries/regions saw their share of post-quantum encrypted traffic more than double throughout the year, including significant growth in <a href="https://radar.cloudflare.com/year-in-review/2025/pr#post-quantum-encryption"><u>Puerto Rico</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/kw#post-quantum-encryption"><u>Kuwait</u></a>. Kuwait’s share nearly tripled, from 13% to 37%, and Puerto Rico’s share grew from 20% to 49%. </p><p>Those three were among others that saw significant share growth in mid-September, <a href="https://9to5mac.com/2025/09/09/apple-announces-ios-26-release-date-september-15/"><u>concurrent with</u></a> Apple releasing operating system updates, in which “<i>TLS-protected connections will </i><a href="https://support.apple.com/en-us/122756"><i><u>automatically advertise support for hybrid, quantum-secure key exchange</u></i></a><i> in TLS 1.3</i>”. In Kuwait and Puerto Rico, over half of request traffic is from mobile devices, and approximately half comes from iOS devices in both locations as well, so it is not surprising that this software update resulted in a significant increase in post-quantum traffic share</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Y65KuTezdGnAfilj9Xosr/a74b60f9f24322827ea89f9ad1eef035/BLOG-3077_15_-_traffic-postquantum-puertorico.png" />
          </figure><p><sup><i>Post-quantum encrypted TLS 1.3 traffic growth in 2025, Puerto Rico</i></sup></p><p>To that end, the share of post-quantum encrypted traffic from Apple iOS devices <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=post_quantum&amp;filters=botClass%253DLIKELY_HUMAN%252Cos%253DiOS&amp;dt=2025-09-01_2025-09-28"><u>grew significantly in September</u></a> after iOS 26 was officially released. Just <a href="https://x.com/CloudflareRadar/status/1969159602999640535?s=20"><u>four days after release</u></a>, the global share of requests with post-quantum support from iOS devices grew from just under 2% to 11%. By <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=post_quantum&amp;filters=deviceType%253DMobile%252Cos%253DiOS%252CbotClass%253DLikely_Human&amp;dt=2025-12-01_2025-12-07"><u>early December</u></a>, more than 25% of requests from iOS devices used post-quantum encryption.</p>
    <div>
      <h3>Googlebot was responsible for more than a quarter of Verified Bot traffic</h3>
      <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic">
        
      </a>
    </div>
    <p>The new <a href="https://radar.cloudflare.com/bots/directory?kind=all"><u>Bots Directory</u></a> on Cloudflare Radar provides a wealth of information about <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/"><u>Verified Bots</u></a> and <a href="https://developers.cloudflare.com/bots/concepts/bot/signed-agents/"><u>Signed Agents</u></a>, including their operators, categories, and associated user agents, links to documentation, and traffic trends. Verified Bots must conform to a <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/policy/"><u>set of requirements</u></a> as well as being verified through either <a href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/"><u>Web Bot Auth</u></a> or <a href="https://developers.cloudflare.com/bots/reference/bot-verification/ip-validation/"><u>IP validation</u></a>. A signed agent is controlled by an end user and a verified signature-agent from their <a href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/"><u>Web Bot Auth</u></a> implementation, and must conform to a separate <a href="https://developers.cloudflare.com/bots/concepts/bot/signed-agents/policy/"><u>set of requirements</u></a>.</p><p><a href="https://radar.cloudflare.com/bots/directory/google"><u>Googlebot</u></a> is used to crawl Web site content for search indexing and AI training, and it was far and away the <a href="https://radar.cloudflare.com/year-in-review/2025/#per-bot-traffic"><u>most active bot seen by Cloudflare</u></a> throughout 2025. It was most active between mid-February and mid-July, peaking in mid-April, and was responsible for over 28% of traffic from Verified Bots. Other Google-operated bots that were responsible for notable amounts of traffic included <a href="https://radar.cloudflare.com/bots/directory/googleads"><u>Google AdsBot</u></a> (used to monitor Web sites where Google ads are served), <a href="https://radar.cloudflare.com/bots/directory/googleimageproxy"><u>Google Image Proxy</u></a> (used to retrieve and cache images embedded in email messages), and <a href="https://radar.cloudflare.com/bots/directory/google-other"><u>GoogleOther</u></a> (used by various product teams for fetching publicly accessible content from sites).</p><p>OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/gptbot"><u>GPTBot</u></a>, which crawls content for AI training, was the next most active bot, originating about 7.5% of Verified Bot traffic, with fairly volatile crawling activity during the first half of the year. Microsoft’s <a href="https://radar.cloudflare.com/bots/directory/bing"><u>Bingbot</u></a> crawls Web site content for search indexing and AI training and generated 6% of Verified Bot traffic throughout the year, showing relatively stable activity. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/01CNwrALbfJ1DBJpX3hHvw/58f278f76b4e57d095e5e61b879f3728/BLOG-3077_16_-_traffic-verifiedbot-bots.png" />
          </figure><p><sup><i>Verified Bot traffic trends in 2025, worldwide</i></sup></p><p>Search engine crawlers and AI crawlers are the two most active Verified Bot categories, with traffic patterns mapping closely to the leading bots in those categories, including GoogleBot and OpenAI’s GPTBot. <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_CRAWLER&amp;kind=all"><u>Search engine crawlers</u></a> were responsible for 40% of Verified Bot traffic, with <a href="https://radar.cloudflare.com/bots/directory?category=AI_CRAWLER&amp;kind=all"><u>AI crawlers</u></a> generating half as much (20%). <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_OPTIMIZATION&amp;kind=all"><u>Search engine optimization</u></a> bots were also quite active, driving over 13% of requests from Verified Bots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IFOI7astEqMk1fqLPvhMK/860c1b28fe6d2987b7bcd8510d1495b5/BLOG-3077_17_-_traffic-verifiedbots-category.png" />
          </figure><p><sup><i>Verified Bot traffic trends by category in 2025, worldwide</i></sup></p>
    <div>
      <h2>AI insights</h2>
      <a href="#ai-insights">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IY2MCHqrWK7wPO5XSrHwc/2d4622db6417472e2702c31a95d31cef/BLOG-3077_18_-_.png" />
          </figure>
    <div>
      <h2> Crawl volume from dual-purpose Googlebot dwarfed other AI bots and crawlers</h2>
      <a href="#crawl-volume-from-dual-purpose-googlebot-dwarfed-other-ai-bots-and-crawlers">
        
      </a>
    </div>
    <p>In September, a Cloudflare <a href="https://blog.cloudflare.com/building-a-better-internet-with-responsible-ai-bot-principles/"><u>blog post</u></a> laid out a proposal for responsible AI bot principles, one of which was “AI bots should have one distinct purpose and declare it.” In the <a href="https://radar.cloudflare.com/ai-insights#ai-bot-best-practices"><u>AI bots best practices overview</u></a> on Radar, we note that several bot operators have dual-purpose crawlers, including Google and Microsoft.</p><p>Because <a href="https://radar.cloudflare.com/bots/directory/google"><u>Googlebot</u></a> crawls for both search engine indexing and AI training, we have included it in this year’s <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-bot-and-crawler-traffic"><u>AI crawler overview</u></a>. In 2025, its crawl volume dwarfed that of other leading AI bots. Request traffic began to increase in mid-February, peaking in late April, and then slowly declined through late July. After that, it grew gradually into the end of the year. <a href="https://radar.cloudflare.com/bots/directory/bing"><u>Bingbot</u></a> also has a similar dual purpose, although its crawl volume is a fraction of Googlebot’s. Bingbot’s crawl activity trended generally upwards across the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14AYO1s8q9J0zN9gcTaz0h/d60ad6cdd7af04938d98eda081bea834/BLOG-3077_19_-_ai-botandcrawlertraffic.png" />
          </figure><p><sup><i>AI crawler traffic trends in 2025, worldwide</i></sup></p><p>OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/gptbot"><u>GPTBot</u></a> is used to crawl content that may be used in training OpenAI's generative AI foundation models. Its crawling activity was quite volatile across the year, reaching its highest levels in June, but it ended November slightly above the crawl levels seen at the beginning of the year. </p><p>Crawl volume for OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/chatgpt-user"><u>ChatGPT-User</u></a>, which visits Web pages when users ask ChatGPT or a CustomGPT questions, saw sustained growth over the course of the year, with a weekly usage pattern becoming more evident starting in mid-February, suggesting increasing usage at schools and in the workplace. Peak request volumes were as much as 16x higher than at the beginning of the year. A drop in activity was also evident in the June to August timeframe, when many students were out of school and many professionals took vacation time. </p><p><a href="https://radar.cloudflare.com/bots/directory/oai-searchbot"><u>OAI-SearchBot</u></a>, which is used to link to and surface websites in search results in ChatGPT's search features, saw crawling activity grow gradually through August, then several traffic spikes in August and September, before starting to grow more aggressively heading into October, with peak request volume during a late October spike approximately 5x higher than the beginning of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Y39lUtvOLcaxwSwop4Egs/b9790ef1314a35ff811e4ed09d875271/BLOG-3077_20_-_image59.png" />
          </figure><p><sup><i>OpenAI crawler traffic trends in 2025, worldwide</i></sup></p><p>Crawling by Anthropic’s ClaudeBot effectively doubled through the first half of the year, but gradually declined during the second half, returning to a level approximately 10% higher than the start of the year. Perplexity’s PerplexityBot crawling traffic grew slowly through January and February, but saw a big jump in activity from mid-March into April. After that, growth was more gradual through October, before seeing a significant increase again in November, winding up about 3.5x higher than where it started the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PgjYaCVUzZgmt23SdKj6q/142ebab34ffbea6dd6770bcebdf2f1d2/BLOG-3077_21_-_image42.png" />
          </figure><p><sup><i>ClaudeBot traffic trends in 2025, worldwide</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hkDU4jX6T7GibKUxDqycO/c0eab7d698916d05ef7314973974ef5d/BLOG-3077_22_-_.png" />
          </figure><p><sup><i>PerplexityBot traffic trends in 2025, worldwide</i></sup></p><p>ByteDance’s Bytespider, one of 2024’s top AI crawlers, saw crawling volume below several other training bots, and its activity dropped across the year, continuing the decline observed last year.</p>
    <div>
      <h3>AI “user action” crawling increased by over 15x in 2025</h3>
      <a href="#ai-user-action-crawling-increased-by-over-15x-in-2025">
        
      </a>
    </div>
    <p>Most AI bot crawling is done for one of three <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-crawler-traffic-by-purpose"><u>purposes</u></a>: training, which gathers Web site content for AI model training; search, which indexes Web site content for search functionality available on AI platforms; and user action, which visits Web sites in response to user questions posed to a chatbot. Note that search crawling may also include crawling for <a href="https://developers.cloudflare.com/ai-search/concepts/what-is-rag/"><u>Retrieval-Augmented Generation (RAG)</u></a>, which enables a content owner to bring their own data into LLM generation without retraining or fine-tuning a model. (A fourth “undeclared” purpose captures traffic from AI bots whose crawling purpose is unclear or unknown.)</p><p>Crawling for model training is responsible for the overwhelming majority of AI crawler traffic, reaching as much as 7-8x search crawling and 32x user action crawling at peak. The training traffic figure is heavily influenced by OpenAI’s GPTBot, and as such, it followed a very similar pattern through the year.</p><p>Crawling for search was strongest through mid-March, when it dropped by approximately 40%. It returned to more gradual growth after that, though it ended the surveyed time period just under 10% lower than the start of the year.</p><p>User action crawling started 2025 with the lowest crawl volume of the three defined purposes, but more than doubled through January and February. It again doubled in early March, and from there, it continued to grow throughout the year, up over 21x from January through early December. This growth maps very closely to the traffic trends seen for OpenAI’s ChatGPT-User bot.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Cs9yjb8rpfwiOgfGmYGxx/7e11b9014a69b84af3b7b25cde4e73ac/BLOG-3077_23_-_ai-crawlpurpose-useraction.png" />
          </figure><p><sup><i>User action crawler traffic trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>While other AI bots accounted for 4.2% of HTML request traffic, Googlebot alone accounted for 4.5%</h3>
      <a href="#while-other-ai-bots-accounted-for-4-2-of-html-request-traffic-googlebot-alone-accounted-for-4-5">
        
      </a>
    </div>
    <p>AI bots have frequently been in the news during 2025 as content owners raise concerns about the amount of traffic that they are generating, especially as much of it <a href="https://blog.cloudflare.com/content-independence-day-no-ai-crawl-without-compensation/"><u>does not translate into</u></a> end users being referred back to the source Web sites. To better understand the impact of AI bot crawling activity, as compared to non-AI bots and human Web usage, we analyzed request traffic for HTML content across Cloudflare’s customer base and <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-traffic-share"><u>classified it</u></a> as coming from a human, an AI bot, or another “non-AI” type of bot. (Note that because we are focusing on just HTML content here, the bot and human shares of traffic will differ from that shown on Radar, which analyzes request traffic for all content types.) Because Googlebot crawls so actively, and is dual-purpose, we have broken its share out separately in this analysis.</p><p>Throughout 2025, we found that traffic from AI bots accounted for an average of 4.2% of HTML requests. The share varied widely throughout the year, dropping as low as 2.4% in early April, and reaching as high as 6.4% in late June.</p><p>To that end, non-AI bots started 2025 responsible for half of requests to HTML pages, seven percentage points above human-generated traffic. This gap grew as wide as 25 percentage points during the first few days of June. However, these traffic shares began to draw closer together starting in mid June, and starting on September 11, entered a period where the human generated share of HTML traffic sometimes exceeded that of non-AI bots. As of December 2, human traffic generated 47% of HTML requests, and non-AI bots generated 44%.</p><p>Googlebot is a particularly voracious crawler, and this year it originated 4.5% of HTML requests, a share slightly larger than AI bots in aggregate. Starting the year at just under 2.5%, its share ramped quickly over the next four months, peaking at 11% in late April. It subsequently fell back towards its starting point over the next several months, and then grew again during the second half of the year, ending with a 5% share. This share shift largely mirrors Googlebot’s crawling activity as discussed above.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69Kmxq3C29UO0AM7yWOJmY/411e1fe6e4799ae08cfdfec8783a8a71/BLOG-3077_24_-_ai-aibottrafficshare.png" />
          </figure><p><sup><i>HTML traffic shares by bot type in 2025, worldwide</i></sup></p>
    <div>
      <h3>Anthropic had the highest crawl-to-refer ratio among the leading AI and search platforms</h3>
      <a href="#anthropic-had-the-highest-crawl-to-refer-ratio-among-the-leading-ai-and-search-platforms">
        
      </a>
    </div>
    <p>We <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/"><u>launched the crawl-to-refer ratio metric on Radar</u></a> on July 1 to track how often a given AI or search platform sends traffic to a site relative to how often it crawls that site. A high ratio means a whole lot of AI crawling without sending actual humans to a Web site.</p><p>It can be a volatile metric, with the values shifting day-by-day as crawl activity and referral traffic change. This <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/#how-does-this-measurement-work"><u>metric compares</u></a> total number of requests from relevant user agents associated with a given search or AI platform where the response was of Content-type: text/html by the total number of requests for HTML content where the Referer header contained a hostname associated with a given search or AI platform. </p><p>Anthropic had the highest <a href="https://radar.cloudflare.com/year-in-review/2025/#crawl-refer-ratio"><u>crawl-to-refer ratios this year</u></a>, reaching as much as 500,000:1, although they were quite erratic from January through May. Both the magnitude and erratic nature of the metric was likely due to sparse referral traffic over that time period. After that, the ratios became more consistent, but remained higher than others, ranging from ~25,000:1 to ~100,000:1.</p><p>OpenAI’s ratios over time were quite spiky, and reached as much as 3,700:1 in March. These shifts may be due to the stabilization of GPTBot crawling activity, coupled with increased usage of ChatGPT search functionality, which includes links back to source Web sites within its responses. Users following those links would increase Referer counts, potentially lowering the ratio. (Assuming that crawl traffic wasn’t increasing at a similar or greater rate.)</p><p>Perplexity had the lowest crawl-to-refer ratios of the major AI platforms, starting the year below 100:1 before spiking in late March above 700:1, concurrent with a spike of crawl traffic seen from PerplexityBot.  Settling back down after the spike, peak ratio values generally remained below 400:1, and below 200:1 from September onwards.</p><p>Among search platforms, Microsoft’s ratio unexpectedly exhibited a cyclical weekly pattern, reaching its lowest levels on Thursdays, and peaking on Sundays. Peak ratio values were generally in the 50:1 to 70:1 range across the year. Starting the year just over 3:1, Google’s crawl-to-refer ratio increased steadily through April, reaching as high as 30:1. After peaking, it fell somewhat erratically through mid-July, dropping back to 3:1, although it has been slowly increasing through the latter half of 2025. DuckDuckGo’s ratio remained below 1:1 for the first three calendar quarters of 2025, but experienced a sudden jump to 1.5:1 in mid-October and stayed elevated for the remainder of the period.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Z0LM4kJGevPxirhokT85o/401363b41b9f5987fe06976197967d9a/BLOG-3077_25_-_ai-crawltoreferratios.png" />
          </figure><p><sup><i>AI &amp; search platform crawl-to-refer ratios in 2025, worldwide</i></sup></p>
    <div>
      <h3>AI crawlers were the most frequently fully disallowed user agents found in robots.txt files</h3>
      <a href="#ai-crawlers-were-the-most-frequently-fully-disallowed-user-agents-found-in-robots-txt-files">
        
      </a>
    </div>
    <p>The robots.txt file, formally defined in <a href="https://www.rfc-editor.org/rfc/rfc9309.html"><u>RFC 9309</u></a> as the Robots Exclusion Protocol, is a text file that content owners can use to signal to Web crawlers which parts of a Web site the crawlers are allowed to access, using directives to explicitly allow or disallow search and AI crawlers from their whole site, or just parts of it. The directives within the file are effectively a “keep out” sign and don’t provide any formal access control. Having said that, Cloudflare’s <a href="https://blog.cloudflare.com/control-content-use-for-ai-training/#putting-up-a-guardrail-with-cloudflares-managed-robots-txt"><u>managed robots.txt</u></a> feature automatically updates a site’s existing robots.txt or creates a robots.txt file on the site that includes directives asking popular AI bot operators to not use the content for AI model training. In addition, our <a href="https://blog.cloudflare.com/ai-audit-enforcing-robots-txt/"><u>AI Crawl Control</u></a> capabilities can track violations of a site’s robots.txt directives, and give the site owner the ability to block requests from the offending user agent.</p><p>On Cloudflare Radar, we provide <a href="https://radar.cloudflare.com/ai-insights#ai-user-agents-found-in-robotstxt"><u>insight</u></a> into the number of robots.txt files found among our top 10,000 <a href="https://radar.cloudflare.com/domains"><u>domains</u></a> and the full/partial disposition of the allow and disallow directives found within the files for selected crawler user agents. (In this context, “full” refers to directives that apply to the whole site, and “partial” refers to directives that apply to specified paths or file types.) <a href="https://radar.cloudflare.com/year-in-review/2025/#robots-txt"><u>Within the Year in Review microsite</u></a>, we show how the disposition of these directives changed over the course of 2025.</p><p>The user agents with the highest number of fully disallowed directives are those associated with <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">AI crawlers</a>, including GPTBot, ClaudeBot, and <a href="https://www.theatlantic.com/technology/2025/11/common-crawl-ai-training-data/684567/"><u>CCBot</u></a>. The directives for Googlebot and Bingbot crawlers, used for both search indexing and AI training, leaned heavily towards partial disallow, likely focused on cordoning off login endpoints and other non-content areas of a site. For these two bots, directives applying to the whole site remained a small fraction of the total number of disallow directives observed through the year. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hCZ4jExApvVaK2CrEulZO/5eb528b8851868d0c90b56e638ffae86/BLOG-3077_26_-_ai-robotstxt-disallow.png" />
          </figure><p><sup><i>Robots.txt disallow directives by user agent</i></sup></p><p>The number of explicit allow directives found across the discovered robots.txt files was a fraction of the observed disallow directives, likely because allow is the default policy, absent any specific directive. Googlebot had the largest number of explicit allow directives, although over half of them were partial allows. Allow directives targeting AI crawlers were found across fewer domains, with directives targeting OpenAI’s crawlers leaning more towards explicit full allows. </p><p><a href="https://developers.google.com/crawling/docs/crawlers-fetchers/google-common-crawlers#google-extended"><u>Google-Extended</u></a> is a user agent token that web publishers can use to manage whether content that Google crawls from their sites may be used for training <a href="https://deepmind.google/models/gemini/"><u>Gemini models</u></a> or providing site content from the Google Search index to Gemini, and the number of allow directives targeting it tripled during the year — most partially allowed access at the start of the year, while the end of the year saw a larger number of directives that explicitly allowed full site access than those that allowed access to just some of the site’s content. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hCZ4jExApvVaK2CrEulZO/5eb528b8851868d0c90b56e638ffae86/BLOG-3077_26_-_ai-robotstxt-disallow.png" />
          </figure><p><sup><i>Robots.txt allow directives by user agent</i></sup></p>
    <div>
      <h3>On Workers AI, Meta’s llama-3-8b-instruct model was the most popular model, and text generation was the most popular task type</h3>
      <a href="#on-workers-ai-metas-llama-3-8b-instruct-model-was-the-most-popular-model-and-text-generation-was-the-most-popular-task-type">
        
      </a>
    </div>
    <p>The AI model landscape is rapidly evolving, with providers regularly releasing more powerful models, capable of tasks like text and image generation, speech recognition, and image classification. Cloudflare collaborates with AI model providers to ensure that <a href="https://developers.cloudflare.com/workers-ai/models/"><u>Workers AI supports these models</u></a> as soon as possible following their release, and we <a href="https://blog.cloudflare.com/replicate-joins-cloudflare/"><u>recently acquired Replicate</u></a> to greatly expand our catalog of supported models. In <a href="https://blog.cloudflare.com/expanded-ai-insights-on-cloudflare-radar/#popularity-of-models-and-tasks-on-workers-ai"><u>February 2025</u></a>, we introduced visibility on Radar into the popularity of publicly available supported <a href="https://radar.cloudflare.com/ai-insights/#workers-ai-model-popularity"><u>models</u></a> as well as the types of <a href="https://radar.cloudflare.com/ai-insights/#workers-ai-task-popularity"><u>tasks</u></a> that these models perform, based on customer account share. </p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#workers-ai-model-and-task-popularity"><u>Throughout the year</u></a>, Meta’s <a href="https://developers.cloudflare.com/workers-ai/models/llama-3-8b-instruct/"><u>llama-3-8b-instruct</u></a> model was dominant, with an account share (36.3%) more than three times larger than the next most popular models, OpenAI’s <a href="https://developers.cloudflare.com/workers-ai/models/whisper/"><u>whisper</u></a> (10.1%) and Stability AI’s <a href="https://developers.cloudflare.com/workers-ai/models/stable-diffusion-xl-base-1.0/"><u>stable-diffusion-xl-base-1.0</u></a> (9.8%). Both Meta and BAAI (Beijing Academy of Artificial Intelligence) had multiple models among the top 10, and the top 10 models had an account share of 89%, with the balance spread across a long tail of other models.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1a3GPm3cqrr0KcK6nCeLRZ/fd5ba576f02518c50fd6efbe312cacae/BLOG-3077_28_-_ai-workersaimostpopularmodels.png" />
          </figure><p><sup><i>Most popular models on Workers AI in 2025, worldwide</i></sup></p><p>Task popularity was driven in large part by the top models, with text generation, text-to-image, and automatic speech recognition topping the list. Text generation was used by 48.2% of Workers AI customer accounts, nearly four times more than the text-to-image share of 12.3% and automatic speech recognition’s 11.0% share. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JxZW6bB7q0kxnzPrh454m/b057fd945ce521aceaf0e8cd27b14f3d/BLOG-3077_29_-_ai-workersaimostpopulartasks.png" />
          </figure><p><sup><i>Most popular tasks on Workers AI in 2025, worldwide</i></sup></p>
    <div>
      <h2>What’s being crawled</h2>
      <a href="#whats-being-crawled">
        
      </a>
    </div>
    <p>In addition to the year-to-date analysis presented above, below we present point-in-time analyses of what is being crawled. Note that these insights are not included in the Year in Review microsite.</p>
    <div>
      <h3>Crawling by geographic region</h3>
      <a href="#crawling-by-geographic-region">
        
      </a>
    </div>
    <p>Within the AI section of Year in Review, we are looking at traffic from AI bots and crawlers globally, without regard for the geography associated with the account that owns the content being crawled. If we drill down a level geographically, using data from October 2025, and look at which bots generate the most crawling traffic for sites owned by customers with a billing address in a given geographic region, we find that Googlebot accounts for between 35% and 55% of crawler traffic in each region.</p><p>OpenAI’s GPTBot or Microsoft’s Bingbot are second most active, with crawling shares of 13-14%. In the developed economies across North America, Europe, and Oceania, Bingbot maintains a solid lead over AI crawlers. But for sites based in fast-growing markets across South America and Asia, GPTBot holds a slimmer lead over Bingbot.</p><table><tr><th><p><b>Geographic region</b></p></th><th><p><b>Top crawlers</b></p></th></tr><tr><td><p>North America</p></td><td><p>Googlebot (45.5%)
Bingbot (14.0%)</p><p>Meta-ExternalAgent (7.7%)</p></td></tr><tr><td><p>South America</p></td><td><p>Googlebot (44.2%)
GPTBot (13.8%)
Bingbot (13.5%)</p></td></tr><tr><td><p>Europe</p></td><td><p>Googlebot (48.6%)
Bingbot (13.2%)
GPTBot (10.8%)</p></td></tr><tr><td><p>Asia</p></td><td><p>Googlebot (39.0%)
GPTBot (14.0%)
Bingbot (12.6%)</p></td></tr><tr><td><p>Africa</p></td><td><p>Googlebot (35.8%)
Bingbot (13.7%)
GPTBot (13.1%)</p></td></tr><tr><td><p>Oceania</p></td><td><p>Googlebot (54.2%)
Bingbot (13.8%)
GPTBot (6.6%)</p></td></tr></table>
    <div>
      <h3>Crawling by industry</h3>
      <a href="#crawling-by-industry">
        
      </a>
    </div>
    <p>In analyzing AI crawler activity by customer industry during October 2025, we found that Retail and Computer Software consistently attracted the most AI crawler traffic, together representing just over 40% of all activity.</p><p>Others in the top 10 accounted for much smaller shares of crawling activity. These top 10 industries accounted for just under 70% of crawling, with the balance spread across a long tail of other industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N55U6SrN7zKkCp66hmhFz/304b038e492e4eda249f3b1fdb664b4a/BLOG-3077_30_-_AI-crawlbyindustry.png" />
          </figure><p><sup><i>Industry share of AI crawling activity, October 2025</i></sup></p>
    <div>
      <h2>Adoption &amp; usage</h2>
      <a href="#adoption-usage">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73LdMVjBBlMOnQGi8LF4oy/f659eaf5d95219e5b54d62b9e16db809/BLOG-3077_31_-_image35.png" />
          </figure>
    <div>
      <h3>iOS devices generated 35% of mobile device traffic globally – and more than half of device traffic in many countries</h3>
      <a href="#ios-devices-generated-35-of-mobile-device-traffic-globally-and-more-than-half-of-device-traffic-in-many-countries">
        
      </a>
    </div>
    <p>The two leading mobile device operating systems globally are <a href="https://en.wikipedia.org/wiki/IOS"><u>Apple’s iOS</u></a> and <a href="https://en.wikipedia.org/wiki/Android_(operating_system)"><u>Google’s Android</u></a>. By analyzing information in the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> header included with each Web request, we can calculate the distribution of traffic by client operating system throughout the year. Android devices generate the majority of mobile device traffic globally, due to the wide distribution of price points, form factors, and capabilities of such devices.</p><p>Globally, the <a href="https://radar.cloudflare.com/year-in-review/2025/#ios-vs-android"><u>share of traffic from iOS</u></a> grew slightly <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>year-over-year</u></a>, up two percentage points to 35% in 2025. Looking at the top countries for iOS traffic share, <a href="https://radar.cloudflare.com/year-in-review/2025/mc#ios-vs-android"><u>Monaco</u></a> had the highest share, at 70%, and iOS drove 50% or more of mobile device traffic in a total of 30 countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2025/dk#ios-vs-android"><u>Denmark</u></a> (65%), <a href="https://radar.cloudflare.com/year-in-review/2025/jp#ios-vs-android"><u>Japan</u></a> (57%), and <a href="https://radar.cloudflare.com/year-in-review/2025/pr#ios-vs-android"><u>Puerto Rico</u></a> (52%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/btCnb93d23FUPVfkupEGb/79574bfd6f045f88d6331caf488f37a5/BLOG-3077_32_-_adoption-iosvsandroid.png" />
          </figure><p><sup><i>Distribution of mobile device traffic by operating system in 2025, worldwide</i></sup></p><p>For countries/regions with higher Android usage, the shares were significantly larger. Twenty-seven had Android adoption above 90% in 2025, with <a href="https://radar.cloudflare.com/year-in-review/2025/pg#ios-vs-android"><u>Papua New Guinea</u></a> the highest at 97%. <a href="https://radar.cloudflare.com/year-in-review/2025/sd#ios-vs-android"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mw#ios-vs-android"><u>Malawi</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/bd#ios-vs-android"><u>Bangladesh</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/et#ios-vs-android"><u>Ethiopia</u></a> also registered an Android share of 95% or more. Android was responsible for 50% or more of mobile device traffic in 175 countries/regions, with the <a href="https://radar.cloudflare.com/year-in-review/2025/bs#ios-vs-android"><u>Bahamas</u></a>’ 51% share placing it at the bottom of that list. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SAm11BSUjgT2uBOfMT4dU/67d85c4786bb8bfe924f92f28956e5b6/BLOG-3077_33_-_adoption-iosvsandroid-map.png" />
          </figure><p><sup><i>Distribution of iOS and Android usage in 2025</i></sup></p>
    <div>
      <h3>The shares of global Web requests using HTTP/3 and HTTP/2 both increased slightly in 2025</h3>
      <a href="#the-shares-of-global-web-requests-using-http-3-and-http-2-both-increased-slightly-in-2025">
        
      </a>
    </div>
    <p>HTTP (HyperText Transfer Protocol) is the protocol that makes the Web work. Over the last 30+ years, it has gone through several major revisions. The first standardized version, <a href="https://datatracker.ietf.org/doc/html/rfc1945"><u>HTTP/1.0</u></a>, was adopted in 1996, <a href="https://www.rfc-editor.org/rfc/rfc2616.html"><u>HTTP/1.1</u></a> in 1999, and <a href="https://www.rfc-editor.org/rfc/rfc7540.html"><u>HTTP/2</u></a> in 2015. <a href="https://www.rfc-editor.org/rfc/rfc9114.html"><u>HTTP/3</u></a>, standardized in 2022, marked a significant update, running on top of a new transport protocol known as <a href="https://blog.cloudflare.com/the-road-to-quic/"><u>QUIC</u></a>. Using QUIC as its underlying transport allows <a href="https://www.cloudflare.com/learning/performance/what-is-http3/"><u>HTTP/3</u></a> to establish connections more quickly, as well as deliver improved performance by mitigating the effects of packet loss and network changes. Because it also provides encryption by default, using HTTP/3 mitigates the risk of attacks. </p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#http-versions"><u>Globally in 2025</u></a>, 50% of requests to Cloudflare were made over HTTP/2, HTTP/1.x accounted for 29%, and the remaining 21% were made via HTTP/3. These shares are largely unchanged <a href="https://radar.cloudflare.com/year-in-review/2024#http-versions"><u>from 2024</u></a> — HTTP/2 and HTTP/3 gained just fractions of a percentage point this year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GdxQoS6Zgx6IPgHapkS8N/07d2d023e2e91f58793e7b4359faa263/BLOG-3077_34_-_adoption-httpversions.png" />
          </figure><p><sup><i>Distribution of traffic by HTTP version in 2025, worldwide</i></sup></p><p>Geographically, usage of HTTP/3 appears to be both increasing and spreading. Last year, we noted that we had found eight countries/regions sending more than a third of their requests over HTTP/3. In 2025, 15 countries/regions sent more than a third of requests over HTTP/3, with Georgia’s 38% adoption just exceeding 2024’s top adoption rate of 37% in Réunion. (Looking at <a href="https://radar.cloudflare.com/adoption-and-usage/ge?dateStart=2025-01-01&amp;dateEnd=2025-12-02"><u>historical data</u></a>, Georgia <a href="https://radar.cloudflare.com/adoption-and-usage/ge?dateStart=2025-01-01&amp;dateEnd=2025-01-07"><u>started the year</u></a> around 46% HTTP/3 adoption, but dropped through the first half of the year before leveling off.) Armenia had the largest increase in HTTP/3 adoption year-over-year, jumping from 25% to 37%. </p><p>Seven countries/regions saw overall HTTP/3 usage levels below 10% due to high levels of bot-originated HTTP/1.x traffic. These include Hong Kong, Dominica, Singapore, Ireland, Iran, Seychelles, and Gibraltar. </p>
    <div>
      <h3>JavaScript-based libraries and frameworks remained integral tools for building Web sites</h3>
      <a href="#javascript-based-libraries-and-frameworks-remained-integral-tools-for-building-web-sites">
        
      </a>
    </div>
    <p>To deliver a modern Web site, developers must capably integrate a growing collection of libraries and frameworks with third-party tools and platforms. All of these components must work together to ensure a performant, feature-rich, problem-free user experience. As in past years, we used <a href="https://radar.cloudflare.com/scan"><u>Cloudflare Radar’s URL Scanner</u></a> to scan Web sites associated with the <a href="https://radar.cloudflare.com/domains"><u>top 5,000 domains</u></a> to identify the <a href="https://radar.cloudflare.com/year-in-review/2025/#website-technologies"><u>most popular technologies and services</u></a> used across eleven categories. </p><p><a href="https://jquery.com/"><u>jQuery</u></a> is self-described as a fast, small, and feature-rich JavaScript library, and our scan found it on 8x as many sites as <a href="https://kenwheeler.github.io/slick/"><u>Slick</u></a>, a JavaScript library used to display image carousels. <a href="https://react.dev/"><u>React</u></a> remained the top JavaScript framework used for building Web interfaces, found on twice as many scanned sites as <a href="https://vuejs.org/"><u>Vue.js</u></a>. PHP, node.js, and Java remained the most popular programming languages/technologies, holding a commanding lead over other languages, including Ruby, Python, Perl, and C.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QBZ6xnDPw9i3y7EBhTqsd/f232925caf1cf3caa91e80a4e16d5ba8/BLOG-3077_35_-_adoption-websitetechnologies.png" />
          </figure><p><sup><i>Top Web site technologies, JavaScript libraries category in 2025</i></sup></p><p><a href="https://wordpress.org/"><u>WordPress</u></a> remained the most popular content management system (CMS), though its share of scanned sites dropped to 47%, with the difference distributed across gains seen by multiple challengers. <a href="https://www.hubspot.com/"><u>HubSpot</u></a> and <a href="https://business.adobe.com/products/marketo.html"><u>Marketo</u></a> remained the top marketing automation platforms, with a combined share 10% higher YoY. Among A/B testing tools, <a href="https://vwo.com/"><u>VWO</u></a>’s share grew by eight percentage points year-over-year, extending its lead over <a href="https://www.optimizely.com/"><u>Optimizely</u></a>, while <a href="https://support.google.com/analytics/answer/12979939?hl=en"><u>Google Optimize</u></a>, which was sunsetted in September 2023, saw its share fall from 14% to 4%.</p>
    <div>
      <h3>One-fifth of automated API requests were made by Go-based clients</h3>
      <a href="#one-fifth-of-automated-api-requests-were-made-by-go-based-clients">
        
      </a>
    </div>
    <p>Application programming interfaces (APIs) are the foundation of modern dynamic Web sites and both Web-based and native applications. These sites and applications rely heavily on automated API calls to provide customized information. Analyzing the Web traffic protected and delivered by Cloudflare, we can identify requests being made to API endpoints. By applying heuristics to these API-related requests determined to not be coming from a person using a browser or native mobile application, we can identify the <a href="https://radar.cloudflare.com/year-in-review/2025/#api-client-language-popularity"><u>top languages used to build API clients</u></a>.</p><p>In 2025, 20% of automated API requests were made by Go-based clients, representing significant growth from Go’s 12% share in 2024. Python’s share also increased year-over-year, growing from 9.6% to 17%. Java jumped to third place, reaching an 11.2% share, up from 7.4% in 2024. <a href="http://node.js"><u>Node.js</u></a>, last year’s second-most popular language, saw its share fall to just 8.3% in 2025, pushing it down to fourth place, while .NET remained at the bottom of the top five, dropping to just 2.3%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tntP1mMqqsH5Bjj0r6xyc/0b03ad6b7257b7b935e102d78ec6bdb4/BLOG-3077_36_-_image56.png" />
          </figure><p><sup><i>Most popular automated API client languages in 2025</i></sup></p>
    <div>
      <h3>Google remains the top search engine, with Yandex, Bing, and DuckDuckGo distant followers</h3>
      <a href="#google-remains-the-top-search-engine-with-yandex-bing-and-duckduckgo-distant-followers">
        
      </a>
    </div>
    <p>Cloudflare is in a unique position to measure <a href="https://radar.cloudflare.com/year-in-review/2025/#search-engine-market-share"><u>search engine market share</u></a> because we protect websites and applications for millions of customers. To that end, since the fourth quarter of 2021, we have been publishing quarterly <a href="https://radar.cloudflare.com/reports"><u>reports</u></a> on this data. We use the HTTP <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer"><u>referer header</u></a> to identify the search engine sending traffic to customer sites and applications, and present the market share data as an overall aggregate, as well as broken out by device type and operating system. (Device type and operating system insights are based on the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> HTTP request headers.)</p><p>Globally, Google referred the most traffic to sites protected and delivered by Cloudflare, with a nearly 90% share in 2025. The other search engines in the top 5 include Bing (3.1%), Yandex (2.0%), Baidu (1.4%), and DuckDuckGo (1.2%). Looking at trends across the year, Yandex dropped from a 2.5% share in May to a 1.5% share in July, while Baidu grew from 0.9% in April to 1.6% in June.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7As9GnMsW9ru3h0RaH0zoX/55e396801f33af890b24aa871f989be5/BLOG-3077_37_-_adoption-searchenginemarketshare.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, worldwide</i></sup></p><p>Yandex users are primarily based in <a href="https://radar.cloudflare.com/year-in-review/2025/ru#search-engine-market-share"><u>Russia</u></a>, where the domestic platform holds a 65% market share, almost double that of Google at 34%. In the <a href="https://radar.cloudflare.com/year-in-review/2025/cz#search-engine-market-share"><u>Czech Republic</u></a>, users prefer Google (84%), but local search engine Seznam’s 7.7% share is a strong showing compared to the second place search engines in other countries. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fUk9r7hXP0SaMiFiFa3UK/ea4e213f4ac2fb55273e731eacdc10a4/BLOG-3077_38_-_adoption-searchenginemarketshare-czechrepublic.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, Czech Republic</i></sup></p><p>For traffic from “desktop” systems aggregated globally, Google’s market share drops to about 80%, while Bing’s jumps to nearly 11%. This is likely driven by the continued market dominance of Windows-based systems: On Windows, Google refers just 76% of traffic, while Bing refers about 14%. For traffic from mobile devices, Google holds almost 93% of market share, with the same share seen for traffic from both Android and iOS devices.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ATWm3D3Jp8v0Pob2qibkw/71869e620f0ec7fb42e636d8da6840d7/BLOG-3077_39_-_adoption-searchenginemarketshare-windows.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, Windows-based systems</i></sup></p><p>For additional details, including search engines aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/search-engines"><u>Search Engine Referral Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h3>Chrome remains the top browser across platforms and operating systems – except on iOS, where Safari has the largest share</h3>
      <a href="#chrome-remains-the-top-browser-across-platforms-and-operating-systems-except-on-ios-where-safari-has-the-largest-share">
        
      </a>
    </div>
    <p>Cloudflare is also in a unique position to measure <a href="https://radar.cloudflare.com/year-in-review/2025/#browser-market-share"><u>browser market share</u></a>, and we have been publishing quarterly <a href="https://radar.cloudflare.com/reports"><u>reports</u></a> on the topic for several years. To identify the browser and associated operating system making content requests, we use information from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> HTTP headers. We present browser market share data as an overall aggregate, as well as broken out by device type and operating system. Note that the shares of browsers available on both desktop and mobile devices, such as Google Chrome or Apple Safari, are presented in aggregate.</p><p>Globally, two-thirds of request traffic to Cloudflare came from Chrome in 2025, similar to its share last year. Safari, available exclusively on Apple devices, was the second most-popular browser, with a 15.4% market share. They were followed by Microsoft Edge (7.4%), Mozilla Firefox (3.7%) and Samsung Internet (2.3%). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NH8hVOr8lxytXTdrCARAk/ac7173e80db1b39da11c2564a3ae4980/BLOG-3077_40_-_adoption-browsermarketshare.png" />
          </figure><p><sup><i>Overall browser market share in 2025, worldwide</i></sup></p><p>In <a href="https://radar.cloudflare.com/year-in-review/2025/ru#browser-market-share"><u>Russia</u></a>, Chrome remains the most popular with a 44% share, but the domestic Yandex Browser comes in a strong second with a 33% market share, as compared to the sub-10% shares for Safari, Edge, and Opera. Interestingly, the Yandex Browser actually beat Chrome by a percentage point (39% to 38%) in June before giving up significant market share to Chrome as the year progressed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PGmYbREZR4xvALWdrRqzF/737b9550291d3d5cacfc85cbe72e3551/BLOG-3077_41_-_adoption-browsermarketshare-Russia.png" />
          </figure><p><sup><i>Overall browser market share in 2025, Russia</i></sup></p><p>As the default browser on iOS, Safari is far and away the most popular on such devices, with a 79% market share, four times Chrome’s 19% share. Less than 1% of requests come from DuckDuckGo, Firefox, and QQ Browser (developed in China by Tencent). In contrast, on Android, 85% of requests are from Chrome, while vendor-provided Samsung Internet is a distant second with a 6.6% share. Huawei Browser, another vendor-provided browser, is third at just 1%. And despite being the default browser on Windows, Edge’s 19% share pales in comparison to Chrome, which leads with a 69% share on that operating system.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zXj6HWrNSNdAWnDXIrLc5/79b47c9671a1c7691b1fde68749d5812/BLOG-3077_42_-_adoption-browsermarketshare-ios.png" />
          </figure><p><sup><i>Overall browser market share in 2025, iOS devices</i></sup></p><p>For additional details, including browsers aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/browser"><u>Browser Market Share Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h2>Connectivity</h2>
      <a href="#connectivity">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZkJ7IDSXBHzKnK9RSNHsY/f042e40576b2380a77282831fe194398/BLOG-3077_43_-_image13.png" />
          </figure>
    <div>
      <h3>Almost half of the 174 major Internet outages observed around the world in 2025 were due to government-directed regional and national shutdowns of Internet connectivity</h3>
      <a href="#almost-half-of-the-174-major-internet-outages-observed-around-the-world-in-2025-were-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity">
        
      </a>
    </div>
    <p>Internet outages continue to be an ever-present threat, and the potential impact of these outages continues to grow, as they can lead to economic losses, disrupted educational and government services, and limited communications. During 2025, we covered significant Internet disruptions and their associated causes in our quarterly summary posts (<a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/"><u>Q3</u></a>) as well standalone posts covering major outages in <a href="https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/"><u>Portugal &amp; Spain</u></a> and <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><u>Afghanistan</u></a>. The <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> tracks these Internet outages, and uses Cloudflare traffic data for insights into their scope and duration.</p><p>Nearly half of the <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-outages"><u>observed outages</u></a> this year were related to Internet shutdowns intended to prevent cheating on academic exams. Countries including <a href="https://x.com/CloudflareRadar/status/1930310203083210760"><u>Iraq</u></a>, <a href="https://x.com/CloudflareRadar/status/1952002641896288532"><u>Syria</u></a>, and <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#sudan"><u>Sudan</u></a> again implemented regular multi-hour shutdowns over the course of several weeks during exam periods. Other government-directed shutdowns in <a href="https://x.com/CloudflareRadar/status/1924531952993841639"><u>Libya</u></a> and <a href="https://x.com/CloudflareRadar/status/1983502557868666900"><u>Tanzania</u></a> were implemented in response to protests and civil unrest, while in <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><u>Afghanistan</u></a>, the Taliban ordered the shutdown of fiber optic Internet connectivity in multiple provinces as part of a drive to “prevent immorality.”</p><p>Cable cuts, affecting both submarine and domestic fiber optic infrastructure, were also a leading cause of Internet disruptions in 2025. These cuts resulted in network providers in countries/regions including the <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#texas-united-states"><u>United States</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#south-africa"><u>South Africa</u></a>, <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#digicel-haiti"><u>Haiti</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#pakistan-united-arab-emirates"><u>Pakistan</u></a>, and <a href="https://x.com/CloudflareRadar/status/1910709632756019219"><u>Hong Kong</u></a> experiencing service disruptions lasting from several hours to several days. Other notable outages include one caused by a <a href="https://bsky.app/profile/radar.cloudflare.com/post/3ltf6jtxd5s2p"><u>fire</u></a> in a telecom building in Cairo, Egypt, which disrupted Internet connectivity across multiple service providers for several days, and another in <a href="https://x.com/CloudflareRadar/status/1983188999461319102"><u>Jamaica</u></a>, where damage caused by Hurricane Melissa resulted in lower Internet traffic from the island for over a week.</p><p>Within the <a href="https://radar.cloudflare.com/year-in-review/2025#internet-outages"><u>timeline</u></a> on the Year in Review microsite, hovering over a dot will display information about that outage, and clicking on it will link to additional insights.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gC9MsV4mObyNllxyQPzDy/cfe5dcee5e751e00309f7b4f6902a03e/BLOG-3077_44_-_connectivity-internetoutages.png" />
          </figure><p><sup><i>Over 170 major Internet outages were observed around the world during 2025</i></sup></p>
    <div>
      <h3>Globally, less than a third of dual-stack requests were made over IPv6, while in India, over two-thirds were</h3>
      <a href="#globally-less-than-a-third-of-dual-stack-requests-were-made-over-ipv6-while-in-india-over-two-thirds-were">
        
      </a>
    </div>
    <p>Available IPv4 address space has been largely exhausted <a href="https://ipv4.potaroo.net/"><u>for a decade or more</u></a>, though solutions like <a href="https://en.wikipedia.org/wiki/Network_address_translation"><u>Network Address Translation</u></a> have enabled network providers to stretch limited IPv4 resources. This has served in part to slow the adoption of <a href="https://www.rfc-editor.org/rfc/rfc1883"><u>IPv6</u></a>, designed in the mid-1990s as a successor protocol to IPv4, and offers an expanded address space intended to better support the expected growth in the number of Internet-connected devices.</p><p>For nearly 15 years, Cloudflare has been a vocal and active advocate for IPv6 as well, launching solutions including <a href="https://blog.cloudflare.com/introducing-cloudflares-automatic-ipv6-gatewa/"><u>Automatic IPv6 Gateway</u></a> in 2011, which enabled free IPv6 support for all of our customers and <a href="https://blog.cloudflare.com/i-joined-cloudflare-on-monday-along-with-5-000-others"><u>IPv6 support by default for all of our customers</u></a> in 2014. Simplistically, server-side support is only half of what is needed to drive IPv6 adoption, because end user connections need to support it as well. By aggregating and analyzing the IP version used for requests made to Cloudflare across the year, we can get insight into the distribution of traffic across IPv6 and IPv4.</p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#ipv6-adoption"><u>Globally</u></a>, 29% of IPv6-capable (“<a href="https://www.techopedia.com/definition/19025/dual-stack-network"><u>dual-stack</u></a>”) requests for content were made over IPv6, up a percentage point from <a href="https://radar.cloudflare.com/year-in-review/2024#ipv6-adoption"><u>28% in 2024</u></a>. India again topped the list with an IPv6 adoption rate of 67%, followed by just three other countries/regions (<a href="https://radar.cloudflare.com/year-in-review/2025/my#ipv6-adoption"><u>Malaysia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/sa#ipv6-adoption"><u>Saudi Arabia</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/uy#ipv6-adoption"><u>Uruguay</u></a>) that also made more than half of such requests over IPv6, the same as last year. Some of the largest gains were seen in <a href="https://radar.cloudflare.com/year-in-review/2025/bz#ipv6-adoption"><u>Belize</u></a>, which grew from 4.3% to 24% year-over-year, and <a href="https://radar.cloudflare.com/year-in-review/2025/qa#ipv6-adoption"><u>Qatar</u></a>, which saw its adoption nearly double to 33% in 2025. Unfortunately, some countries/regions still lag the leaders, with 94 seeing adoption rates below 10%, including <a href="https://radar.cloudflare.com/year-in-review/2025/ru#ipv6-adoption"><u>Russia</u></a> (8.6%), <a href="https://radar.cloudflare.com/year-in-review/2025/ie#ipv6-adoption"><u>Ireland</u></a> (6.5%), and <a href="https://radar.cloudflare.com/year-in-review/2025/hk#ipv6-adoption"><u>Hong Kong</u></a> (3.0%). Even further behind are the 20 countries/regions with adoption rates below 1%, including <a href="https://radar.cloudflare.com/year-in-review/2025/tz#ipv6-adoption"><u>Tanzania</u></a> (0.9%), <a href="https://radar.cloudflare.com/year-in-review/2025/sy#ipv6-adoption"><u>Syria</u></a> (0.3%), and <a href="https://radar.cloudflare.com/year-in-review/2025/gi#ipv6-adoption"><u>Gibraltar</u></a> (0.1%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NkFC1eLbAPdpJv6WPkvHT/26a260f8068656f8ed4aa0a28009a5d9/BLOG-3077_45_-_connectivity-ipv6.png" />
          </figure><p><sup><i>Distribution of traffic by IP version in 2025, worldwide</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Mzu2k3Xs1YZVNhpZpx9xH/23d19f5057b52690e2def65bc2c9c64a/BLOG-3077_46_-_connectivity-ipv6-top5.png" />
          </figure><p><sup><i>Top five countries for IPv6 adoption in 2025</i></sup></p>
    <div>
      <h3>European countries had some of the highest download speeds, all above 200 Mbps. Spain remained consistently among the top locations across measured Internet quality metrics</h3>
      <a href="#european-countries-had-some-of-the-highest-download-speeds-all-above-200-mbps-spain-remained-consistently-among-the-top-locations-across-measured-internet-quality-metrics">
        
      </a>
    </div>
    <p>Over the past decade or so, we have turned to Internet speed tests for many purposes: keeping our service providers honest, troubleshooting a problematic connection, or showing off a particularly high download speed on social media. In fact, we’ve become conditioned to focus on download speeds as the primary measure of a connection’s quality. While it is absolutely an important metric, for increasingly popular use cases — like videoconferencing, live-streaming, and online gaming — strong upload speeds and low latency are also critical. However, even when Internet providers offer service tiers that include high symmetric speeds and lower latency, consumer adoption is often mixed due to cost, availability, or other issues.</p><p>Tests on <a href="https://speed.cloudflare.com/"><u>speed.cloudflare.com</u></a> measure both download and upload speeds, as well as loaded and unloaded latency. By aggregating the results of <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-quality"><u>tests taken around the world during 2025</u></a>, we can get a country/region perspective on average values for these <a href="https://developers.cloudflare.com/radar/glossary/#connection-quality"><u>connection quality</u></a> metrics, as well as insight into the distribution of the measurements.</p><p>Europe was well-represented among those with the highest average download speeds in 2025. <a href="https://radar.cloudflare.com/year-in-review/2025/es#internet-quality"><u>Spain</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/hu#internet-quality"><u>Hungary</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/pt#internet-quality"><u>Portugal</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/dk#internet-quality"><u>Denmark</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ro#internet-quality"><u>Romania</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/fr#internet-quality"><u>France</u></a> were all in the top 10, with both Spain and Hungary averaging download speeds above 300 Mbps. Spain’s average grew by 25 Mbps from 2024, while Hungary’s jumped 46 Mbps. Meanwhile, Asian countries had many of the highest average upload speeds, with <a href="https://radar.cloudflare.com/year-in-review/2025/kr#internet-quality"><u>South Korea</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mo#internet-quality"><u>Macau</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/sg#internet-quality"><u>Singapore</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/jp#internet-quality"><u>Japan</u></a> reaching the top 10, all seeing averages in excess of 130 Mbps.</p><p>But it was Spain that topped the list for the upload metric as well at 206 Mbps, up 13 Mbps from 2024. The country’s strong showing across both speed metrics is potentially attributable to <a href="https://commission.europa.eu/projects/unico-broadband_en"><u>“UNICO-Broadband,”</u></a> a “<i>call for projects by telecommunications operators aiming at the deployment of high-speed broadband infrastructure capable of providing services at symmetric speeds of at least 300 Mbps, scalable at 1 Gbps,</i>” which aimed to cover 100 % of the population in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pZCAQEMEmbUjXkIUzAwUP/8aec93e96debe19d496396a6e6cd1db7/BLOG-3077_47_-_connectivity-downloadspeeds.png" />
          </figure><p><sup><i>Countries/regions with the highest download speeds in 2025, worldwide</i></sup></p><p>As noted above, low latency connections are needed to provide users with good <a href="https://www.screenbeam.com/wifihelp/wifibooster/how-to-reduce-latency-or-lag-in-gaming-2/#:~:text=Latency%20is%20measured%20in%20milliseconds,%2C%2020%2D40ms%20is%20optimal."><u>gaming</u></a> and <a href="https://www.haivision.com/glossary/video-latency/#:~:text=Low%20latency%20is%20typically%20defined,and%20streaming%20previously%20recorded%20events."><u>videoconferencing/streaming</u></a> experiences. The <a href="https://blog.cloudflare.com/introducing-radar-internet-quality-page/#connection-speed-quality-data-is-important"><u>latency metric</u></a> can be broken down into loaded and idle latency. The former measures latency on a loaded connection, where bandwidth is actively being consumed, while the latter measures latency on an “idle” connection, when there is no other network traffic present. (These definitions are from the speed test application’s perspective.) </p><p>In 2025, a number of European countries were among those with both the lowest idle and loaded latencies. For average idle latency, <a href="https://radar.cloudflare.com/year-in-review/2025/is#internet-quality"><u>Iceland</u></a> measured the lowest at 13 ms, just 2 ms better than <a href="https://radar.cloudflare.com/year-in-review/2025/md#internet-quality"><u>Moldova</u></a>. In addition to these two, <a href="https://radar.cloudflare.com/year-in-review/2025/pt#internet-quality"><u>Portugal</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/es#internet-quality"><u>Spain</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/hu#internet-quality"><u>Hungary</u></a> also ranked among the top 10, all with average idle latencies below 20 ms. Moldova topped the list of countries/regions with the lowest average loaded latency, at 73 ms. Hungary, Spain, <a href="https://radar.cloudflare.com/year-in-review/2025/be#internet-quality"><u>Belgium</u></a>, Portugal, <a href="https://radar.cloudflare.com/year-in-review/2025/sk#internet-quality"><u>Slovakia</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/si#internet-quality"><u>Slovenia</u></a> were also part of the top 10, all with average loaded latencies below 100 ms.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4yFdtVsghuBNrCe0sqdEuS/1ed59c6a972f2c511ed567ef69863f39/BLOG-3077_48_-_connectivity-latency-moldova.png" />
          </figure><p><sup><i>Measured idle/loaded latency, Moldova</i></sup></p>
    <div>
      <h3>London and Los Angeles were hotspots for Cloudflare speed test activity in 2025</h3>
      <a href="#london-and-los-angeles-were-hotspots-for-cloudflare-speed-test-activity-in-2025">
        
      </a>
    </div>
    <p>As we discussed above, the speed test at <a href="http://speed.cloudflare.com"><u>speed.cloudflare.com</u></a> measures a user’s connection speeds and latency. We reviewed the aggregate findings from those tests, highlighting the countries/regions with the best results. However, we also wondered about test activity around the world -– where are users most concerned about their connection quality, and how frequently do they perform tests? <a href="https://radar.cloudflare.com/year-in-review/2025/#speed-tests"><u>A new animated Year in Review visualization illustrates speed test activity</u></a>, aggregated weekly.</p><p>Data is aggregated at a regional level and the associated activity is plotted on the map, with circles sized based on the number of tests taken each week. Note that locations with fewer than 100 speed tests per week are not plotted. Looking at test volume across the year, the greater London and Los Angeles areas were most active, as were Tokyo and Hong Kong and several U.S. cities.</p><p>Animating the graph to see changes across the year, a number of week-over-week surges in test volume are visible. These include in the Nairobi, Kenya, area during the seven-day period ending June 10; in the Tehran, Iran, area the period ending July 29; across multiple areas in Russia the period ending August 5; and in the Karnataka, India, area the period ending October 28. It isn’t clear what drove these increases in test volume — the <a href="https://radar.cloudflare.com/outage-center?dateStart=2025-01-01&amp;dateEnd=2025-12-02"><u>Cloudflare Radar Outage Center</u></a> does not show any observed Internet outages impacting those areas around those times, so it is unlikely to be subscribers testing the restoration of connectivity.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73PtVEdvkENBbF5O8qD8ij/482d15f05359cbf6ae24fb606ed61793/BLOG-3077_49_-_connectivity-globalspeedtestactivity.png" />
          </figure><p><sup><i>Cloudflare speed test activity by location in 2025</i></sup></p>
    <div>
      <h3>More than half of request traffic comes from mobile devices in 117 countries/regions</h3>
      <a href="#more-than-half-of-request-traffic-comes-from-mobile-devices-in-117-countries-regions">
        
      </a>
    </div>
    <p>For better or worse, over the last quarter-century, mobile devices have become an indispensable part of everyday life. Adoption varies around the world — statistics from <a href="https://blogs.worldbank.org/en/voices/Mobile-phone-ownership-is-widespread-Why-is-digital-inclusion-still-lagging"><u>the World Bank</u></a> show multiple countries/regions with mobile phone ownership above 90%, while in several others, ownership rates are below 10%, as of October 2025. In some countries/regions, mobile devices primarily connect to the Internet via Wi-Fi, while other countries/regions are “mobile first,” where 4G/5G services are the primary means of Internet access.</p><p>Information contained within the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> header included with each request to Cloudflare enables us to categorize it as coming from a mobile, desktop, or other type of device. <a href="https://radar.cloudflare.com/year-in-review/2025/#mobile-vs-desktop"><u>Aggregating this categorization globally across 2025</u></a> found that 43% of requests were from mobile devices, up from <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>41% in 2024</u></a>. The balance came from “classic” laptop and desktop type devices. Similar to an observation <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices"><u>made last year</u></a>, these traffic shares were in line with those measured in Year in Review reports dating back to 2022, suggesting that mobile device usage has achieved a “steady state.”</p><p>In 117 countries/regions, more than half of requests came from mobile devices, led by <a href="https://radar.cloudflare.com/year-in-review/2025/sd#mobile-vs-desktop"><u>Sudan</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/mw#mobile-vs-desktop"><u>Malawi</u></a> at 75% and 74% respectively. Five other African countries/regions — <a href="https://radar.cloudflare.com/year-in-review/2025/sz#mobile-vs-desktop"><u>Eswatini (Swaziland)</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ye#mobile-vs-desktop"><u>Yemen</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/bw#mobile-vs-desktop"><u>Botswana</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mz#mobile-vs-desktop"><u>Mozambique</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/so#mobile-vs-desktop"><u>Somalia</u></a> — also had mobile request shares above 70% in 2025, in line with <a href="https://voxdev.org/topic/understanding-mobile-phone-and-internet-use-across-world"><u>strong mobile phone ownership</u></a> in the region. Among countries/regions with low mobile device traffic share, <a href="https://radar.cloudflare.com/year-in-review/2025/gi#mobile-vs-desktop"><u>Gibraltar</u></a> was the only one below 10% (at 5.1%), with just six others originating less than a quarter of requests from mobile devices. This is fewer than in <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>2024</u></a>, when a dozen countries/regions had a mobile share below 25%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fcUaDzUxKouChLsJzfQf5/13e3eb93633c6d5ed017378022218505/BLOG-3077_50_-_connectivity-mobiledesktop.png" />
          </figure><p><sup><i>Distribution of traffic by device type in 2025, worldwide</i></sup></p><p><sup><i></i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6X1wD6uZUA4eB5vyf3vwl6/72a9445980b21e2917424eca151c77b4/BLOG-3077_51_-_connectivity-mobiledesktop-map.png" />
          </figure><p><sup><i>Global distribution of traffic by device type in 2025</i></sup></p>
    <div>
      <h2>Security</h2>
      <a href="#security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1X1yOLxEicpVw5U4ukcAQF/f7d0b02841a8220151a66cd6f0226302/BLOG-3077_52_-_image18.png" />
          </figure>
    <div>
      <h3>6% of global traffic over Cloudflare’s network was mitigated by our systems — either as potentially malicious or for customer-defined reasons</h3>
      <a href="#6-of-global-traffic-over-cloudflares-network-was-mitigated-by-our-systems-either-as-potentially-malicious-or-for-customer-defined-reasons">
        
      </a>
    </div>
    <p>Cloudflare automatically mitigates attack traffic targeting customer websites and applications using <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS</u></a> mitigation techniques or <a href="https://developers.cloudflare.com/waf/managed-rules/"><u>Web Application Firewall (WAF) Managed Rules</u></a>, protecting them from a variety of threats posed by malicious actors. We also enable customers to mitigate traffic, even if it isn’t malicious, using techniques like <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/"><u>rate-limiting</u></a> requests or <a href="https://developers.cloudflare.com/waf/tools/ip-access-rules/"><u>blocking all traffic from a given location</u></a>. The need to do so may be driven by regulatory or business requirements. We looked at the overall share of traffic to Cloudflare’s network throughout 2025 that was mitigated for any reason, as well as the share that was blocked as a DDoS attack or by WAF Managed Rules.</p><p>This year, <a href="https://radar.cloudflare.com/year-in-review/2025/#mitigated-traffic"><u>6.2% of global traffic was mitigated</u></a>, down a quarter of a percentage point <a href="https://radar.cloudflare.com/year-in-review/2024#mitigated-traffic"><u>from 2024</u></a>. 3.3% of traffic was mitigated as a DDoS attack, or by managed rules, up one-tenth of a percentage point year over year. General mitigations were applied to more than 10% of the traffic coming from over 30 countries/regions, while 14 countries/regions had DDoS/WAF mitigations applied to more than 10% of originated traffic. Both counts were down in comparison to 2024. </p><p>Equatorial Guinea had the largest shares of mitigated traffic with 40% generally mitigated and 29% with DDoS/WAF mitigations applied. These shares grew over the last year, from 26% (general) and 19% (DDoS/WAF). In contrast, Dominica had the smallest shares of mitigated traffic, with just 0.7% of traffic mitigated, with DDoS/WAF mitigations applied to just 0.1%.</p><p>The large increase in mitigated traffic seen during July in the graph below is due to a very large DDoS attack campaign that primarily targeted a single Cloudflare customer domain.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xzs0onu96x2qCwGRNHrPW/a730564c03b600f793ae92df8ad38ee8/BLOG-3077_53_-_security-mitigatedtraffic.png" />
          </figure><p><sup><i>Mitigated traffic trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>40% of global bot traffic came from the United States, with Amazon Web Services and Google Cloud originating a quarter of global bot traffic</h3>
      <a href="#40-of-global-bot-traffic-came-from-the-united-states-with-amazon-web-services-and-google-cloud-originating-a-quarter-of-global-bot-traffic">
        
      </a>
    </div>
    <p>A <a href="https://developers.cloudflare.com/bots/concepts/bot/"><u>bot</u></a> is a software application programmed to do certain tasks, and Cloudflare uses advanced <a href="https://blog.cloudflare.com/bots-heuristics/"><u>heuristics</u></a> to differentiate between bot traffic and human traffic, <a href="https://developers.cloudflare.com/bots/concepts/bot-score/"><u>scoring</u></a> each request on the likelihood that it originates from a bot or a human user. By monitoring traffic suspected to be from bots, site and application owners can spot and, if necessary, block potentially malicious activity. However, not all bots are malicious — bots can also be helpful, and Cloudflare maintains a <a href="https://radar.cloudflare.com/bots/directory?kind=all"><u>directory of verified bots</u></a> that includes those used for things like <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_CRAWLER&amp;kind=all"><u>search engine indexing</u></a>, <a href="https://radar.cloudflare.com/bots/directory?category=SECURITY&amp;kind=all"><u>security scanning</u></a>, and <a href="https://radar.cloudflare.com/bots/directory?category=MONITORING_AND_ANALYTICS&amp;kind=all"><u>site/application monitoring</u></a>. Regardless of intent, we analyzed <a href="https://radar.cloudflare.com/year-in-review/2025/#bot-traffic-sources"><u>where bot traffic was originating from in 2025</u></a>, using the IP address of a request to identify the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a>) and country/region associated with the bot making the request. </p><p>Globally, the top 10 countries/regions accounted for 71% of observed bot traffic. Forty percent originated from the United States, far ahead of Germany’s 6.5% share. The US share was up over five percentage points <a href="https://radar.cloudflare.com/year-in-review/2024#bot-traffic-sources"><u>from 2024</u></a>, while Germany’s share was down a fraction of a percentage point. The remaining countries in the top 10 all contributed bot traffic shares below 5% in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29tI5aXT8HeRwmzHMyFaTt/0081d745e48499966611a4d2f3a14f2e/BLOG-3077_54_-_security-bottraffic-countries.png" />
          </figure><p><sup><i>Global bot traffic distribution by source country/region in 2025</i></sup></p><p>Looking at bot traffic by network, we found that cloud platforms remained among the leading sources. This is due to a number of factors, including the ease of using automated tools to quickly provision compute resources, their relatively low cost, their broadly distributed geographic footprints, and the platforms’ high-bandwidth Internet connectivity. </p><p>Two autonomous systems associated with Amazon Web Services accounted for a total of 14.4% of observed bot traffic, and two associated with Google Cloud were responsible for a combined 9.7% of bot traffic. They were followed by Microsoft Azure, which originated 5.5% of bot traffic. The shares from all three platforms were up as compared to 2024. These cloud platforms have a strong regional data center presence in many of the countries/regions in the top 10. Elsewhere, around the world, local telecommunications providers frequently accounted for the largest shares of automated bot traffic observed in those countries/regions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NCt3TgkYWbl9cQmZH2QZW/3ed0e512bdff74025dd34744b989dc41/BLOG-3077_55_-_security-bottraffic-asns.png" />
          </figure><p><sup><i>Global bot traffic distribution by source network in 2025</i></sup></p>
    <div>
      <h3>Organizations in the "People and Society” vertical were the most targeted during 2025</h3>
      <a href="#organizations-in-the-people-and-society-vertical-were-the-most-targeted-during-2025">
        
      </a>
    </div>
    <p>Attackers are constantly shifting their tactics and targets, mixing things up in an attempt to evade detection, or based on the damage they intend to cause. They may try to cause financial harm to businesses by targeting ecommerce sites during a busy shopping period, make a political statement by attacking government-related or civil society sites, or attempt to knock opponents offline by attacking a game server. To identify vertical-targeted attack activity during 2025, we analyzed mitigated traffic for customers that had an associated industry and vertical within their customer record. Mitigated traffic was aggregated weekly by source country/region across 17 target verticals.</p><p>Organizations in the "People and Society” vertical were the <a href="https://radar.cloudflare.com/year-in-review/2025/#most-attacked-industries"><u>most targeted across the year</u></a>, with 4.4% of global mitigated traffic targeting the vertical. Customers classified as “People and Society” include religious institutions, nonprofit organizations, civic &amp; social organizations, and libraries. The vertical started out the year with under 2% of mitigated traffic, but saw the share jump to 10% the week of March 5, and increase to over 17% by the end of the month. Other attack surges targeting these sites occurred in late April (to 19.1%) and early July (to 23.2%). Many of these types of organizations are protected by Cloudflare’s Project Galileo, and <a href="https://blog.cloudflare.com/celebrating-11-years-of-project-galileo-global-impact/"><u>this blog post</u></a> details the attacks and threats they experienced in 2024 and 2025.</p><p>Gambling/Games, the <a href="https://radar.cloudflare.com/year-in-review/2024#most-attacked-industries"><u>most-targeted vertical last year</u></a>, saw its share of mitigated attacks drop by more than half year-over-year, to just 2.6%. While one might expect to see attacks targeting gambling sites peak around major sporting events like the Super Bowl and March Madness, such a trend was not evident, as attack share peaked at 6.5% the week of March 5 — a month after the Super Bowl, and a couple of weeks before the start of March Madness.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HqH4NQhC77KEgh1Z3tJDw/a9787f0913ad8160607a1cb21de6347a/BLOG-3077_56_-_security-mostattackedverticals.png" />
          </figure><p><sup><i>Global mitigated traffic share by vertical in 2025, summary view</i></sup></p>
    <div>
      <h3>Routing security, measured as the shares of RPKI valid routes and covered IP address space, saw continued improvement throughout 2025</h3>
      <a href="#routing-security-measured-as-the-shares-of-rpki-valid-routes-and-covered-ip-address-space-saw-continued-improvement-throughout-2025">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol (BGP)</u></a> is the Internet’s core routing protocol, enabling traffic to flow between source and destination by communicating routes between networks. However, because it relies on trust between connected networks, incorrect information shared between peers (intentionally or not) can send traffic to the wrong place — potentially to <a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/"><u>systems under control of an attacker</u></a>. To address this, <a href="https://blog.cloudflare.com/rpki/"><u>Resource Public Key Infrastructure (RPKI)</u></a> was developed as a cryptographic method of signing records that associate a BGP route announcement with the correct originating autonomous system (AS) number to ensure that the information being shared originally came from a network that is allowed to do so. Cloudflare has been a vocal advocate for routing security, including as a founding participant in the <a href="https://www.internetsociety.org/news/press-releases/2020/leading-cdn-and-cloud-providers-join-manrs-to-improve-routing-security/"><u>MANRS CDN and Cloud Programme</u></a> and by providing a <a href="https://isbgpsafeyet.com/"><u>public tool</u></a> that enables users to test whether their Internet provider has implemented BGP safely. </p><p>We analyzed data available on Cloudflare Radar’s <a href="https://radar.cloudflare.com/routing"><u>Routing page</u></a> to determine the share of <a href="https://rpki.readthedocs.io/en/latest/about/help.html"><u>RPKI valid routes</u></a> and how that share changed throughout 2025, as well as determining the <a href="https://radar.cloudflare.com/year-in-review/2025/#routing-security"><u>share of IP address space covered by valid routes</u></a>. The latter metric is noteworthy because a route announcement covering a large amount of IP address space (millions of IPv4 addresses) has a greater potential impact than an announcement covering a small block of IP address space (hundreds of IPv4 addresses).</p><p>We started 2025 with 50% valid IPv4 routes, growing to 53.9% by December 2. The share of valid IPv6 routes increased to 60.1%, up 4.7 percentage points. Looking at the global share of IP address space covered by valid routes, IPv4 increased to 48.5%, a three percentage point increase. The share of IPv6 address space covered by valid routes fell slightly to 61.6%. Although the year-over-year changes for these metrics are slowing, we have made significant progress over the last five years. Since the start of 2020, the share of RPKI valid IPv4 routes and IPv4 address space have both grown by approximately 3x.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EtRqY7MgRKLxjsLIlNuis/013b3bf92c6d3b173cd8086b1ff370c4/BLOG-3077_57_-_security-routingsecurity-routes.png" />
          </figure><p><sup><i>Shares of global RPKI valid routing entries by IP version in 2025</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JEv5ViM6qYdYxSzE6sbYD/4f89f5acbd2aeef55562fbee63dd2f07/BLOG-3077_58_-_security-routingsecurity-addressspace.png" />
          </figure><p><sup><i>Shares of globally announced IP address space covered by RPKI valid routes in 2025</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2025/bb#routing-security"><u>Barbados</u></a> saw the biggest growth in the share of valid IPv4 routes, growing from 2.2% to 20.8%. Looking at valid IPv6 routes, <a href="https://radar.cloudflare.com/year-in-review/2025/ml#routing-security"><u>Mali</u></a> saw the most significant share growth in 2025, from 10.0% to 58.3%. </p><p>Barbados also experienced the biggest increase in the share of IPv4 space covered by valid routes, jumping from just 2.0% to 18.6%. For IPv6 address space, both <a href="https://radar.cloudflare.com/year-in-review/2025/tj#routing-security"><u>Tajikistan</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/dm#routing-security"><u>Dominica</u></a> went from having effectively no space covered by valid routes at the start of the year, to 5.5% and 3.5% respectively. </p>
    <div>
      <h3>Hyper-volumetric DDoS attack sizes grew significantly throughout the year </h3>
      <a href="#hyper-volumetric-ddos-attack-sizes-grew-significantly-throughout-the-year">
        
      </a>
    </div>
    <p>In our quarterly DDoS Report series (<a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/ddos-threat-report-2025-q3/"><u>Q3</u></a>), we have highlighted the increasing frequency and size of hyper-volumetric network layer attacks targeting Cloudflare customers and Cloudflare’s infrastructure. We define a “hyper-volumetric network layer attack” as one that operates at Layer 3/4 and that peaks at more than one terabit per second (1 Tbps) or more than one billion packets per second (1 Bpps). These reports provide a quarterly perspective, but we also wanted to <a href="https://radar.cloudflare.com/year-in-review/2025/#ddos-attacks"><u>show a view of activity across the year</u></a> to understand when attackers are most active, and how attack sizes have grown over time. </p><p>Looking at hyper-volumetric attack activity in 2025 from a Tbps perspective, July saw the largest number of such attacks, at over 500, while February saw the fewest, at just over 150. Attack intensity remained generally below 5 Tbps, although a 10 Tbps attack blocked at the end of August was a harbinger of things to come. This attack was the first of a campaign of &gt;10 Tbps attacks that took place during the first week of September, ahead of a series of &gt;20 Tbps attacks during the last week of the month. In early October, multiple increasingly larger hyper-volumetric attacks were observed, with the largest for the month <a href="https://blog.cloudflare.com/ddos-threat-report-2025-q3/#aisuru-breaking-records-with-ultrasophisticated-hyper-volumetric-ddos-attacks"><u>peaking at 29.7 Tbps</u></a>. However, that record was soon eclipsed, as an early November attack reached 31.4 Tbps.</p><p>From a Bpps perspective, hyper-volumetric attack activity was much lower, with November experiencing the most (over 140), while just three were seen in February and June. Attack intensity across the year generally remained below 4 Bpps through late August, though a succession of increasingly larger attacks were seen over the next several months, peaking in October. Although the intensity of most of the 110+ attacks blocked in October was below 5 Bpps, a 14 Bpps attack seen during the month was the largest hyper-volumetric attack by packets per second blocked during the year, besting five other successive record-setting attacks that occurred in September.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q4Ruw6z07JUGXF6FsZMTv/414a388b7f10eff0940a460e1356e938/BLOG-3077_59_-_security-hypervolumetricddos.png" />
          </figure><p><sup><i>Peak DDoS attack sizes in 2025</i></sup></p>
    <div>
      <h2>Email security</h2>
      <a href="#email-security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mchtw8EWCzTpDs3K4jQ1A/3b740b7facca7869a4a191808e94ef45/BLOG-3077_60_-_image12.png" />
          </figure>
    <div>
      <h3>More than 5% of email messages analyzed by Cloudflare were found to be malicious</h3>
      <a href="#more-than-5-of-email-messages-analyzed-by-cloudflare-were-found-to-be-malicious">
        
      </a>
    </div>
    <p><a href="https://www.signite.io/emails-are-still-king"><u>Recent statistics</u></a> suggest that email remains the top communication channel for external business contact, despite the growing enterprise use of collaboration/messaging apps. Given its broad enterprise usage, attackers still find it to be an attractive entry point into corporate networks. Generative AI tools <a href="https://blog.cloudflare.com/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><u>make it easier</u></a> to craft highly targeted malicious emails that convincingly impersonate trusted brands or legitimate senders (like corporate executives) but contain deceptive links, dangerous attachments, or other types of threats. <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> protects customers from email-based attacks, including those carried out through targeted malicious email messages. </p><p>In 2025, an <a href="https://radar.cloudflare.com/year-in-review/2025/#malicious-emails"><u>average of 5.6% of emails analyzed by Cloudflare were found to be malicious</u></a>. The share of messages processed by Cloudflare Email Security that were found to be malicious generally ranged between 4% and 6% throughout most of the year. Our data shows a jump in malicious email share starting in October, likely due to an improved classification system implemented by Cloudflare Email Security.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/422qqM5R83j6IkdbWdasYR/696a68ded36a67dba1b73e045ab5bb28/BLOG-3077_61_-_emailsecurity-maliciousemailpercentage.png" />
          </figure><p><sup><i>Global malicious email share trends in 2025</i></sup></p>
    <div>
      <h3>Deceptive links, identity deception, and brand impersonation were the most common types of threats found in malicious email messages</h3>
      <a href="#deceptive-links-identity-deception-and-brand-impersonation-were-the-most-common-types-of-threats-found-in-malicious-email-messages">
        
      </a>
    </div>
    <p>Deceptive links were the <a href="https://radar.cloudflare.com/year-in-review/2025/#top-email-threats"><u>top malicious email threat category in 2025</u></a>, found in 52% of messages, up from <a href="https://radar.cloudflare.com/year-in-review/2024#top-email-threats"><u>43% in 2024</u></a>. Since the display text for a hyperlink in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually linking to a malicious resource that can be used to steal login credentials or download malware. The share of processed emails containing deceptive links was as high as 70% in late April, and again in mid-November.</p><p>Identity deception occurs when an attacker sends an email claiming to be someone else. They may do this using domains that look similar, are spoofed, or use display name tricks to appear to be coming from a trusted domain. Brand impersonation is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation may also use display name spoofing or domain impersonation. Identity deception (38%) and brand impersonation (32%) were growing threats in 2025, up from 35% and 23% respectively in 2024. Both saw an increase in mid-November.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sq7v5IqOTPZZ5DwCnr8Mv/762e5bd4dda4c34475ffb5507898a08a/BLOG-3077_62_-_emailsecurity-maliciousemail-threatcategory.png" />
          </figure><p><sup><i>Email threat category trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>Nearly all of the email messages from the .christmas and .lol Top Level Domains were found to be either spam or malicious</h3>
      <a href="#nearly-all-of-the-email-messages-from-the-christmas-and-lol-top-level-domains-were-found-to-be-either-spam-or-malicious">
        
      </a>
    </div>
    <p>In addition to providing traffic, geographic distribution, and digital certificate insights for Top Level Domains (TLDs) like <a href="https://radar.cloudflare.com/tlds/com"><u>.com</u></a> or <a href="https://radar.cloudflare.com/tlds/us"><u>.us</u></a>, Cloudflare Radar also provides insights into the <a href="https://radar.cloudflare.com/security/email#most-abused-tlds"><u>“most abused” TLDs</u></a> – those with domains that we have found are originating the largest shares of malicious and spam email among messages analyzed by Cloudflare Email Security. The analysis is based on the sending domain’s TLD, found in the From: header of an email message. For example, if a message came from sender@example.com, then example.com is the sending domain, and .com is the associated TLD. For the Year in Review analysis, we only included TLDs from which we saw an average minimum of 30 messages per hour.</p><p>Based on <a href="https://radar.cloudflare.com/year-in-review/2025/#most-abused-tlds"><u>messages analyzed throughout 2025</u></a>, we found that <a href="https://radar.cloudflare.com/tlds/christmas"><u>.christmas</u></a> and <a href="https://radar.cloudflare.com/tlds/lol"><u>.lol</u></a> were the most abused TLDs, with 99.8% and 99.6% of messages from these TLDs respectively characterized as either spam or malicious. Sorting the list of TLDs by malicious email share, <a href="https://radar.cloudflare.com/tlds/cfd"><u>.cfd</u></a> and <a href="https://radar.cloudflare.com/tlds/sbs"><u>.sbs</u></a> both had more than 90% of analyzed emails categorized as malicious. The <a href="https://radar.cloudflare.com/tlds/best"><u>.best</u></a> TLD was the worst in terms of spam email share, with 69% of email messages characterized as spam.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tTPjf9VkDFDnzaKCUXE9y/93e88ce8e7f65ef6373308f805b0219f/BLOG-3077_63_-_emailsecurity-maliciousemail-mostabusedtlds.png" />
          </figure><p><sup><i>TLDs originating the largest total shares of malicious and spam email in 2025</i></sup></p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although the Internet and the Web continue to evolve and change over time, it appears that some of the key metrics have become fairly stable. However, we expect that others, such as those metrics tracking AI trends, will shift over the coming years as that space evolves at a rapid pace. </p><p>We encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2025"><u>Cloudflare Radar 2025 Year In Review microsite</u></a> and explore the trends for your country/region, and consider how they impact your organization as you plan for 2026. You can also get near real-time insight into many of these metrics and trends on <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. And as noted above, for insights into the top Internet services across multiple industry categories and countries/regions, we encourage you to read the <a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>companion Year in Review blog post</u></a>.</p><p>If you have any questions, you can contact the Cloudflare Radar team at <a><u>radar@cloudflare.com</u></a> or on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p>
    <div>
      <h2>Acknowledgements</h2>
      <a href="#acknowledgements">
        
      </a>
    </div>
    <p>As the saying goes, it takes a village to make our annual Year in Review happen, from aggregating and analyzing the data, to creating the microsite, to developing associated content. I’d like to acknowledge those team members that contributed to this year’s effort, with thanks going out to: Jorge Pacheco, Sabina Zejnilovic, Carlos Azevedo, Mingwei Zhang, Sofia Cardita (data analysis); André Páscoa, Nuno Pereira (frontend development); João Tomé (Most Popular Internet Services); David Fidalgo, Janet Villarreal, and the internationalization team (translations); Jackie Dutton, Kari Linder, Guille Lasarte (Communications); Laurel Wamsley (blog editing); and Paula Tavares (Engineering Management), as well as other colleagues across Cloudflare for their support and assistance.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">2Mp06VKep73rBpdUmywpQ2</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity]]></title>
            <link>https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/</link>
            <pubDate>Mon, 28 Apr 2025 21:30:00 GMT</pubDate>
            <description><![CDATA[ A massive power outage struck significant portions of Portugal and Spain at 10:34 UTC on April 28, disrupting everyday activities and services. ]]></description>
            <content:encoded><![CDATA[ <p>A massive <a href="https://www.reuters.com/world/europe/large-parts-spain-portugal-hit-by-power-outage-2025-04-28/"><u>power outage struck significant portions of Portugal and Spain</u></a> at 10:34 UTC on April 28, grinding transportation to a halt, shutting retail businesses, and otherwise disrupting everyday activities and services. Parts of France were also reportedly impacted by the power outage. Portugal’s electrical grid operator <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Aa1493644-407b-44c0-aef9-c6f64d7fad0e#post"><u>blamed</u></a> the outage on a "<i>fault in the Spanish electricity grid</i>”, and <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Addda9592-0346-4fe8-a17a-2261efc1ba5b#post"><u>later stated</u></a> that "<i>due to extreme temperature variations in the interior of Spain, there were anomalous oscillations in the very high voltage lines (400 kilovolts), a phenomenon known as 'induced atmospheric vibration'</i>" and that "<i>These oscillations caused synchronisation failures between the electrical systems, leading to successive disturbances across the interconnected European network</i>." However, the operator later <a href="https://sicnoticias.pt/pais/2025-04-28-e-falso-que-fenomeno-atmosferico-raro-tenha-estado-na-origem-do-apagao-1a078544"><u>denied</u></a> these claims. </p><p>The breadth of Cloudflare’s network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the Internet impact of this power outage at both a local and national level, as well as at a network level, across traffic, network quality, and routing metrics.</p>
    <div>
      <h2>Impacts in Portugal</h2>
      <a href="#impacts-in-portugal">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Portugal, Internet traffic dropped as the power grid failed, with traffic immediately dropping by half as compared to the previous week, falling to approximately 90% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21ezFb3KrFDR36Gn66twwd/99ed60e71501eccf948e7e1d2c0eb3a3/BLOG-2817_2.png" />
          </figure><p>Request traffic from users in Portugal to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 40% as compared to the previous week, and falling further over the next several hours. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GgzpC2ll27P1cfv0dQlFw/69dfabcfddd2dcb4db5f00885b12c67f/BLOG-2817_3.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, the loss of Internet traffic from local providers including NOS, Vodafone, MEO, and NOWO was swift and significant. The Cloudflare Radar graphs below show that traffic from those networks effectively evaporated over the hours after the power outage began. The <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous systems (ASNs)</u></a> shown below for these providers may carry a mix of fixed and mobile broadband traffic. However, MEO breaks out at least some of their mobile traffic onto a separate ASN, and the graph below for MEO-MOVEL (AS42863) shows that request traffic from that network more than doubled after the power went out, as subscribers turned to their mobile devices for information about what was happening. However, despite the initial spike, this mobile traffic also fell over the next several hours, dropping to approximately half of the volume seen the prior week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fys8MdtL3ImmHS6b25x0i/b1ccbd24818e4ec93170ae9f699c9727/BLOG-2817_4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LCdCDX9XoOHMgdVRzyjD0/1e276a9bb6eae716ee22059d88517615/BLOG-2817_5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fxFCuhYkBHXSDDizyj6AX/87d9e5f6e9e610cff365d3f5be8c75cb/BLOG-2817_6.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RfJ5HwTx3AqMKJ6c5FaaI/f595795b57dfb1b54fb6013ccca532fc/BLOG-2817_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kYztdmWgq6n8lZgokElhh/a34f81d3dce5c259ee43b567ebbb8e9a/BLOG-2817_8.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In addition to looking at traffic at a national and network level, we can also look at traffic at a regional level. As noted above, the power outage did not impact every region of the country. The traffic graphs below show the changes in Internet traffic from the parts of Portugal where an impact was observed.</p><p>In Lisbon and Porto, a sharp, but limited drop in traffic was observed as the power outage began, with traffic recovering slightly almost as quickly. However, traffic gradually declined in the subsequent hours, in contrast to the other regions reviewed below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78BxDMSIsfvNyoPUczJ1Cv/aa4cf6cd71684726fc891c63dcb5108f/BLOG-2817_9.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/23KJh2ptN7NynAACvmFH9L/d71dc49bcd20ede70847592fb0d55b72/BLOG-2817_10.png" />
          </figure><p>The most significant immediate traffic drops were observed in Aveiro, Beja, Bragança, Castelo Branco, Évora, Faro, Guarda, Portalegre, Santarém, Viana do Castelo, Vila Real, and Viseu. In these areas, traffic fell and then quickly stabilized at very low volumes. In Braga and Setúbal, traffic declined more gradually after the initial drop.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tF73OLez4RM8I7x2I9ST0/06751ebb8bfdc22bc243939881eb2d16/BLOG-2817_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fYFHRgvyG8jlSZtIQ55St/1b3656d6212c1dd0a1e8ee6be5863f26/BLOG-2817_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JKrwsr5k82cDreQluW336/61cc1d1b278a42995e71f98a02924d8c/BLOG-2817_13.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q736FpU8TFEFZzNMl3ahB/b4f0105be84f00a9dc28d63ffb820124/BLOG-2817_14.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/717jnbhzFFBGxC8oKQzbWc/44ca9f1d5ca08104434f651750825bc9/BLOG-2817_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sghSM0J7Hx793fpzBNhBa/8e105feb10216547aa6fc4c829c5c95f/BLOG-2817_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TRbyRB0hrjClK3S74Z6U1/71dc72b9b2bff67fd58fa43d5566aefb/BLOG-2817_17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IEvNIigmrvmQ0qELWpLgO/63388e385162c421bb5ddf225993d300/BLOG-2817_18.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KWHQhpaMdU8EZUAjvJyZn/8de4ec173e79971e06cdbbc931e3f149/BLOG-2817_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NCILxkS2oymGlRpKcoiG6/89977e5bc093ce81311585f397fff97e/BLOG-2817_20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5s16pM0WdaX2bwDZuMuxda/af239a2a28abfeb5ce7da93c1094dd8c/BLOG-2817_21.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jkQrdlsCsGr4qyXX8EN42/7d90bbc1afcf138094a0f87d88b342e7/BLOG-2817_22.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xnoq8NQjx0nMruchenCRW/4a0a29367a0a4903a7623a9c3db72031/BLOG-2817_23.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sN1UZ4YYy7ZuOOy98KyIw/7c837a3034144937b8b9f3d43e0d7ffa/BLOG-2817_24.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Portugal. Prior to the loss of power, median download speeds across the country were around 40 Mbps, but within several hours after the state of the outage, fell as low as 15 Mbps. As expected, latency at a country level saw an opposite impact. Prior to the loss of power, median latency was around 20 ms. However, it gradually grew to as much as 50 ms. The lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IZu3b640cB11ZjnqQGcFh/886c356c4d8124be7f8b2ce01c9582cc/BLOG-2817_25.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nq7wmaWEZOgusVYw9v1it/8685d5ad7a343f22b94e09c72a34a0d5/BLOG-2817_26.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/the-net/network-infrastructure/">Network infrastructure </a>in Portugal was also impacted by the power outage, with the impact seen as a drop in announced IP address space. (This means that portions of Portuguese providers’ networks are no longer visible to the rest of the Internet.) The number of announced IPv4 /24s (blocks of 256 IPv4 addresses) dropped by ~300 (around 1.2%), and the number of announced IPv6 /48s (blocks of over 1.2 octillion IPv6 addresses) dropped from 17,928,551 to 16,355,607 (around 9%). Address space began to drop further after 16:00 UTC, possibly as a result of backup power being exhausted and associated network infrastructure falling offline.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZaC5NQzz6dzDzo5ywePst/417192abd6fc942ff85d06e247f7de66/BLOG-2817_27.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/asO2sxhD9Adue3q0FiBJv/40b8159855bd3c2156df49360adf898b/BLOG-2817_28.png" />
          </figure>
    <div>
      <h2>Impacts in Spain</h2>
      <a href="#impacts-in-spain">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Spain, Internet traffic dropped as the power grid failed, with traffic immediately dropping by around 60% as compared to the previous week, falling to approximately 80% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NWiuqfI5Z3MI5Q8fTXJM/df6438db91848c3faff11aaae43a7328/BLOG-2817_29.png" />
          </figure><p>Request traffic from users in Spain to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 54% as compared to the previous week, but quickly stabilizing. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1N4JwFD2543isQ7laC6k/cf7ad7cce146ed18fd84ad9a32872e6e/BLOG-2817_30.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, traffic volumes from the <a href="https://radar.cloudflare.com/traffic/es?dateRange=1d#autonomous-systems"><u>top five ASNs in Spain</u></a> fell rapidly once power was lost, with most declining gradually over the next several hours. In contrast, traffic from Digi Spain Telecom (AS57269) fell quickly, but then stabilized at the lower level. In comparison to the previous week, traffic from these providers fell between 75% and 93% in the hours after the power outage began.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oFLKubgeo2NsffE9tGx2f/89af580571c94e14703b218feadb058b/BLOG-2817_31.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YTkS67VGnW9ACB3t58kBF/672f7e3e7d990bc7f33aa9a5155e133f/BLOG-2817_32.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56sGr0XxMAifw2ZqYnvSWU/07f168a415a2f0801bb2aebb1a7b45f9/BLOG-2817_33.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CpRU7YzB4LnTJppDnN2DZ/e479899ec5d6a0034c38361abf311d2f/BLOG-2817_34.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qYPxLDJQM2bfv0LTrY547/694f327f221bbc094580dbea731527d1/BLOG-2817_35.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In most of the impacted regions in Spain, traffic dropped off quickly and stabilized, or continued to fall further. However, some recovery in traffic is also evident, and can be seen in Navarre, La Rioja, Cantabria, and Basque Country. This traffic recovery is likely associated with an initial restoration of power in those regions, as an <a href="https://www.ree.es/es/sala-de-prensa/actualidad/nota-de-prensa/2025/04/proceso-de-recuperacion-de-la-tension-en-el-sistema-electrico-peninsular"><u>update</u></a> from <a href="https://www.redeia.com/en/about-us/our-brand"><u>Red Eléctrica</u></a> (operator of Spain’s national electricity grid) noted that “<i>Electricity is now available in parts of Catalonia, Aragon, the Basque Country, Galicia, Asturias, Navarre, Castile and León, Extremadura, Andalusia, and La Rioja.</i>”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ziGXO8PBjWNAwhiYNa8hT/9af98f7fad1b22f482445d90314a524e/BLOG-2817_36.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17WcnWkXfG1BlxBCUwp5fW/1688269ff5dd6dbad06c09278e9ccd8d/BLOG-2817_37.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ho5Cc18AYxd8G54mtmfcH/739731e105a9236a00a6531a1a61c10f/BLOG-2817_38.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K4A82RT9L0tCXUBEVjZOw/a0798877806ac2c071cf82e71101a558/BLOG-2817_39.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6zFHmbct6zR2155GbfyM0F/af7f5aad5076bafc373127f7e5da82be/BLOG-2817_40.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FBbLHYIziEcd0qJJM02s1/404bcca11c826a758d174ce4ff94a638/BLOG-2817_41.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/349JW0IsbTDKRALrlQd91P/97b397344d72d3e6322a572e9c562ee2/BLOG-2817_42.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BNKpHFhRfNOlv1smU5BXr/9cda4655d68648c216f741cb200f0c51/BLOG-2817_43.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2g9WMm6XRkUvJxpW8pE0QJ/214f04aa2f8caa307e5f422db7a85dd3/BLOG-2817_44.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TeXN8cdr56fUFyNnbBtXo/f5ec765241d0b4af2f15eab70b65aa5c/BLOG-2817_45.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2h2R1k3eabXg7qB0XvfP0t/637dd2050cbc0e25b6ae441fe79bb14c/BLOG-2817_46.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37gqrGzlp0dIFinCinmAYk/6ed9f0b5c5d73490bbc539e577125df2/BLOG-2817_47.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Cr2Otys8KDJA0amR3PpUj/f51a2f1ffdbb50ce4f3ca7501352fc5d/BLOG-2817_48.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K415209i5YGlJmcMuoRMr/1b5285b4872b1dc904ddb0f3a0417704/BLOG-2817_49.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AGjopp98UyZh52X5Jf1F9/df72d3f181012e07bb566aec3ab01ca6/BLOG-2817_50.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Spain. Prior to the loss of power, median download speeds across the country were around 35 Mbps, but within several hours after the state of the outage, fell as low as 19 Mbps. Interestingly, the median bandwidth didn’t see the clean gradual decline as it did in Portugal, instead falling and recovering twice before gradually declining.</p><p>As expected, latency at a country level saw a significant increase. Prior to the loss of power, median latency was around 22 ms, but grew to as much as 40 ms. As in Portugal, the lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SvaDFDPdleRDctpTezUIf/65834285ceb6d7dedc76c97095871859/BLOG-2817_51.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BxQUuqVQdIHxro6XDAzUC/83e6001ffaa1492079cf54f25c36785c/BLOG-2817_52.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p>Similar to Portugal, network infrastructure in Spain was also impacted by the power outage, with the impact seen as a drop in announced IP address space. By 14:30 UTC, the number of announced IPv4 /24 address blocks had fallen by around 2.4%, and continued to drop further over the following hours. The number of announced IPv6 /48 address blocks fell by over 8% during that same time span, and also continued to drop in the following hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6o4hGGWXhf8aoqkqUUCNnO/5ad97dafb731679c368f837f69fc7044/BLOG-2817_53.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZfoHrCrwHAMACg0oCTceD/8f816416c4cde1c562aa519099eed058/BLOG-2817_54.png" />
          </figure>
    <div>
      <h2>Impacts in other European countries</h2>
      <a href="#impacts-in-other-european-countries">
        
      </a>
    </div>
    <p>Parts of Andorra and France were also <a href="https://www.euronews.com/my-europe/2025/04/28/spain-portugal-and-parts-of-france-hit-by-massive-power-outage"><u>reportedly impacted</u></a> by the power outage, with additional outages reported as far away as Belgium. At a national level, no traffic disruptions were evident in any of the countries.</p><p>
</p><p>Analysis of traffic at a regional level in France shows a slight decline concurrent with the power outage in several regions, but the drops were nominal in comparison to Spain and Portugal, and traffic volumes recovered to expected levels within 90 minutes. No impact was evident at a regional level in Andorra.</p><p>It appears that Morocco may have been impacted in some fashion by the power outage, or at least Orange Maroc was. In a <a href="https://x.com/OrangeMaroc/status/1916866583047147690"><u>post on X</u></a>, the provider stated (translated) “<i>Internet traffic has been disrupted following a massive power outage in Spain and Portugal, which is affecting international connections.</i>” Cloudflare Radar shows that traffic from the network fell sharply around 12:00 UTC, 90 minutes after the power outage began, with a full outage beginning around 15:00 UTC.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62cA1IF7zleHp8RpCZu2Dq/2733086494e7d05b3feac5fd700e1c0f/BLOG-2817_55.png" />
          </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Power restoration in Spain had already started as this post was being written, and full recovery will likely take hours to days. As power is restored, Internet traffic and other metrics will recover as well. The current state of Internet connectivity in <a href="https://radar.cloudflare.com/es"><u>Spain</u></a> and <a href="https://radar.cloudflare.com/pt"><u>Portugal</u></a> can be tracked on Cloudflare Radar.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a>email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">3Zqv5LUUJauYsk7Dn0BIye</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare 2024 Year in Review]]></title>
            <link>https://blog.cloudflare.com/radar-2024-year-in-review/</link>
            <pubDate>Mon, 09 Dec 2024 14:05:00 GMT</pubDate>
            <description><![CDATA[ The 2024 Cloudflare Radar Year in Review is our fifth annual review of Internet trends and patterns at both a global and country/region level. ]]></description>
            <content:encoded><![CDATA[ <p>The <a href="https://radar.cloudflare.com/year-in-review/2024">2024 Cloudflare Radar Year in Review</a> is our fifth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. In this year’s review, we have added several new traffic, adoption, connectivity, and email security metrics, as well as the ability to do year-over-year and geographic comparisons for selected metrics. </p><p>Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.</p>
    <div>
      <h2>Key Findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic</h3>
      <a href="#traffic">
        
      </a>
    </div>
    <ul><li><p>Global Internet traffic grew 17.2% in 2024. <a href="#global-internet-traffic-grew-17-2-in-2024"><u>🔗</u></a></p></li><li><p>Google maintained its position as the most popular Internet service overall. OpenAI remained at the top of the Generative AI category. Binance remained at the top of the Cryptocurrency category. WhatsApp remained the top Messaging platform, and Facebook remained the top Social Media site. <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories"><u>🔗</u></a></p></li><li><p>Global traffic from Starlink grew 3.3x in 2024, in line with last year’s growth rate. After initiating service in Malawi in July 2023, Starlink traffic from that country grew 38x in 2024. As Starlink added new markets, we saw traffic grow rapidly in those locations. <a href="#global-traffic-from-starlink-grew-3-3x-in-2024-in-line-with-last-years-growth-rate-after-initiating-service-in-malawi-in-july-2023-starlink-traffic-from-that-country-grew-38x-in-2024"><u>🔗</u></a></p></li><li><p>Googlebot, Google’s web crawler, was responsible for the highest volume of request traffic to Cloudflare in 2024, as it retrieved content from millions of Cloudflare customer sites for search indexing. <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories"><u>🔗</u></a></p></li><li><p>Traffic from ByteDance’s AI crawler (Bytespider) gradually declined over the course of 2024. Anthropic’s AI crawler (ClaudeBot) first started showing signs of ongoing crawling activity in April, then declined after an initial peak in May &amp; June. <a href="#among-ai-bots-and-crawlers-bytespider-bytedance-traffic-gradually-declined-over-the-course-of-2024-while-claudebot-anthropic-was-more-active-during-the-back-half-of-the-year"><u>🔗</u></a></p></li><li><p>13.0% of TLS 1.3 traffic is using post-quantum encryption. <a href="#13-0-of-tls-1-3-traffic-is-using-post-quantum-encryption"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Adoption &amp; Usage</h3>
      <a href="#adoption-usage">
        
      </a>
    </div>
    <ul><li><p>Globally, nearly one-third of mobile device traffic was from Apple iOS devices. Android had a &gt;90% share of mobile device traffic in 29 countries/regions; peak iOS mobile device traffic share was over 60% in eight countries/regions. <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>🔗</u></a></p></li><li><p>Globally, nearly half of web requests used HTTP/2, with 20.5% using HTTP/3. Usage of both versions was up slightly from 2023. <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3"><u>🔗</u></a></p></li><li><p>React, PHP, and jQuery were among the most popular technologies used to build websites, while HubSpot, Google, and WordPress were among the most popular vendors of supporting services and platforms. <a href="#react-php-and-jquery-were-among-the-most-popular-technologies-used-to-build-websites-while-hubspot-google-and-wordpress-were-among-the-most-popular-vendors-of-supporting-services-and-platforms"><u>🔗</u></a></p></li><li><p>Go surpassed NodeJS as the most popular language used for making automated API requests. <a href="#go-surpassed-nodejs-as-the-most-popular-language-used-for-making-automated-api-requests"><u>🔗</u></a></p></li><li><p>Google is far and away the most popular search engine globally, across all platforms. On mobile devices and operating systems, Baidu is a distant second. Bing is a distant second across desktop and Windows devices, with DuckDuckGo second most popular on macOS. Shares vary by platform and country/region. <a href="#google-is-the-most-popular-search-engine-globally-across-all-platforms-on-mobile-devices-os-baidu-is-a-distant-second-bing-is-a-distant-second-across-desktop-and-windows-devices-with-duckduckgo-second-most-popular-on-macos"><u>🔗</u></a></p></li><li><p>Google Chrome is far and away the most popular browser overall. While this is also true on macOS devices, Safari usage is well ahead of Chrome on iOS devices. On Windows, Edge is the second most popular browser as it comes preinstalled and is the initial default. <a href="#google-chrome-is-the-most-popular-browser-overall-while-also-true-on-macos-devices-safari-usage-is-well-ahead-of-chrome-on-ios-devices-on-windows-edge-is-the-second-most-popular-browser"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Connectivity</h3>
      <a href="#connectivity">
        
      </a>
    </div>
    <ul><li><p>225 major Internet disruptions were observed globally in 2024, with many due to government-directed regional and national shutdowns of Internet connectivity. Cable cuts and power outages were also leading causes. <a href="#225-major-internet-outages-were-observed-around-the-world-in-2024-with-many-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity"><u>🔗</u></a></p></li><li><p>Aggregated across 2024, 28.5% of IPv6-capable requests were made over IPv6. India and Malaysia were the strongest countries, at 68.9% and 59.6% IPv6 adoption respectively. <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3"><u>🔗</u></a></p></li><li><p>The top 10 countries ranked by Internet speed all had average download speeds above 200 Mbps. Spain was consistently among the top locations across the measured Internet quality metrics. <a href="#the-top-10-countries-ranked-by-internet-speed-all-had-average-download-speeds-above-200-mbps-spain-was-consistently-among-the-top-locations-across-measured-internet-quality-metrics"><u>🔗</u></a></p></li><li><p>41.3% of global traffic comes from mobile devices. In nearly 100 countries/regions, the majority of traffic comes from mobile devices. <a href="#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices"><u>🔗</u></a></p></li><li><p>20.7% of TCP connections are unexpectedly terminated before any useful data can be exchanged. <a href="#20-7-of-tcp-connections-are-unexpectedly-terminated-before-any-useful-data-can-be-exchanged"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Security</h3>
      <a href="#security">
        
      </a>
    </div>
    <ul><li><p>6.5% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons. In the United States, the share of mitigated traffic grew to 5.1%, while in South Korea, it dropped slightly to 8.1%. In 44 countries/regions, over 10% of traffic was mitigated. <a href="#6-5-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons"><u>🔗</u></a></p></li><li><p>The United States was responsible for over a third of global bot traffic. Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google. <a href="#the-united-states-was-responsible-for-over-a-third-of-global-bot-traffic-amazon-web-services-was-responsible-for-12-7-of-global-bot-traffic-and-7-8-came-from-google"><u>🔗</u></a></p></li><li><p>Globally, Gambling/Games was the most attacked industry, slightly ahead of 2023’s most targeted industry, Finance. <a href="#globally-gambling-games-was-the-most-attacked-industry-slightly-ahead-of-2023s-most-targeted-industry-finance"><u>🔗</u></a></p></li><li><p>Log4j, a vulnerability discovered in 2021, remains a persistent threat and was actively targeted throughout 2024. <a href="#log4j-remains-a-persistent-threat-and-was-actively-targeted-throughout-2024"><u>🔗</u></a></p></li><li><p>Routing security, measured as the share of RPKI valid routes and the share of covered IP address space, continued to improve globally throughout 2024. We saw a 4.7% increase in RPKI valid IPv4 address space in 2024, and a 6.4% increase in RPKI valid routes in 2024. <a href="#routing-security-measured-as-the-share-of-rpki-valid-routes-and-the-share-of-covered-ip-address-space-continued-to-improve-globally-throughout-2024"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Email Security</h3>
      <a href="#email-security">
        
      </a>
    </div>
    <ul><li><p>An average of 4.3% of emails were determined to be malicious in 2024, although this figure was likely influenced by spikes observed in March, April, and May. Deceptive links and identity deception were the two most common types of threats found in malicious email messages. <a href="#an-average-of-4-3-of-emails-were-determined-to-be-malicious-in-2024"><u>🔗</u></a></p></li><li><p>Over 99% of the email messages processed by Cloudflare Email Security from the .bar, .rest, and .uno top level domains (TLDs) were found to be either spam or malicious in nature. <a href="#over-99-of-the-email-messages-processed-by-cloudflare-email-security-from-the-bar-rest-and-uno-top-level-domains-tlds-were-found-to-be-either-spam-or-malicious-in-nature"><u>🔗</u></a></p></li></ul>
    <div>
      <h2>Introduction</h2>
      <a href="#introduction">
        
      </a>
    </div>
    <p>Over the last four years (<a href="https://blog.cloudflare.com/cloudflare-radar-2020-year-in-review/"><u>2020</u></a>, <a href="https://blog.cloudflare.com/cloudflare-radar-2021-year-in-review/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/radar-2022-year-in-review/"><u>2022</u></a>, <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023</u></a>), we have aggregated perspectives from <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> into an annual Year In Review, illustrating the Internet’s patterns across multiple areas over the course of that year. The <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review</u></a> microsite continues that tradition, featuring interactive charts, graphs, and maps you can use to explore and compare notable Internet trends observed throughout this past year.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/network"><u>network</u></a> currently spans more than 330 cities in over 120 countries/regions, serving an average of over 63 million HTTP(S) requests per second for millions of Internet properties, in addition to handling over 42 million DNS requests per second on average. The resulting data generated by this usage, combined with data from other complementary Cloudflare tools, enables Radar to provide unique near-real time perspectives on the patterns and trends around security, traffic, performance, and usage that we observe across the Internet. </p><p>The 2024 Year In Review is organized into five sections: <a href="https://radar.cloudflare.com/year-in-review/2024#traffic"><u>Traffic</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#adoption-and-usage"><u>Adoption &amp; Usage</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#connectivity"><u>Connectivity</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#security"><u>Security</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024#email-security"><u>Email Security</u></a> and covers the period from January 1 to December 1, 2024. We have incorporated several new metrics this year, including AI bot &amp; crawler traffic, search engine and browser market share, connection tampering, and “most dangerous” top level domains (TLDs). To ensure consistency, we have kept underlying methodologies consistent with previous years’ calculations. Trends for 200 countries/regions are available on the microsite; smaller or less populated locations are excluded due to insufficient data. Some metrics are only shown worldwide, and are not displayed if a country/region is selected. </p><p>Below, we provide an overview of the content contained within the major Year In Review sections (Traffic, Adoption &amp; Usage, Connectivity, Security, and Email Security), along with notable observations and key findings. In addition, we have also published a companion blog post that specifically explores trends seen across <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><u>Top Internet Services</u></a>.</p><p>The key findings and associated discussion within this post only provide a high-level perspective on the unique insights that can be found in the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Year in Review microsite</u></a>. Visit the microsite to explore the various datasets and metrics in more detail, including trends seen in your country/region, how these trends have changed as compared to 2023, and how they compare to other countries/regions of interest. Surveying the Internet from this vantage point provides insights that can inform decisions on everything from an organization’s security posture and IT priorities to product development and strategy. </p>
    <div>
      <h2>Traffic trends</h2>
      <a href="#traffic-trends">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XlL4SnJROa2fArrtUheuo/822ede9708eb6e9aeeebce4331d62140/2627_Graph.png" />
          </figure>
    <div>
      <h3>Global Internet traffic grew 17.2% in 2024.</h3>
      <a href="#global-internet-traffic-grew-17-2-in-2024">
        
      </a>
    </div>
    <p>An inflection point for Internet traffic arguably occurred thirty years ago. The World Wide Web went mainstream in 1994, thanks to the late 1993 <a href="https://cybercultural.com/p/1993-mosaic-launches-and-the-web-is-set-free/"><u>release</u></a> of the <a href="https://www.ncsa.illinois.edu/research/project-highlights/ncsa-mosaic/"><u>NCSA Mosaic</u></a> browser for multiple popular operating systems, which included support for embedded images. In turn, “heavier” (in contrast to text-based) Internet content became the norm, and coupled with the growth in consumption through popular online services and the emerging consumer ISP industry, <a href="https://blogs.cisco.com/sp/the-history-and-future-of-internet-traffic"><u>Internet traffic began to rapidly increase</u></a>, and that trend has continued to the present.</p><p>To determine the traffic trends over time for the Year in Review, we use the average daily traffic volume (excluding bot traffic) over the second full calendar week (January 8-15) of 2024 as our baseline. (The second calendar week is used to allow time for people to get back into their “normal” school and work routines after the winter holidays and New Year’s Day. The percent change shown in the traffic trends chart is calculated relative to the baseline value — it does not represent absolute traffic volume for a country/region. The trend line represents a seven-day trailing average, which is used to smooth the sharp changes seen with data at a daily granularity. To compare 2024’s traffic trends with 2023 data and/or other locations, click the “Compare” icon at the upper right of the graph.</p><p>Throughout the first half of 2024, <a href="https://radar.cloudflare.com/year-in-review/2024?#internet-traffic-growth"><u>worldwide Internet traffic growth</u></a> appeared to be fairly limited, within a percent or two on either side of the baseline value through mid-August. However, at that time growth clearly began to accelerate, climbing consistently through the end of November, growing 17.2% for the year. This trend is similar to those also seen in 2023 and 2022, as we discussed in the <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023 Year in Review blog post</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NjOCs902pW74OQ0bx2usy/58896c0bc06b4a9c819736bde28ed3f4/traffic_-_worldwide.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, worldwide</i></sup></p><p>The West African country of <a href="https://radar.cloudflare.com/year-in-review/2024/gn?previousYear=true"><u>Guinea</u></a> experienced the most significant Internet traffic growth seen in 2024, reaching as much as 350% above baseline. Traffic growth didn’t begin in earnest until late February, and reached an initial peak in early April. It remained between 100% and 200% above baseline until September, when it experienced several multi-week periods of growth. While the September-November periods of traffic growth also occurred in 2023, they peaked at under 90% above baseline.</p><p>The impact of significant Internet outages is also clearly visible when looking at data across the year. Two significant Internet outages in <a href="https://radar.cloudflare.com/year-in-review/2024/cu#internet-traffic-growth"><u>Cuba</u></a> are clearly visible as large drops in traffic in October and November. A reported “complete disconnection” of the national electricity system on the island <a href="https://x.com/CloudflareRadar/status/1847325224208891950"><u>occurred on October 18</u></a>, lasting <a href="https://x.com/CloudflareRadar/status/1848680148813406474"><u>just over three days</u></a>. Just a couple of weeks later, on November 6, <a href="https://x.com/CloudflareRadar/status/1854291286322544752"><u>damage from Hurricane Rafael caused widespread power outages in Cuba</u></a>, resulting in another large drop in Internet traffic. Traffic has remained lower as Cuba’s electrical infrastructure <a href="https://x.com/CloudflareRadar/status/1864263679442567604"><u>continues to struggle</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rvK8AFYdcJAgQhJQUTiQw/8c4790fd06af8323636878977a9d712c/traffic_-_Cuba.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Cuba</i></sup></p><p>As we frequently discuss in Cloudflare Radar blog and social media posts, government-directed Internet shutdowns occur all too frequently, and the impact of these actions are also clearly visible when looking at long-term traffic data. In <a href="https://radar.cloudflare.com/year-in-review/2024/bd#internet-traffic-growth"><u>Bangladesh</u></a>, the government ordered the <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#bangladesh"><u>shutdown of mobile Internet connectivity</u></a> on July 18, in response to student protests. Shortly after mobile networks were shut down, fixed broadband networks were taken offline as well, resulting in a near complete loss of Internet traffic from the country. Connectivity gradually returned over the course of several days, between July 23-28.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FvubyG6qMeZ9hv1wgFayl/91d356b23788a8f9cdd970cc7e65f8fc/traffic_-_Bangladesh.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Bangladesh</i></sup></p><p>As we also noted last year, the celebration of major holidays can also have a visible impact on Internet traffic at a country level. For example, in Muslim countries including <a href="https://radar.cloudflare.com/year-in-review/2024/ae?compareWith=ID#internet-traffic-growth"><u>Indonesia and the United Arab Emirates</u></a>, the celebration of Eid al-Fitr, the festival marking the end of the fast of Ramadan, is visible as a noticeable drop in traffic around April 9-10. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aFTFP2banlfW65XkjUIZM/84bfd5db1036da1b4740843575217113/traffic_-_UAE_Indonesia.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Indonesia and United Arab Emirates</i></sup></p>
    <div>
      <h3>Google maintained its position as the most popular Internet service. OpenAI, Binance, WhatsApp, and Facebook led their respective categories. </h3>
      <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories">
        
      </a>
    </div>
    <p>Over the last several years, the Year In Review has ranked the <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>most popular Internet services</u></a>. These rankings cover an “overall” perspective, as well as a dozen more specific categories, based on analysis of anonymized query data of traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> from millions of users around the world. For the purposes of these rankings, domains that belong to a single Internet service are grouped together.</p><p>Google once again held the top spot overall, supported by its broad portfolio of services, as well as the popularity of the Android mobile operating system (more on that <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>below</u></a>). Meta properties Facebook, Instagram, and WhatsApp also held spots in the top 10.</p><p><a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> continued to grow in popularity throughout 2024, and in this category, OpenAI again held the top spot, building on the continued success and popularity of ChatGPT. Within Social Media, the top five remained consistent with 2023’s and 2022’s ranking, including Facebook, TikTok, Instagram, X, and Snapchat.</p><p>These categorical rankings, as well as trends seen by specific services, are explored in more detail in a separate blog post, <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><i><u>From ChatGPT to Temu: ranking top Internet services in 2024</u></i></a>.</p>
    <div>
      <h3>Global traffic from Starlink grew 3.3x in 2024, in line with last year’s growth rate. After initiating service in Malawi in July 2023, Starlink traffic from that country grew 38x in 2024.</h3>
      <a href="#global-traffic-from-starlink-grew-3-3x-in-2024-in-line-with-last-years-growth-rate-after-initiating-service-in-malawi-in-july-2023-starlink-traffic-from-that-country-grew-38x-in-2024">
        
      </a>
    </div>
    <p>SpaceX’s Starlink continues to be the leading satellite Internet service provider, bringing connectivity to unserved or underserved areas. In addition to opening up new markets in 2024, Starlink also announced relationships to provide in-flight connectivity to <a href="https://www.cnbc.com/2024/09/17/spacexs-starlink-has-2500-aircraft-under-contract.html"><u>multiple airlines</u></a>, and on <a href="https://x.com/Starlink/status/1790426484022342081"><u>cruise ships</u></a> and <a href="https://x.com/Starlink/status/1857166233969607123"><u>trains</u></a>, as well as enabling subscribers to roam with their subscription using the <a href="https://www.theverge.com/2024/7/11/24196294/starlink-mini-available-us-price-specs"><u>Starlink Mini</u></a>.</p><p>We analyzed aggregate Cloudflare traffic volumes associated with Starlink's primary <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (<a href="https://radar.cloudflare.com/as14593"><u>AS14593</u></a>) to track the growth in usage of the service throughout 2024. Similar to the traffic trends discussed above, the request volume shown on the trend line in the chart represents a seven-day trailing average. Comparisons with 2023 data can be shown by clicking the “Compare” icon at the upper right of the graph. Within comparative views, the lines are scaled to the maximum value shown.</p><p>On a <a href="https://radar.cloudflare.com/year-in-review/2024#starlink-traffic.trends"><u>worldwide</u></a> basis, steady, consistent growth was seen across the year, though it accelerates throughout November. This acceleration may have been driven by traffic associated with customer-specific large software updates. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Dy2qt4O5b3MCswkckhELA/aa29c7235497bed8c985aa9dd9b63477/traffic_-_Starlink_worldwide.png" />
          </figure><p><sup><i>Starlink traffic growth worldwide in 2024</i></sup></p><p>In many locations, there is pent-up demand for “alternative” connectivity providers such as Starlink, and in these countries/regions, we see rapid traffic growth when service becomes available, such as in <a href="https://radar.cloudflare.com/year-in-review/2024/zw#starlink-traffic.trends"><u>Zimbabwe</u></a>. Service availability was <a href="https://x.com/Starlink/status/1832392080481563037"><u>announced on September 7</u></a>, and traffic from the country began to grow rapidly almost immediately thereafter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1aLywcrB5w88flsDyK1R1q/1039d989e19dc566cf5f62e60f3f1886/traffic_-_Starlink_Zimbabwe.png" />
          </figure><p><sup><i>Starlink traffic growth in Zimbabwe in 2024</i></sup></p><p>In new markets, traffic growth continues after that initial increase. For example Starlink service became available in Malawi <a href="https://x.com/Starlink/status/1683897037639790592"><u>in July 2023</u></a>, and throughout 2024, Starlink traffic from the country grew 38x. While <a href="https://radar.cloudflare.com/year-in-review/2024/mw#starlink-traffic.trends"><u>Malawi’s 38x increase</u></a> is impressive, other countries also experienced significant growth. In the Eastern European country of <a href="https://radar.cloudflare.com/year-in-review/2024/ge#starlink-traffic.trends"><u>Georgia</u></a>, <a href="https://x.com/Starlink/status/1719581885200998485"><u>service became available on November 1, 2023</u></a>. After a slow ramp, traffic began to take off growing over 100x through 2024. In <a href="https://radar.cloudflare.com/year-in-review/2024/py#starlink-traffic.trends"><u>Paraguay</u></a>, <a href="https://x.com/Starlink/status/1737914318522581489"><u>service availability was announced on December 21</u></a>, and began to grow at the beginning of January, registering an increase of over 900x across the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6AXOON7CO7XgnWSNnezoiF/bd56192d682c574a2d242845bb0eda16/traffic_-_Starlink_Malawi.png" />
          </figure><p><sup><i>Starlink traffic growth in Malawi in 2024</i></sup></p>
    <div>
      <h3>Googlebot was responsible for the highest volume of request traffic to Cloudflare in 2024 as it retrieved content from millions of Cloudflare customer sites for search indexing. </h3>
      <a href="#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2024-as-it-retrieved-content-from-millions-of-cloudflare-customer-sites-for-search-indexing">
        
      </a>
    </div>
    <p>Cloudflare Radar shows users Internet traffic trends over a selected period of time, but at a country/region or network level. However, <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2023"><u>as we did in 2023</u></a>, we again wanted to look at the traffic Cloudflare saw over the course of the full year from the entire IPv4 Internet. To do so, we can use <a href="https://en.wikipedia.org/wiki/Hilbert_curve"><u>Hilbert curves</u></a>, which allow us to visualize a sequence of IPv4 addresses in a two-dimensional pattern that keeps nearby IP addresses close to each other, making them <a href="https://xkcd.com/195/"><u>useful</u></a> for surveying the Internet's IPv4 address space.</p><p>Using a Hilbert curve, we can <a href="https://radar.cloudflare.com/year-in-review/2024#ipv4-traffic-distribution"><u>visualize aggregated IPv4 request traffic to Cloudflare</u></a> from January 1 through December 1, 2024. Within the visualization, we aggregate IPv4 addresses at a <a href="https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf"><u>/20</u></a> level, meaning that at the highest zoom level, each square represents traffic from 4,096 IPv4 addresses. This aggregation is done to keep the amount of data used for the visualization manageable. (While we would like to create a similar visualization for IPv6 traffic, the enormity of the full IPv6 address space would make associated traffic very <a href="https://observablehq.com/@vasturiano/hilbert-map-of-ipv6-address-space"><u>hard to see</u></a> in such a visualization, especially as such a small amount has been <a href="https://www.iana.org/numbers/allocations/"><u>allocated for assignment by the Regional Internet Registries</u></a>.)</p><p>Within the visualization, IP addresses are grouped by ownership, and for much of the IP address space shown there, a mouseover at the default zoom level will show the <a href="https://www.nro.net/about/rirs/"><u>Regional Internet Registry (RIR)</u></a> that the address block belongs to. However, there are also a number of blocks that were assigned prior to the existence of the RIR system, and for these, they are labeled with the name of the organization that owns them. Progressive zooming ultimately shows the autonomous system and country/region that the IP address block is associated with, as well as its share of traffic relative to the maximum. (If a country/region is selected, only the IP address blocks associated with that location are visible.) Overall traffic shares are indicated by shading based on a color scale, and although a number of large unshaded blocks are visible, this does not necessarily mean that the associated address space is unused, but rather that it may be used in a way that does not generate traffic to Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6gtrL1H2gUjSKH7AMSabgM/361d38f34860258449a914e26519a4b4/traffic_-_Hilbert_curve.png" />
          </figure><p><sup><i>Hilbert curve showing aggregated 2024 traffic to Cloudflare across the IPv4 Internet</i></sup></p><p>Warmer orange/red shading within the visualization represents areas of higher request volume, and buried within one of those areas is the IP address block that had the maximum request volume to Cloudflare during 2024. As it was in 2023, this address block was <a href="https://radar.cloudflare.com/routing/prefix/66.249.64.0/20"><u>66.249.64.0/20</u></a>, which belongs to Google, and is <a href="https://developers.google.com/static/search/apis/ipranges/googlebot.json"><u>one of several</u></a> used by the <a href="https://developers.google.com/search/docs/crawling-indexing/googlebot"><u>Googlebot</u></a> web crawler to retrieve content for search indexing. This use of that address space is a likely explanation for the high request volume, given the number of web properties on Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/g5rQhT7r4DsgpzYdMT3QT/0d6809d96791ee7165ada170d24156e3/traffic_-_Hilbert_curve_Googlebot.png" />
          </figure><p><sup><i>Zoomed Hilbert curve view showing the IPv4 address block that generated the highest volume of requests</i></sup></p><p>In addition to Google, owners of other prefixes in the top 20 include Alibaba, Microsoft, Amazon, and Apple. To explore the IPv4 Internet in more detail, we encourage you to go to <a href="https://radar.cloudflare.com/year-in-review/2024/#ipv4-traffic-distribution"><u>the Year in Review microsite</u></a> and explore it by dragging and zooming to move around IPv4 address space.</p>
    <div>
      <h3>Among AI bots and crawlers, Bytespider (ByteDance) traffic gradually declined over the course of 2024, while ClaudeBot (Anthropic) was more active during the back half of the year.</h3>
      <a href="#among-ai-bots-and-crawlers-bytespider-bytedance-traffic-gradually-declined-over-the-course-of-2024-while-claudebot-anthropic-was-more-active-during-the-back-half-of-the-year">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">AI bots and crawlers</a> have been in the news throughout 2024 as they voraciously consume content to train ever-evolving models. Controversy has followed them, as not all bots and crawlers respect content owner directives to restrict crawling activity. In July, Cloudflare enabled customers to <a href="https://blog.cloudflare.com/declaring-your-aindependence-block-ai-bots-scrapers-and-crawlers-with-a-single-click/"><u>block these bots and crawlers with a single click</u></a>, and during Birthday Week <a href="https://blog.cloudflare.com/cloudflare-ai-audit-control-ai-content-crawlers/"><u>we introduced AI Audit</u></a> to give website owners even more visibility into and control over how AI platforms access their content. </p><p>Tracking traffic trends for AI bots can help us better understand their activity over time — observing which are the most aggressive and have the highest volume of requests, which perform crawls on a regular basis, etc. The new <a href="https://radar.cloudflare.com/traffic#ai-bot-crawler-traffic"><u>AI bot &amp; crawler traffic graph on Radar’s Traffic page</u></a>, <a href="https://blog.cloudflare.com/bringing-ai-to-cloudflare/#ai-bot-traffic-insights-on-cloudflare-radar"><u>launched in September</u></a>, provides insight into these traffic trends gathered over the selected time period for the top known AI bots. </p><p><a href="https://radar.cloudflare.com/year-in-review/2024#ai-bot-and-crawler-traffic"><u>Looking at traffic trends</u></a> from two of those bots, we can see some interesting patterns. <a href="https://darkvisitors.com/agents/bytespider"><u>Bytespider</u></a> is a crawler operated by ByteDance, the Chinese owner of TikTok, and is reportedly used to download training data for ByteDance’s Large Language Models (LLMs). Bytespider’s crawling activity trended generally downwards over the course of 2024, with end-of-November activity approximately 80-85% lower than that seen at the start of the year. <a href="https://darkvisitors.com/agents/claudebot"><u>ClaudeBot</u></a> is Anthropic’s crawler, which downloads training data for its LLMs that power AI products like Claude. Traffic from ClaudeBot appeared to be mostly non-existent through mid-April, except for some small spikes that possibly represent test runs. Traffic became more consistently non-zero starting in late April, but after an early spike, trailed off through the remainder of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7cm0SG0GC36Z3dFu3A6p3J/10a6e32a469984b2083ee0c2ed743d53/traffic_-_AI_bots_--_NEW.png" />
          </figure><p><sup><i>Traffic trends for AI crawlers Bytespider and ClaudeBot in 2024</i></sup></p><p>Traffic trends for the full list of AI bots &amp; crawlers can be found in the <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;dt=2024-01-01_2024-12-31"><u>Cloudflare Radar Data Explorer</u></a>.</p>
    <div>
      <h3>13.0% of TLS 1.3 traffic is using post-quantum encryption.</h3>
      <a href="#13-0-of-tls-1-3-traffic-is-using-post-quantum-encryption">
        
      </a>
    </div>
    <p>The term “<a href="https://en.wikipedia.org/wiki/Post-quantum_cryptography"><u>post-quantum</u></a>” refers to a new set of cryptographic techniques designed to protect data from adversaries that have the ability to capture and store current data for decryption by sufficiently powerful quantum computers in the future. The Cloudflare Research team has been <a href="https://blog.cloudflare.com/sidh-go/"><u>exploring post-quantum cryptography since 2017</u></a>.</p><p>In October 2022, we enabled <a href="https://blog.cloudflare.com/post-quantum-for-all/"><u>post-quantum key agreement</u></a> on our network by default, but use of it requires that browsers and clients support it as well. In 2024, Google's <a href="https://developer.chrome.com/release-notes/124"><u>Chrome 124</u></a> enabled it by default on April 17, and <a href="https://radar.cloudflare.com/year-in-review/2024#post-quantum-encryption"><u>adoption grew rapidly following that release</u></a>, increasing from just over 2% of requests to around 12% within a month, and ended November at 13%. We expect that adoption will continue to grow into and during 2025 due to support in other Chromium-based browsers, growing default support in Mozilla Firefox, and initial testing in Apple Safari.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ipRtCowVftgad37ht9uMF/68958f72a47bbc179959c2d7ac6cdd72/traffic_-_post-quantum_worldwide.png" />
          </figure><p><sup><i>Growth trends in post-quantum encrypted TLS 1.3 traffic during 2024</i></sup></p>
    <div>
      <h2>Adoption &amp; Usage insights</h2>
      <a href="#adoption-usage-insights">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/177RCO2sEvFJJeJeCBzZim/68acfcc309c57ef2027e9291a5f76d2f/2627_Shield.png" />
          </figure>
    <div>
      <h3>Globally, nearly one-third of mobile device traffic was from Apple iOS devices. Android had a &gt;90% share of mobile device traffic in 29 countries/regions; peak iOS mobile device traffic share was over 60% in eight countries/regions.</h3>
      <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions">
        
      </a>
    </div>
    <p>The two leading mobile device operating systems globally are <a href="https://en.wikipedia.org/wiki/IOS"><u>Apple’s iOS</u></a> and <a href="https://en.wikipedia.org/wiki/Android_(operating_system)"><u>Google’s Android</u></a>, and by analyzing information in the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>user agent</u></a> reported with each request, we can get insight into the distribution of traffic by client operating system throughout the year. Again, we found that Android is responsible for the majority of mobile device traffic when aggregated globally, due to the wide distribution of price points, form factors, and capabilities.</p><p>Similar to <a href="https://radar.cloudflare.com/year-in-review/2023#ios-vs-android"><u>2023’s findings</u></a>, Android was once again <a href="https://radar.cloudflare.com/year-in-review/2024#ios-vs-android"><u>responsible for just over two-thirds of mobile device traffic</u></a>. Looking at the top countries for Android traffic, we find a greater than 95% share in <a href="https://radar.cloudflare.com/year-in-review/2024/sd#ios-vs-android"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/bd#ios-vs-android"><u>Bangladesh</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/tm#ios-vs-android"><u>Turkmenistan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/mw#ios-vs-android"><u>Malawi</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/pg#ios-vs-android"><u>Papua New Guinea</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/sy#ios-vs-android"><u>Syria</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/ye#ios-vs-android"><u>Yemen</u></a>, up from just two countries in 2023. Similar to last year, we again found that countries/regions with higher levels of Android usage are largely in Africa, Oceania/Asia, and South America, and that many have lower levels of <a href="https://ourworldindata.org/grapher/gross-national-income-per-capita?tab=table"><u>gross national income per capita</u></a>. In these countries/regions, the availability of lower priced “budget” Android devices supports increased adoption.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9bsuRwzYBybYpOiKqwLja/cbdafb60eab1913a91ec916899d1e807/connectivity_-_mobile_desktop.png" />
          </figure><p><sup><i>Global distribution of mobile device traffic by operating system in 2024</i></sup></p><p>In contrast, iOS adoption tops out in the 65% range in <a href="https://radar.cloudflare.com/year-in-review/2024/je#ios-vs-android"><u>Jersey</u></a>, the <a href="https://radar.cloudflare.com/year-in-review/2024/fo#ios-vs-android"><u>Faroe Islands</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/gg#ios-vs-android"><u>Guernsey</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/dk#ios-vs-android"><u>Denmark</u></a>. Adoption rates of 50% or more were seen in a total of 26 countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2024/no#ios-vs-android"><u>Norway</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/se#ios-vs-android"><u>Sweden</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/au#ios-vs-android"><u>Australia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/jp#ios-vs-android"><u>Japan</u></a>, the <a href="https://radar.cloudflare.com/year-in-review/2024/us#ios-vs-android"><u>United States</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/ca#ios-vs-android"><u>Canada</u></a>. These locations likely have a greater ability to afford higher priced devices, owing to their comparatively higher gross national income per capita.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QCfjlx0TgEotwU2wPm0hE/af1359f249aec86894b681249fe7ee70/adoption_-_Android_iOS_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest share of iOS traffic in 2024</i></sup></p>
    <div>
      <h3>Globally, nearly half of web requests used HTTP/2, with 20.5% using HTTP/3.</h3>
      <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3">
        
      </a>
    </div>
    <p>HTTP (HyperText Transfer Protocol) is the core protocol that the web relies upon. <a href="https://datatracker.ietf.org/doc/html/rfc1945"><u>HTTP/1.0</u></a> was first standardized in 1996, <a href="https://www.rfc-editor.org/rfc/rfc2616.html"><u>HTTP/1.1</u></a> in 1999, and <a href="https://www.rfc-editor.org/rfc/rfc7540.html"><u>HTTP/2</u></a> in 2015. The most recent version, <a href="https://www.rfc-editor.org/rfc/rfc9114.html"><u>HTTP/3</u></a>, was completed in 2022, and runs on top of a new transport protocol known as <a href="https://blog.cloudflare.com/the-road-to-quic/"><u>QUIC</u></a>. By running on top of QUIC, <a href="https://www.cloudflare.com/learning/performance/what-is-http3/"><u>HTTP/3</u></a> can deliver improved performance by mitigating the effects of packet loss and network changes, as well as establishing connections more quickly. HTTP/3 also provides encryption by default, which mitigates the risk of attacks. </p><p>Current versions of desktop and mobile Google Chrome (and Chromium-based variants), Mozilla Firefox, and Apple Safari <a href="https://caniuse.com/?search=http%2F3"><u>all support HTTP/3 by default</u></a>. Cloudflare makes HTTP/3 <a href="https://developers.cloudflare.com/speed/optimization/protocol/http3/"><u>available for free</u></a> to all of our customers, although not every customer chooses to enable it.</p><p>Analysis of the HTTP version negotiated for each request provides insight into the distribution of traffic by the various versions of the protocol aggregated across the year. (“HTTP/1.x” aggregates requests made over HTTP/1.0 and HTTP/1.1.) At a <a href="https://radar.cloudflare.com/year-in-review/2024#http-versions"><u>global</u></a> level, 20.5% of requests in 2024 were made using HTTP/3. Another 29.9% of requests were made over the older HTTP/1.x versions, while HTTP/2 remained dominant, accounting for the remaining 49.6%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/r7KQkjdsXXEtxHoEkFQbO/efb19d1bbd58bef3d657b96555d70103/adoption_-_HTTP_versions_global.png" />
          </figure><p><sup><i>Global distribution of traffic by HTTP version in 2024</i></sup></p><p>Looking at version distribution geographically, we found eight countries/regions sending more than a third of their requests over HTTP/3, with <a href="https://radar.cloudflare.com/year-in-review/2024/re#http-versions"><u>Reunion</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/lk#http-versions"><u>Sri Lanka</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/mn#http-versions"><u>Mongolia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/gr#http-versions"><u>Greece</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/mk#http-versions"><u>North Macedonia</u></a> comprising the top five as shown below. Eight other countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2024/ir#http-versions"><u>Iran</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/ie#http-versions"><u>Ireland</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/hk#http-versions"><u>Hong Kong</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/cn#http-versions"><u>China</u></a>, sent more than half of their requests over HTTP/1.x throughout 2024. More than half of requests were made over HTTP/2 in a total of 147 countries/regions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Zq4mMgbvw6jT6pb6LLdF7/401b98731302233b6f9674e74196e819/adoption_-_HTTP_versions_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of HTTP/3 traffic in 2024</i></sup></p>
    <div>
      <h3>React, PHP, and jQuery were among the most popular technologies used to build websites, while Hubspot, Google, and WordPress were among the most popular vendors of supporting services and platforms.</h3>
      <a href="#react-php-and-jquery-were-among-the-most-popular-technologies-used-to-build-websites-while-hubspot-google-and-wordpress-were-among-the-most-popular-vendors-of-supporting-services-and-platforms">
        
      </a>
    </div>
    <p>Modern websites and applications are extremely complex, built on and integrating on a mix of frameworks, platforms, services, and tools. In order to deliver a seamless user experience, developers must ensure that all of these components happily coexist with each other. Using <a href="https://radar.cloudflare.com/scan"><u>Cloudflare Radar’s URL Scanner</u></a>, we again scanned websites associated with the <a href="https://radar.cloudflare.com/domains"><u>top 5000 domains</u></a> to identify the <a href="https://radar.cloudflare.com/year-in-review/2024#website-technologies"><u>most popular technologies and services</u></a> used across a dozen different categories. </p><p>In looking at core technologies used to build websites, <a href="https://react.dev/"><u>React</u></a> had a commanding lead over <a href="https://vuejs.org/"><u>Vue.js</u></a> and other JavaScript frameworks, <a href="https://www.php.net/"><u>PHP</u></a> was the most popular programming technology, and <a href="https://jquery.com/"><u>jQuery</u></a>’s share was 10x other popular JavaScript libraries.</p><p>Third-party services and platforms are also used by websites and applications to support things like analytics, content management, and marketing automation. Google Analytics remained the most widely used analytics provider, WordPress had a greater than 50% share among content management systems, and for marketing automation providers, category leader HubSpot had nearly twice the usage share of Marketo and MailChimp.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fJS1OpqRlVCsZ9VOXdU89/c01320ff9d20da4ad2471de780a86033/adoption_-_top_website_technologies.png" />
          </figure><p><sup><i>Top website technologies, JavaScript frameworks category in 2024</i></sup></p>
    <div>
      <h3>Go surpassed NodeJS as the most popular language used for making automated API requests.</h3>
      <a href="#go-surpassed-nodejs-as-the-most-popular-language-used-for-making-automated-api-requests">
        
      </a>
    </div>
    <p>Many dynamic websites and applications are built on <a href="https://blog.cloudflare.com/2024-api-security-report/"><u>automated API calls</u></a>, and we can use our unique visibility into Web traffic to identify the top languages these API clients are written in. Applying heuristics to API-related requests determined to not be coming from a person using a browser or native mobile application helps us to identify the language used to build the API client.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#api-client-language-popularity"><u>Our analysis</u></a> found that almost 12% of automated API requests are made by <a href="https://go.dev/"><u>Go</u></a>-based clients, with <a href="https://nodejs.org/en/"><u>NodeJS</u></a>, <a href="https://www.python.org/"><u>Python</u></a>, <a href="https://www.java.com/"><u>Java</u></a>, and <a href="https://dotnet.microsoft.com/"><u>.NET</u></a> holding smaller shares. Compared to <a href="https://radar.cloudflare.com/year-in-review/2023#api-client-language-popularity"><u>2023</u></a>, Go’s share increased by approximately 40%, allowing it to capture the top spot, while NodeJS’s share fell by just over 30%. Python and Java also saw their shares increase, while .NET’s fell.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oq8vCSsDq57HNYCbEV59n/9373b727f7f7da45be317ba34d23dcab/adoption_-_api_client_languages.png" />
          </figure><p><sup><i>Most popular API client languages in 2024</i></sup></p>
    <div>
      <h3>Google is the most popular search engine globally, across all platforms. On mobile devices/OS, Baidu is a distant second. Bing is a distant second across desktop and Windows devices, with DuckDuckGo second most popular on macOS. </h3>
      <a href="#google-is-the-most-popular-search-engine-globally-across-all-platforms-on-mobile-devices-os-baidu-is-a-distant-second-bing-is-a-distant-second-across-desktop-and-windows-devices-with-duckduckgo-second-most-popular-on-macos">
        
      </a>
    </div>
    <p>Protecting and accelerating websites and applications for millions of customers, Cloudflare is in a unique position to measure search engine market share data. Our methodology uses HTTP’s <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer"><u>referer header</u></a> to identify the search engine sending traffic to customer sites and applications. The market share data is presented as an overall aggregate, as well as broken out by device type and operating system. (Device type and operating system data is derived from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> headers accompanying a content request.)</p><p>Aggregated at a <a href="https://radar.cloudflare.com/year-in-review/2024#search-engine-market-share"><u>global</u></a> level, Google referred the most traffic to Cloudflare customers, with a greater than 88% share across 2024. Yandex, Baidu, Bing, and DuckDuckGo round out the top five, all with single digit percentage shares. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bwTSu9NktZ9chotEmTQhs/fd231b3f13fe4709ca7480546276d2e0/adoption_-_search_engine_overall_worldwide.png" />
          </figure><p><sup><i>Overall worldwide search engine market share in 2024</i></sup></p><p>However, when drilling down by location or platform, differences are apparent in the top search engines and their shares. For example, in <a href="https://radar.cloudflare.com/year-in-review/2024/kr#search-engine-market-share"><u>South Korea</u></a>, Google is responsible for only two-thirds of referrals, while local platform <a href="https://www.naver.com/"><u>Naver</u></a> drives 29.2%, with local portal <a href="https://www.daum.net/"><u>Daum</u></a> also in the top five at 1.3%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/rxOIPPwpJSt73X1GXH8t4/5597fd261ec7fda2cf357c70479be13f/adoption_-_search_engine_overall_South_Korea.png" />
          </figure><p><sup><i>Overall search engine market share in South Korea in 2024</i></sup></p><p>Google’s dominance is also blunted a bit on Windows devices, where it drives only 80% of referrals globally. Unsurprisingly, Bing holds the second spot for Windows users, with a 10.4% share. Yandex, Yahoo, and DuckDuckGo round out the top 5, all with shares below 5%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sKOs50fTPbchv55J7gQrM/1ce8b0c1287bbd5b35d9e987e2061207/adoption_-_search_engine_overall_worldwide_Windows.png" />
          </figure><p><sup><i>Overall worldwide search engine market share for Windows devices in 2024</i></sup></p><p>For additional details, including search engines aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/search-engines"><u>Search Engine Referral Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h3>Google Chrome is the most popular browser overall. While also true on MacOS devices, Safari usage is well ahead of Chrome on iOS devices. On Windows, Edge is the second most popular browser. </h3>
      <a href="#google-chrome-is-the-most-popular-browser-overall-while-also-true-on-macos-devices-safari-usage-is-well-ahead-of-chrome-on-ios-devices-on-windows-edge-is-the-second-most-popular-browser">
        
      </a>
    </div>
    <p>Similar to our ability to measure search engine market share, Cloudflare is also in a unique position to measure browser market share. Our methodology uses information from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> headers to identify the browser making content requests, along with the associated operating system. Browser market share data is presented as an overall aggregate, as well as broken out by device type and operating system. Note that the shares of browsers available on both desktop and mobile devices, such as Chrome or Safari, are presented in aggregate.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#browser-market-share"><u>Globally</u></a>, we found that 65.8% of requests came from Google’s Chrome browser across 2024, and that just 15.5% came from Apple’s Safari browser. Microsoft Edge, Mozilla Firefox, and the <a href="https://www.samsung.com/us/support/owners/app/samsung-internet"><u>Samsung Internet browser</u></a> rounded out the top five, all with shares below 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bEuEbqSrAqe57gnBTeL6c/4426dc0dbc8869d05344433535e0698a/adoption_-_browser_overall_worldwide.png" />
          </figure><p><sup><i>Overall worldwide web browser market share in 2024</i></sup></p><p>Similar to the search engine statistics discussed above, differences are clearly visible when drilling down by location or platform. In some countries where iOS holds a larger market share than Android, Chrome remains the leading browser, but by a much lower margin. For example, in <a href="https://radar.cloudflare.com/year-in-review/2024/se#browser-market-share"><u>Sweden</u></a>, Chrome’s share fell to 56.2%, while Safari’s increased to 22.5%. In <a href="https://radar.cloudflare.com/year-in-review/2024/no#browser-market-share"><u>Norway</u></a>, Chrome fell to just 50%, while Safari grew to 25.6%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Dkt8A1HuUpg61G8GYkEXs/5c2649e96d2959a2606afa9d932d5b82/adoption_-_browser_overall_Norway.png" />
          </figure><p><sup><i>Overall web browser market share in Norway in 2024</i></sup></p><p>As the default browser on devices running iOS, Apple Safari was the most popular browser for iOS devices, commanding an 81.7% market share across the year, with Chrome at just 16.1%. And despite being the preinstalled default browser on Windows devices, Edge held just a 17.3% share, in comparison to Chrome’s 68.5%</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Hvnf7VPBuVTjba0P1bGRU/6d6e31c609a54c8248afe120576210aa/adoption_-_browser_overall_worldwide_iOS.png" />
          </figure><p><sup><i>Overall worldwide web browser market share for iOS devices in 2024</i></sup></p><p>For additional details, including browsers aggregated under “Other”, please refer to the quarterly <u>Browser Market Share Reports</u> on Cloudflare Radar.</p>
    <div>
      <h2>Connectivity</h2>
      <a href="#connectivity">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xC8lBdDHpahlvkJrf1nI9/7b050dc62c1628e3a5ab3a9418e572d3/2627_Rocket.png" />
          </figure>
    <div>
      <h3>225 major Internet outages were observed around the world in 2024, with many due to government-directed regional and national shutdowns of Internet connectivity.</h3>
      <a href="#225-major-internet-outages-were-observed-around-the-world-in-2024-with-many-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity">
        
      </a>
    </div>
    <p>Throughout 2024, as we have over the last several years, we have written frequently about observed Internet outages, whether due to <a href="https://blog.cloudflare.com/east-african-internet-connectivity-again-impacted-by-submarine-cable-cuts"><u>cable cuts</u></a>, <a href="https://blog.cloudflare.com/impact-of-verizons-september-30-outage-on-internet-traffic/"><u>unspecified technical issues</u></a>, <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>government-directed shutdowns</u></a>, or a number of other reasons covered in our quarterly summary posts (<a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary"><u>Q3</u></a>). The impacts of these outages can be significant, including significant economic losses and severely limited communications. The <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> tracks these Internet outages, and uses Cloudflare traffic data for insights into their scope and duration.</p><p>Some of the outages seen through the year were short-lived, lasting just a few hours, while others stretched on for days or weeks. In the latter category, an Internet outage in <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#haiti"><u>Haiti</u></a> dragged on for eight days in September because repair crews were barred from accessing a damaged submarine cable due to a business dispute, while shutdowns of mobile and fixed Internet providers in <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#bangladesh"><u>Bangladesh</u></a> lasted for approximately 10 days in July. In the former category, <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#iraqi-kurdistan"><u>Iraq</u></a> frequently experienced multi-hour nationwide Internet shutdowns intended to prevent cheating on academic exams — these contribute to the clustering visible in the timeline during June, July, August, and September.</p><p>Within the <a href="https://radar.cloudflare.com/year-in-review/2024#internet-outages"><u>timeline</u></a> on the Year in Review microsite, hovering over a dot will display metadata about that outage, and clicking on it will open a page with additional information. Below the map and timeline, we have added a bar graph illustrating the recorded reasons associated with the observed outages. In 2024, over half were due to government-directed shutdowns. If a country/region is selected, only outages and reasons for that country/region will be displayed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VDxaH2IkD28RXrcStCn8j/39ce7ad40f6a3d59e155ff09664f80e0/connectivity_-_Internet_outage_map.png" />
          </figure><p><sup><i>Over 200 Internet outages were observed around the world during 2024</i></sup></p>
    <div>
      <h3>Aggregated across 2024, 28.5% of IPv6-capable requests were made over IPv6. India and Malaysia were the strongest countries, at 68.9% and 59.6% IPv6 adoption respectively.</h3>
      <a href="#aggregated-across-2024-28-5-of-ipv6-capable-requests-were-made-over-ipv6-india-and-malaysia-were-the-strongest-countries-at-68-9-and-59-6-ipv6-adoption-respectively">
        
      </a>
    </div>
    <p>The IPv4 protocol still used by many Internet-connected devices was developed in the 1970s, and was never meant to handle the vast and growing scale of the modern Internet. An <a href="https://www.rfc-editor.org/rfc/rfc1883"><u>initial specification for its successor</u></a>, IPv6, was published in December 1995, evolving to a <a href="https://www.rfc-editor.org/rfc/rfc2460"><u>draft standard</u></a> three years later, offering an expanded address space intended to better support the expected growth in the number of Internet-connected devices. At this point, available IPv4 space has long since been <a href="https://ipv4.potaroo.net/"><u>exhausted</u></a>, and connectivity providers use solutions like <a href="https://en.wikipedia.org/wiki/Network_address_translation"><u>Network Address Translation</u></a> to stretch limited IPv4 resources. Hungry for IPv4 address space as their businesses and infrastructure grow, cloud and hosting providers are acquiring blocks of IPv4 address space for <a href="https://auctions.ipv4.global/"><u>as much as \$30 - \$50 per address</u></a>. </p><p>Cloudflare has been a vocal and active advocate for IPv6 since 2011, when we announced our <a href="https://blog.cloudflare.com/introducing-cloudflares-automatic-ipv6-gatewa/"><u>Automatic IPv6 Gateway</u></a>, which enabled free IPv6 support for all of our customers. In 2014, we enabled <a href="https://blog.cloudflare.com/i-joined-cloudflare-on-monday-along-with-5-000-others"><u>IPv6 support by default for all of our customers</u></a>, but not all customers choose to keep it enabled for a variety of reasons. Note that server-side support is only half of the equation for driving IPv6 adoption, as end user connections need to support it as well. (In reality, it is a bit more complex than that, but server and client side support across applications, operating systems, and network environments are the two primary requirements. From a network perspective, implementing IPv6 also brings a number of other <a href="https://www.catchpoint.com/benefits-of-ipv6"><u>benefits</u></a>.) By analyzing the IP version used for each request made to Cloudflare, aggregated throughout the year, we can get insight into the distribution of traffic by the various versions of the protocol.</p><p>At a <a href="https://radar.cloudflare.com/year-in-review/2024#ipv6-adoption"><u>global</u></a> level, 28.5% of IPv6-capable (“<a href="https://www.techopedia.com/definition/19025/dual-stack-network"><u>dual-stack</u></a>”) requests were made over IPv6, up from 26.4% in <a href="https://radar.cloudflare.com/year-in-review/2024?previousYear=true"><u>2023</u></a>. <a href="https://radar.cloudflare.com/year-in-review/2024/in#ipv6-adoption"><u>India</u></a> was again the country with the highest level of IPv6 adoption, at 68.9%, carried in large part by <a href="https://radar.cloudflare.com/adoption-and-usage/as55836?dateStart=2024-01-01&amp;dateEnd=2024-12-01"><u>94% IPv6 adoption at Reliance Jio</u></a>, one of the country’s largest Internet service providers. India was followed closely by <a href="https://radar.cloudflare.com/year-in-review/2024/my#ipv6-adoption"><u>Malaysia</u></a>, where 59.6% of dual-stacked requests were made over IPv6 during 2024, thanks to <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=ases&amp;loc=MY&amp;dt=14d&amp;metric=ip_version%2FIPv6"><u>strong IPv6 adoption rates across leading Internet providers</u></a> within the country. IPv6 adoption in India was up from 66% in <a href="https://radar.cloudflare.com/year-in-review/2024/in?previousYear=true#ipv6-adoption"><u>2023</u></a>, and in Malaysia, it was up from 57.3% <a href="https://radar.cloudflare.com/year-in-review/2024/my?previousYear=true#ipv6-adoption"><u>last year</u></a>. <a href="https://radar.cloudflare.com/year-in-review/2024/sa#ipv6-adoption"><u>Saudi Arabia</u></a> was the only other country with an IPv6 adoption rate above 50% this year, at 51.8%, whereas that list also included <a href="https://radar.cloudflare.com/year-in-review/2023/vn#ipv6-adoption"><u>Vietnam</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/gr#ipv6-adoption"><u>Greece</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/fr#ipv6-adoption"><u>France</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/uy#ipv6-adoption"><u>Uruguay</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/th#ipv6-adoption"><u>Thailand</u></a> in 2023. Thirty four countries/regions, including many in Africa, still have IPv6 adoption rates below 1%, while a total of 96 countries/regions have adoption rates below 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48L0qRLujnWQRuJ8ZMa8Ed/ac5209577812dd556d275279d4740041/connectivity_-_IPv6_adoption.png" />
          </figure><p><sup><i>Global distribution of traffic by IP version in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/NjeXm7lfs7ZGM3Gn5ToZM/3b401894664cb22347db1a8d8a2bfdc8/connectivity_-_IPv6_adoption_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of IPv6 traffic in 2024</i></sup></p>
    <div>
      <h3>The top 10 countries ranked by Internet speed all had average download speeds above 200 Mbps. Spain was consistently among the top locations across measured Internet quality metrics.</h3>
      <a href="#the-top-10-countries-ranked-by-internet-speed-all-had-average-download-speeds-above-200-mbps-spain-was-consistently-among-the-top-locations-across-measured-internet-quality-metrics">
        
      </a>
    </div>
    <p>As more and more of our everyday lives move online, including entertainment, work, education, finance, shopping, and even basic social and personal interaction, the quality of our Internet connections is arguably more important than ever, necessitating higher connection speeds and lower latency. Although Internet providers continue to evolve their service portfolios to offer increased connection speeds and reduced latency in order to support growth in use cases like videoconferencing, live streaming, and online gaming, consumer adoption is often mixed due to cost, availability, or other issues. By aggregating the results of <a href="https://speed.cloudflare.com/"><u>speed.cloudflare.com</u></a> tests taken during 2024, we can get a geographic perspective on <a href="https://developers.cloudflare.com/radar/glossary/#connection-quality"><u>connection quality</u></a> metrics including average download and upload speeds, and average idle and loaded latencies, as well as the distribution of the measurements.</p><p>In <a href="https://radar.cloudflare.com/year-in-review/2024#internet-quality"><u>2024</u></a>, Spain was a leader in download speed (292.6 Mbps) and upload speed (192.6 Mbps) metrics, and placed second globally for loaded latency (78.6 ms). (Loaded latency is the round-trip time when data-heavy applications are being used on the network.) Spain’s leadership in these connection quality metrics is supported by the strong progress that the country has made <a href="https://ec.europa.eu/newsroom/dae/redirection/document/106695"><u>towards achieving the EU’s “Digital Decade” objectives</u></a>, including fixed very high capacity network (VHCN) deployment, fiber-to-the-premises (FTTP) coverage, and 5G coverage with the latter two <a href="https://www.trade.gov/country-commercial-guides/spain-digital-economy"><u>reaching</u></a> 95.2% and 92.3% respectively. High speed fiber broadband connections are also relatively affordable, with research showing major providers offering 100 Mbps, 300 Mbps, 600 Mbps, and 1 Gbps packages, with the latter priced between €30 and €46 per month. The figures below for <a href="https://radar.cloudflare.com/year-in-review/2024/es#internet-quality"><u>Spain</u></a> show the largest clusters of speed measurements around the 100 Mbps mark, with slight bumps also visible around 300 Mbps, suggesting that the former package has the highest subscription rate, followed by the latter. Further, they show these connections are also relatively low latency, with 87% of idle latency measurements below 50 ms and 65% of loaded latency measurements below 100 ms, providing users with good <a href="https://www.screenbeam.com/wifihelp/wifibooster/how-to-reduce-latency-or-lag-in-gaming-2/#:~:text=Latency%20is%20measured%20in%20milliseconds,%2C%2020%2D40ms%20is%20optimal."><u>gaming</u></a> and <a href="https://www.haivision.com/glossary/video-latency/#:~:text=Low%20latency%20is%20typically%20defined,and%20streaming%20previously%20recorded%20events."><u>videoconferencing/streaming</u></a> experiences.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51PcbNyPpAQX79gYg0SxIU/a784aaadd65822d3384f1463570a6129/connectivity_-_Spain_bandwidth.png" />
          </figure><p><sup><i>Measured download/upload speed distribution in Spain in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Refsg6ctWdHNzscsoIDDF/75da3336fa1e31fd71a2188787944a57/connectivity_-_Spain_latency.png" />
          </figure><p><sup><i>Measured idle/loaded latency distribution in Spain in 2024</i></sup></p>
    <div>
      <h3>41.3% of global traffic comes from mobile devices. In nearly 100 countries/regions, the majority of traffic comes from mobile devices.</h3>
      <a href="#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices">
        
      </a>
    </div>
    <p>With approximately <a href="https://www.statista.com/topics/840/smartphones/#topicOverview"><u>70% of the world’s population using smartphones</u></a>, and <a href="https://www.pewresearch.org/internet/fact-sheet/mobile/"><u>91% of Americans owning a smartphone</u></a>, these mobile devices have become an integral part of both our personal and professional lives, providing us with Internet access from nearly any place at any time. In some countries/regions, mobile devices primarily connect to the Internet via Wi-Fi, while other countries/regions are “mobile first”, where 4G/5G services are the primary means of Internet access.</p><p>Analysis of information contained with the user agent reported with each request to Cloudflare enables us to categorize it as coming from a mobile, desktop, or other type of device. Aggregating this categorization throughout the year at a <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>global</u></a> level, we found that 41.3% of traffic came from mobile devices, with 58.7% coming from desktop devices such as laptops and “classic” PCs. These traffic shares were in line with those measured in both <a href="https://radar.cloudflare.com/year-in-review/2023#mobile-vs-desktop"><u>2023</u></a> and 2022, suggesting that mobile device usage has achieved a “steady state”. Over 77% of traffic came from mobile devices in <a href="https://radar.cloudflare.com/year-in-review/2024/sd#mobile-vs-desktop"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/cu#mobile-vs-desktop"><u>Cuba</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/sy#mobile-vs-desktop"><u>Syria</u></a>, making them the countries/regions with the largest mobile device traffic share in 2024. Other countries/regions that had more than 50% of traffic come from mobile devices were concentrated in the Middle East/Africa, the Asia Pacific region, and South/Central America. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9bsuRwzYBybYpOiKqwLja/cbdafb60eab1913a91ec916899d1e807/connectivity_-_mobile_desktop.png" />
          </figure><p><sup><i>Global distribution of traffic by device type in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KRujuREGMTBvLHVAHonuU/ad575fdd822ee3ee0bcabd41a96ef736/connectivity_-_mobile_desktop_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of mobile device usage in 2024</i></sup></p>
    <div>
      <h3>20.7% of TCP connections are unexpectedly terminated before any useful data can be exchanged.</h3>
      <a href="#20-7-of-tcp-connections-are-unexpectedly-terminated-before-any-useful-data-can-be-exchanged">
        
      </a>
    </div>
    <p>Cloudflare is in a unique position to help measure the health and behaviors of Internet networks around the world. One way we do this is passively measuring rates of connections to Cloudflare that appear <i>anomalous</i>, meaning that they are unexpectedly terminated before any useful data exchange occurs. The underlying causes of connection anomalies are varied and range from DoS attacks to quirky client behavior to third-party connection tampering (e.g., when a network monitors and selectively disrupts connections to filter content).</p><p>Connection anomalies are symptoms — visible signs that “something abnormal” is happening in a network, but the underlying root cause is not always clear from the outset. However, we can gain a better understanding by incorporating previously-reported network behaviors, active measurements and on-the-ground reports, and macro trends across networks. Additional details on such analysis can be found in the blog posts <a href="https://blog.cloudflare.com/connection-tampering/"><i><u>A global assessment of third-party connection tampering</u></i></a> and<a href="https://blog.cloudflare.com/tcp-resets-timeouts/"> <i><u>Bringing insights into TCP resets and timeouts to Cloudflare Radar</u></i></a>.</p><p>Insights into TCP connection anomalies were <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>launched on Cloudflare Radar</u></a> in September, with the plot lines in the associated graph corresponding to the stage of the TCP connection in which the connection anomalously closed (using shorthand, the first three messages we typically receive from the client in a TCP connection are “SYN” and “ACK” packets to establish a connection, and then a “PSH” packet indicating the requested resource). In aggregate <a href="https://radar.cloudflare.com/year-in-review/2024#tcp-connection-anomalies"><u>globally</u></a>, over 20% of connections to Cloudflare were terminated unexpectedly, with the largest share (nearly half) being closed “Post SYN” — that is, after our server has received a client’s SYN packet, but before we have received a subsequent acknowledgement (ACK) from the client or any useful data that would follow the acknowledgement. These terminations can often be attributed to DoS attacks or Internet scanning. Post-ACK (3.1% globally) and Post-PSH (1.4% globally) anomalies are more often associated with connection tampering, especially when they occur at high rates in specific networks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11XcEAXkMgOhytTbCsf21J/159fa2459ebc6b9c268bd5d8455213ba/connectivity_-_TCP_connection_anomalies.png" />
          </figure><p><sup><i>Trends in TCP connection anomalies by stage in 2024</i></sup></p>
    <div>
      <h2>Security</h2>
      <a href="#security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CkCPZHGlR8gQQQrXt0b5H/cfd3faabbe406fd348b8751825bc43e5/2627_Shield_Globe.png" />
          </figure>
    <div>
      <h3>6.5% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons.</h3>
      <a href="#6-5-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons">
        
      </a>
    </div>
    <p>To <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/"><u>protect customers from threats</u></a> posed by malicious bots used to attack websites and applications, Cloudflare mitigates this attack traffic using <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS</u></a> mitigation techniques or <a href="https://developers.cloudflare.com/waf/managed-rules/"><u>Web Application Firewall (WAF) Managed Rules</u></a>. For a variety of other reasons, customers may also want Cloudflare to mitigate traffic using techniques like <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/"><u>rate-limiting</u></a> requests, or <a href="https://developers.cloudflare.com/waf/tools/ip-access-rules/"><u>blocking all traffic from a given location</u></a>, even if it isn’t malicious. Analyzing traffic to Cloudflare’s network throughout 2024, we looked at the overall share that was mitigated for any reason, as well as the share that was blocked as a DDoS attack or by WAF Managed Rules. </p><p>In 2024, <a href="https://radar.cloudflare.com/year-in-review/2024#mitigated-traffic"><u>6.5% of global traffic was mitigated</u></a>, up almost one percentage point from <a href="https://radar.cloudflare.com/year-in-review/2023#mitigated-traffic"><u>2023</u></a>. Just 3.2% was mitigated as a DDoS attack, or by WAF Managed Rules, a rate slightly higher than in 2023. More than 10% of the traffic originating from 44 countries/regions had mitigations generally applied, while DDoS/WAF mitigations were applied to more than 10% of the traffic originating from just seven countries/regions.</p><p>At a country/region level, <a href="https://radar.cloudflare.com/year-in-review/2024/al?#mitigated-traffic"><u>Albania</u></a> had one of the highest mitigated traffic shares throughout the year, at 42.9%, while <a href="https://radar.cloudflare.com/year-in-review/2024/ly#mitigated-traffic"><u>Libya</u></a> had one of the highest shares of traffic that was mitigated as a DDoS attack or by WAF Managed Rules, at 19.2%. In <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#just-under-6-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons-in-the-united-states-3-65-of-traffic-was-mitigated-while-in-south-korea-it-was-8-36"><u>2023’s Year in Review blog post</u></a>, we highlighted the United States and Korea. This year, the share of mitigated traffic grew to 5.0% in the <a href="https://radar.cloudflare.com/year-in-review/2024/us?#mitigated-traffic"><u>United States</u></a> (up from 3.65% in 2023), while in <a href="https://radar.cloudflare.com/year-in-review/2024/kr?#mitigated-traffic"><u>South Korea</u></a>, it dropped slightly to 8.1%, down from 8.36%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GJ5r18m6Tpor4n2scVRQ5/cc85d08dc2aa496d677d8bfc9439417d/security_-_mitigated_traffic_worldwide.png" />
          </figure><p><sup><i>Trends in mitigated traffic worldwide in 2024</i></sup></p>
    <div>
      <h3>The United States was responsible for over a third of global bot traffic. Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google.</h3>
      <a href="#the-united-states-was-responsible-for-over-a-third-of-global-bot-traffic-amazon-web-services-was-responsible-for-12-7-of-global-bot-traffic-and-7-8-came-from-google">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/"><u>Bot</u></a> traffic describes any non-human Internet traffic, and by monitoring traffic suspected to be from bots site and application owners can spot and, if necessary, block potentially malicious activity. However, not all bots are malicious — bots can also be helpful, and Cloudflare maintains a list of <a href="https://radar.cloudflare.com/traffic/verified-bots"><u>verified bots</u></a> that includes those used for things like search engine indexing, performance testing, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/"><u>availability monitoring</u></a>. Regardless of intent, we analyzed where bot traffic was originating from in 2024, using the IP address of a request to identify the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a>) and country/region associated with the bot making the request. Cloud platforms remained among the leading sources of bot traffic due to a number of factors. These include the ease of using automated tools to quickly provision compute resources, the relatively low cost of using these compute resources in an ephemeral manner, the broadly distributed geographic footprint of cloud platforms, and the platforms’ high-bandwidth Internet connectivity.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#bot-traffic-sources"><u>Globally</u></a>, we found that 68.5% of observed bot traffic came from the top 10 countries in 2024, with the United States responsible for half of that total, over 5x the share of second place Germany. (In comparison to 2023, the US share was up slightly, while Germany’s was down slightly.) Among cloud platforms that originate bot traffic, Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google. Microsoft, Hetzner, Digital Ocean, and OVH all also contributed more than a percent each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qlyS355w5LDtoBDtb1qXE/8354c2b07c0af46121a0c667e6d687e4/security_-_bot_distribution_by_source_country.png" />
          </figure><p><sup><i>Global bot traffic distribution by source country in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6euMUlCDcfOInLiCpssg2t/54eb345624346f24ab984bbe6b1c9f67/security_-_bot_distribution_by_source_network.png" />
          </figure><p><sup><i>Global bot traffic distribution by source network in 2024</i></sup></p>
    <div>
      <h3>Globally, Gambling/Games was the most attacked industry, slightly ahead of 2023’s most targeted industry, Finance.</h3>
      <a href="#globally-gambling-games-was-the-most-attacked-industry-slightly-ahead-of-2023s-most-targeted-industry-finance">
        
      </a>
    </div>
    <p>The industries targeted by attacks often shift over time, depending on the intent of the attackers. They may be trying to cause financial harm by attacking ecommerce sites during a busy shopping period, gain an advantage against opponents by attacking an online game, or make a political statement by attacking government-related sites. To identify industry-targeted attack activity during 2024, we analyzed mitigated traffic for customers that had an associated industry and vertical within their customer record. Mitigated traffic was aggregated weekly by source country/region across 19 target industries.</p><p>Companies in the Gambling/Games industry were, in aggregate, the <a href="https://radar.cloudflare.com/year-in-review/2024#most-attacked-industries"><u>most attacked during 2024</u></a>, with 6.6% of global mitigated traffic targeting the industry. The industry was slightly ahead of Finance, which led 2023’s aggregate list. (Both industries are shown at 6.6% in the Summary view due to rounding.)  Gambling/Games sites saw the largest shares of mitigated traffic in January and the first week of February, possibly related to National Football League playoffs in the United States, heading into the <a href="https://blog.cloudflare.com/super-bowl-lviii/"><u>Super Bowl</u></a>.</p><p>Attacks targeting Finance organizations were most active in May, reaching a peak of 15.3% of mitigated traffic the week of May 13. This is in line with the figure in our <a href="https://radar.cloudflare.com/reports/ddos-2024-q2#id-9-top-attacked-industries"><i><u>DDoS threat report for Q2 2024</u></i></a> that shows that Financial Services was the most attacked industry by request volume during the quarter in South America and the Middle East region.</p><p>As we have seen in the past, peak attack activity varied by industry on a weekly basis. The highest peaks for the year were seen in attacks targeting People &amp; Society organizations (19.6% of mitigated traffic, week of January 1), the Autos &amp; Vehicles industry (29.7% of mitigated traffic, week of January 15), and the Real Estate industry (27.5% of mitigated traffic, week of August 26).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qjMffdMn6uV7OEFhE5l0F/397672a455b62f712946e30130969657/security_-_targeted_industries.png" />
          </figure><p><sup><i>Global mitigated traffic share by industry in 2024, summary view</i></sup></p>
    <div>
      <h3>Log4j remains a persistent threat and was actively targeted throughout 2024.</h3>
      <a href="#log4j-remains-a-persistent-threat-and-was-actively-targeted-throughout-2024">
        
      </a>
    </div>
    <p>In December 2021, we published a <a href="https://blog.cloudflare.com/tag/log4j/"><u>series of blog posts about the Log4j vulnerability</u></a>, highlighting the threat that it posed, our observations of attempted exploitation, and the steps we took to protect customers. Two years on, in our <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023 Year in Review</u></a>, we <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#even-as-an-older-vulnerability-log4j-remained-a-top-target-for-attacks-during-2023-however-http-2-rapid-reset-emerged-as-a-significant-new-vulnerability-beginning-with-a-flurry-of-record-breaking-attacks"><u>noted</u></a> that even as an older vulnerability, Log4j remained a top target for attacks during 2023, with related attack activity significantly higher than other commonly exploited vulnerabilities.</p><p>In 2024, three years after the initial Log4j disclosure, we found that Log4j remains an active threat. This year, we compared normalized daily attack activity for Log4j with attack activity for Atlassian Confluence Code Injection, a vulnerability we <a href="https://radar.cloudflare.com/year-in-review/2023#commonly-exploited-vulnerabilities"><u>examined in the 2023 Year in Review</u></a>, as well as aggregated daily attack activity for multiple <a href="https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures"><u>CVEs</u></a> related to <a href="https://capec.mitre.org/data/definitions/115.html"><u>Authentication Bypass</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-remote-code-execution/"><u>Remote Code Execution</u></a> vulnerabilities published in 2024.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#commonly-exploited-vulnerabilities"><u>Log4j attack activity</u></a> appeared to trend generally upwards across the year, with several significant spikes visible during the first half of the year, and then again in October and November. In terms of the difference in activity, Log4j ranges from approximately 4x to over 20x the activity seen for Atlassian Confluence Code Injection, and as much as 100x the aggregated activity seen for Authentication Bypass or Remote Code Injection vulnerabilities.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YdyQ3qMUh10zLAHLefcdU/8a723a1970652c293a1f6c59efe51a99/security_-_vulnerabilities_Log4J.png" />
          </figure><p><sup><i>Global attack activity trends for commonly exploited vulnerabilities in 2024</i></sup></p>
    <div>
      <h3>Routing security, measured as the share of RPKI valid routes and the share of covered IP address space, continued to improve globally throughout 2024. </h3>
      <a href="#routing-security-measured-as-the-share-of-rpki-valid-routes-and-the-share-of-covered-ip-address-space-continued-to-improve-globally-throughout-2024">
        
      </a>
    </div>
    <p>As the routing protocol that underpins the Internet, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol (BGP)</u></a> communicates routes between networks, enabling traffic to flow between source and destination. BGP, however, relies on trust between networks, and incorrect information shared between peers, whether or not it was shared intentionally, can send traffic to the wrong place, potentially with <a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/"><u>malicious results</u></a>. <a href="https://blog.cloudflare.com/rpki/"><u>Resource Public Key Infrastructure (RPKI)</u></a> is a cryptographic method of signing records that associate a BGP route announcement with the correct originating autonomous system (AS) number, providing a way of ensuring that the information being shared originally came from a network that is allowed to do so. (It is important to note that this is only half of the challenge of implementing routing security, because network providers also need to validate these signatures and filter out invalid announcements to prevent sharing them further.)</p><p>Cloudflare has long been an advocate for routing security, including being a founding participant in the <a href="https://www.manrs.org/2020/03/new-category-of-cdns-and-cloud-providers-join-manrs-to-improve-routing-security/"><u>MANRS CDN and Cloud Programme</u></a> and providing a <a href="https://isbgpsafeyet.com/"><u>public tool</u></a> that enables users to test whether their Internet provider has implemented BGP safely. Building on insights available in the <a href="https://radar.cloudflare.com/routing"><u>Routing page</u></a> on Cloudflare Radar, we analyzed data from <a href="https://ftp.ripe.net/rpki/"><u>RIPE NCC's RPKI daily archive</u></a> to determine the share of RPKI valid routes (as opposed to those route announcements that are <a href="https://rpki.readthedocs.io/en/latest/about/help.html"><u>invalid or whose status is unknown</u></a>) and how that share has changed over the course of 2024, as well as determining the share of IP address space covered by valid routes. The latter metric is of interest because a route announcement covering a significant amount of IP address space (millions of IPv4 addresses, for example) has a greater potential impact than an announcement covering a small block of IP address space (hundreds of IPv4 addresses, for example).</p><p>At a <a href="https://radar.cloudflare.com/year-in-review/2024#routing-security"><u>global</u></a> level during 2024, we saw a 6.4 percentage point increase (from 43.4% to 49.8%) in valid IPv4 routes, and a 3.2 percentage point increase (from 53.7% to 56.9%) in valid IPv6 routes. Given the trajectory, it is likely that over half of IPv4 routes will be RPKI valid by the end of calendar year 2024. Looking at the global share of IP address space covered by valid routes, we saw a 4.7 percentage point increase (from 38.9% to 43.6%) for IPv4, and a 3.3 percentage point increase (from 57.6% to 60.9%) for IPv6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ojjIa2U45vvsbha8v6ITk/2c61631ded62b80481d47e1da8a5d2cc/security_-_routing_global_valid_routes.png" />
          </figure><p><sup><i>Shares of global RPKI valid routing entries by IP version in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rCCmsaqULazLsBgoXZLLC/9aa265e9658d71bd7ee113423c6945ca/security_-_routing_global_valid_ip_address_space.png" />
          </figure><p><sup><i>Shares of globally announced IP address space covered by RPKI valid routes in 2024</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2024/es#routing-security"><u>Spain</u></a> started 2024 with less than half of its routes (both IPv4 and IPv6) RPKI valid. However, the share of valid routes grew significantly on February 15, when <a href="https://radar.cloudflare.com/as12479"><u>AS12479 (Orange Espagne)</u></a> signed records associated with 98% of their IP address prefixes that were previously in an <a href="https://www.ripe.net/manage-ips-and-asns/resource-management/rpki/bgp-origin-validation/"><u>“unknown” (or NotFound) state of RPKI validity</u></a>, thus converting these prefixes from unknown to valid. That drove an immediate increase for IPv4 to 76%, reaching 81% validity by December 1, and an immediate increase for IPv6 to 91%, reaching 92.9% validity by December 1. A notable change in covered IP address space was observed in <a href="https://radar.cloudflare.com/year-in-review/2024/cm#routing-security"><u>Cameroon</u></a>, where covered IPv4 space more than doubled at the end of January, growing from 32% to 82%. This was due to <a href="https://radar.cloudflare.com/as36912"><u>AS36912 (Orange Cameroun)</u></a> signing records associated with all of their IPv4 address prefixes, changing the associated IP address space to RPKI valid. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5e7SUVIju8fidAEBkIOSq4/2085f3237411eca0816a3d2862e9e3df/security_-_routing_Spain_valid_routes.png" />
          </figure><p><sup><i>IPv4 and IPv6 shares of RPKI valid routes for Spain in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/G9adlberrdCmDnB3MupQa/6c866261fc478334673115d6dd01fd76/security_-_routing_Cameroon_valid_ipv4_address_space.png" />
          </figure><p><sup><i>Share of IPv4 address space covered by RPKI valid routes for Cameroon in 2024</i></sup></p>
    <div>
      <h2>Email Security</h2>
      <a href="#email-security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vC1TSUDDHpepgs2Yv3Lpx/eb43b5c0a203d7ec0a74939c23684ae5/2627_Shield_Plane.png" />
          </figure>
    <div>
      <h3>An average of 4.3% of emails were determined to be malicious in 2024. </h3>
      <a href="#an-average-of-4-3-of-emails-were-determined-to-be-malicious-in-2024">
        
      </a>
    </div>
    <p>Despite the growing enterprise use of collaboration/messaging apps, email remains an important business application and is a very attractive entry point into enterprise networks for attackers. Attackers will send targeted malicious emails that attempt to impersonate an otherwise legitimate sender (such as a corporate executive), that try to get the user to click on a deceptive link, or that contain a dangerous attachment, among other types of threats. <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> protects customers from email-based attacks, including those carried out through targeted malicious email messages. During<a href="https://radar.cloudflare.com/year-in-review/2024#malicious-emails"><u> 2024</u></a>, an average of 4.3% of emails analyzed by Cloudflare were found to be malicious. Aggregated at a weekly level, spikes above 14% were seen in late March, early April, and mid-May. We believe that these spikes were related to targeted “backscatter” attacks, where the attacker flooded a target with undeliverable messages, which then bounced the messages to the victim, whose email had been set as the reply-to: address.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/693EaEyePShBH8CZ7cZWv1/c08e0acd6f8a6a15b730b1cd90bf6283/email_-_malicious_worldwide.png" />
          </figure><p><sup><i>Global malicious email share trends in 2024</i></sup></p>
    <div>
      <h3>Deceptive links and identity deception were the two most common types of threats found in malicious email messages. </h3>
      <a href="#deceptive-links-and-identity-deception-were-the-two-most-common-types-of-threats-found-in-malicious-email-messages">
        
      </a>
    </div>
    <p>Attackers use a variety of techniques, which we refer to as threat categories, when they use malicious email messages as an attack vector. These categories are defined and explored in detail in our <a href="https://blog.cloudflare.com/2023-phishing-report/"><u>phishing threats report</u></a>. In our analysis of malicious emails, we have found that such messages may contain multiple types of threats. In reviewing a weekly aggregation of threat activity trends for these categories, we found that, <a href="https://radar.cloudflare.com/year-in-review/2024#top-email-threats"><u>averaged across 2024</u></a>, 42.9% of malicious email messages contained deceptive links, with the share reaching 70% at times throughout the year. Activity for this thread category was spiky, with low points seen in the March to May timeframe, and a general downward trend visible from July through November.</p><p>Identity deception was a similarly active threat category, with such threats also found in up to 70% of analyzed emails several weeks throughout the year. Averaged across 2024, 35.1% of emails contained attempted identity deception. The activity pattern for this threat category appears to be somewhat similar to deceptive links, with a number of the peaks and valleys occurring during the same weeks. At times, identity deception was a more prevalent threat in analyzed emails than deceptive links, as seen in the graph below.</p><p>Among other threat categories, extortion saw the most significant change throughout the year. After being found in 86% of malicious emails during the first week of January, its share gradually trended lower throughout the year, finishing November under 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/47EGZSEcRbUY67bsnYTSip/81ce3c89beefe1ddbe66f68710366c87/email_-_threat_category.png" />
          </figure><p><sup><i>Global malicious email threat category trends for Deceptive Links and Identity Deception in 2024</i></sup></p>
    <div>
      <h3>Over 99% of the email messages processed by Cloudflare Email Security from the .bar, .rest, and .uno top level domains (TLDs) were found to be either spam or malicious in nature.</h3>
      <a href="#over-99-of-the-email-messages-processed-by-cloudflare-email-security-from-the-bar-rest-and-uno-top-level-domains-tlds-were-found-to-be-either-spam-or-malicious-in-nature">
        
      </a>
    </div>
    <p>In March 2024, we <a href="https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar/"><u>launched a set of email security insights on Cloudflare Radar</u></a>, including visibility into so-called “dangerous domains” — those top level domains (TLDs) that were found to be the sources of the most spam or malicious email among messages analyzed by Cloudflare Email Security. The analysis is based on the sending domain’s TLD, found in the <code>From</code>: header of an email message. For example, if a message came from <code>sender@example.com</code>, then <code>example.com</code> is the sending domain, and .com is the associated TLD.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024?#most-observed-tlds"><u>In aggregate across 2024</u></a>, we found that the <a href="https://icannwiki.org/.bar"><code><u>.bar</u></code></a>, <a href="https://icannwiki.org/.rest"><code><u>.rest</u></code></a>, and <a href="https://icannwiki.org/.uno"><code><u>.uno</u></code></a> TLDs were the “most dangerous”, each with over 99% of analyzed email messages characterized as either spam or malicious. (These TLDs are all at least a decade old, and each sees at least some usage, with <a href="https://research.domaintools.com/statistics/tld-counts/"><u>between 20,000 and 60,000 registered domain names</u></a>.)  Sorting by malicious email share, the <a href="https://icannwiki.org/.ws"><code><u>.ws</u></code></a> ccTLD (country code top level domain) belonging to Western Samoa came out on top, with over 90% of analyzed emails categorized as malicious. Sorting by spam email share, <a href="https://icannwiki.org/.quest"><code><u>.quest</u></code></a> is the biggest offender, with over 88% of emails originating from associated domains characterized as spam.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30rfi3V9NkY31itUpHQ9is/d1cbb9fce0ecf5a1c3a237f2694c5a13/email_-_dangerous_tlds.png" />
          </figure><p><sup><i>TLDs originating the largest total shares of malicious and spam email in 2024</i></sup></p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The Internet is an amazingly complex and dynamic organism, constantly changing, growing, and evolving.</p><p>With the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review</u></a>, we are providing insights into the change, growth, and evolution that we have measured and observed throughout the year. Trend graphs, maps, tables, and summary statistics provide our unique perspectives on Internet traffic, Internet quality, and Internet security, and how key metrics across these areas vary around the world and over time.</p><p>We strongly encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review microsite</u></a> and explore the trends for your country/region, and to consider how they impact your organization so that you are appropriately prepared for 2025. In addition, for insights into the top Internet services across multiple industry categories, we encourage you to read the companion Year in Review blog post, <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><i><u>From ChatGPT to Temu: ranking top Internet services in 2024</u></i></a>.</p><p>If you have any questions, you can contact the Cloudflare Radar team at radar@cloudflare.com or on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p>
    <div>
      <h2>Acknowledgements</h2>
      <a href="#acknowledgements">
        
      </a>
    </div>
    <p>As it is every year, it truly is a team effort to produce the data, microsite, and content for our annual Year in Review, and I’d like to acknowledge those team members that contributed to this year’s effort. Thank you to: Jorge Pacheco, Sabina Zejnilovic, Carlos Azevedo, Mingwei Zhang (Data Analysis); André Jesus, Nuno Pereira (Front End Development); João Tomé (Most popular Internet services); Jackie Dutton, Kari Linder, Guille Lasarte (Communications); Eunice Giles (Brand Design); Jason Kincaid (blog editing); and Paula Tavares (Engineering Management), as well as countless other colleagues for their answers, edits, support, and ideas.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4oLkLHLIZ1vibq8dtPJP6F</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Forced offline: the Q3 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 29 Oct 2024 13:05:00 GMT</pubDate>
            <description><![CDATA[ The third quarter of 2024 was particularly active, with quite a few significant Internet disruptions.  ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s network spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> functionality released earlier this year, we can explore the impact from a <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements"><u>routing</u></a> perspective, as well as a traffic perspective, at both a <a href="https://x.com/CloudflareRadar/status/1768654743742579059"><u>network</u></a> and <a href="https://x.com/CloudflareRadar/status/1773704264650543416"><u>location</u></a> level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. </p><p>A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>.</p><p>Having said that, the third quarter of 2024 was particularly active, with quite a few significant Internet disruptions. Unfortunately, <a href="#government-directed"><u>governments continued to impose nationwide Internet shutdowns</u></a> intended to prevent cheating on exams. <a href="#cable-cuts"><u>Damage to both terrestrial and submarine cables</u></a> impacted Internet connectivity across Africa and in other parts of the world. <a href="#severe-weather"><u>Damage caused by an active hurricane season</u></a> caused Internet outages across the Caribbean and in multiple parts of the United States. Because Internet connectivity is dependent on reliable electrical power, both <a href="#power-outages"><u>planned and unplanned power outages</u></a> in South America and Africa resulted in multi-hour Internet disruptions. <a href="#military-action"><u>Military action</u></a> continued to cause Internet outages in affected countries, as did <a href="#maintenance"><u>infrastructure maintenance</u></a>, <a href="#fire"><u>fire</u></a>, and a purported <a href="#cyberattack"><u>cyberattack</u></a>. The quarter also saw several noteworthy Internet disruptions that <a href="#unknown"><u>did not have verified causes</u></a>.</p>
    <div>
      <h2>Government Directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    <p>Over the past several years, we have seen multiple governments around the world implement Internet shutdowns in response to protests within their countries. Some shutdowns are more targeted, affecting only (a subset of) mobile Internet providers, while others are more aggressive, effectively cutting off Internet connectivity at a national level. In addition, we all too frequently see governments implement nationwide multi-hour Internet shutdowns in an effort to prevent students from cheating on national exams. Unfortunately, governments were active in both respects during the third quarter, as we observed multiple government directed Internet shutdowns. Several were covered in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>Bangladesh</h3>
      <a href="#bangladesh">
        
      </a>
    </div>
    <p><a href="https://timesofindia.indiatimes.com/world/south-asia/internet-shut-nationwide-bandh-announced-why-is-bangladesh-experiencing-deadly-protests/articleshow/111829956.cms"><u>Violent student protests</u></a> in <a href="https://radar.cloudflare.com/bd"><u>Bangladesh</u></a> against quotas in government jobs and rising unemployment rates led the government to order the nationwide shutdown of mobile Internet connectivity on July 18, <a href="https://therecord.media/bangladesh-mobile-internet-social-media-outages-student-protests"><u>reportedly</u></a> to “<i>ensure the security of citizens.</i>” This government-directed shutdown ultimately became a near-complete Internet outage for the country, as broadband networks were taken offline as well. At a country level, <a href="https://radar.cloudflare.com/traffic/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-28"><u>Internet traffic in Bangladesh dropped to near zero</u></a> just before 21:00 local time (15:00 UTC). <a href="https://radar.cloudflare.com/routing/bd?dateStart=2024-07-14&amp;dateEnd=2024-07-28"><u>Announced IP address space from the country dropped to near zero</u></a> at that time as well, meaning that nearly every network in the country was disconnected from the Internet.</p><p>Traffic and announced IP address space at a national level began to recover around 18:00 local time (12:00 UTC) on July 23, and continued over the next several days, as <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17059-mobile-internet-in-bangladesh-to-stay-dark-until-at-least-sunday.html"><u>fixed broadband connectivity was restored</u></a>, with <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17067-mobile-internet-returns-to-bangladesh-but-not-social-media-apps.html"><u>mobile connectivity returning on July 28</u></a>. The initial restoration was characterized as a “trial run”, prioritizing banking, commercial sectors, technology firms, exporters, outsourcing providers and media outlets, <a href="https://www.dhakatribune.com/bangladesh/352554/broadband-internet-restored-in-limited-areas-after"><u>according to</u></a> the state minister for post, telecommunication and information technology.</p><p>Ahead of this nationwide shutdown, we observed outages across several Bangladeshi network providers, perhaps foreshadowing what was to come. At <a href="https://radar.cloudflare.com/as24389"><u>AS24389 (Grameenphone)</u></a>, a complete Internet outage started at 01:30 local time on July 18 (19:30 UTC on July 17), with a total loss of both <a href="https://radar.cloudflare.com/traffic/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as24389?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a>.</p><p>The outage at <a href="https://radar.cloudflare.com/as45245"><u>AS25245 (Banglalink)</u></a> started at 02:15 local time on July 18 (20:15 UTC on July 17) as both <a href="https://radar.cloudflare.com/traffic/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as45245?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> dropped to zero.</p><p>At <a href="https://radar.cloudflare.com/as24432"><u>AS24432 (Robi Axiata)</u></a>, an Internet outage was observed starting around 06:30 local time on July 18 (00:30 UTC), with both <a href="https://radar.cloudflare.com/traffic/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> and <a href="https://radar.cloudflare.com/routing/as24432?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> disappearing at that time.</p><p><a href="https://radar.cloudflare.com/traffic/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Internet traffic</u></a> at <a href="https://radar.cloudflare.com/as58715"><u>AS58715 (Earth Telecommunication)</u></a> began to fall at 18:00 local time on July 18 (12:00 UTC), reaching zero four hours later. <a href="https://radar.cloudflare.com/routing/as58715?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>Announced IP address space</u></a> began to fall at 21:00 local time (15:00 UTC), and was completely gone by 21:25 local time (15:25 UTC).</p><p><a href="https://radar.cloudflare.com/as63526"><u>AS63526 (Carnival Internet)</u></a> was one of the last to fall before the complete shutdown, <a href="https://radar.cloudflare.com/traffic/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>losing traffic</u></a> at 20:45 local time (14:45 UTC), and seeing all of its <a href="https://radar.cloudflare.com/routing/as63526?dateStart=2024-07-14&amp;dateEnd=2024-07-29"><u>announced IP address space</u></a> withdrawn over the following hour.</p><p>These mobile connectivity outages lasted from July 18 through July 28. Just a few days after connectivity was restored, <a href="https://www.business-standard.com/world-news/bangladesh-protests-internet-shutdown-curfew-imposed-97-dead-in-clashes-124080500205_1.html"><u>additional clashes between police and protestors</u></a> drove the government to <a href="https://developingtelecoms.com/telecom-business/telecom-regulation/17105-bangladesh-switches-off-mobile-internet-again-as-protests-escalate-2.html"><u>order mobile Internet connectivity to be shut down</u></a> again. As shown in the graphs below, traffic on these mobile network providers dropped between 13:30 and 14:15 local time (07:30 to 08:15 UTC) on Sunday, August 4.</p><p>These protests ultimately led the government to order a full Internet shutdown in the country, with both traffic and announced IP address space dropping precipitously around 10:30 local time (04:30 UTC) on Monday, August 5. However, the shutdown appeared to be short-lived, as <a href="https://en.prothomalo.com/bangladesh/gm0o97gu3x"><u>broadband connectivity</u></a> began to recover around 13:20 local time (07:20 UTC), with <a href="https://en.prothomalo.com/bangladesh/aoczyp8xg8"><u>mobile connectivity</u></a> being restored around 14:00 local time (08:00 UTC).</p>
    <div>
      <h3>Iraqi Kurdistan</h3>
      <a href="#iraqi-kurdistan">
        
      </a>
    </div>
    <p>Both <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a> and Iraqi Kurdistan (the autonomous Kurdistan region in the northern part of the country) regularly implement government directed Internet shutdowns to prevent cheating on secondary and baccalaureate exams. Within Iraqi Kurdistan, we observed two sets of exam-related Internet shutdowns during the third quarter. The impacts of the shutdowns are visible on traffic from networks that operate within the region, as well as on the country-level graphs for Iraq.</p><p>The first round of shutdowns occurred in July, impacting <a href="https://radar.cloudflare.com/as59625"><u>AS59625 (KorekTel)</u></a>, <a href="https://radar.cloudflare.com/as21277"><u>AS21277 (Newroz Telecom)</u></a>, <a href="https://radar.cloudflare.com/as48492"><u>AS48492 (IQ Online)</u></a>, and <a href="https://radar.cloudflare.com/as206206"><u>AS206206 (KNET)</u></a> between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on July 3, 7, 10, and 14. This is consistent with shutdowns observed in the <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/"><u>second quarter</u></a>, as well as in <a href="https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/"><u>June 2023</u></a>. None of the impacted networks experienced a drop in announced IP address space during these shutdowns.</p><p>The second set of shutdowns in Iraqi Kurdistan took place across multiple days during the back half of August. On August 17, 19, 21, 24, 26, 28, and 31, all four network providers were again impacted, as seen in the graphs below, with traffic dropping between 06:00 - 08:00 local time (03:00 - 05:00 UTC).</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a>, a second round of exams for 12th graders resulted in over two weeks of regular Internet shutdowns across the country occurring between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on multiple days between August 29 and September 16, intended to prevent cheating on <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid08kbeG2VEaFPweRiH1ofDdRazpVFKnHA2tRXM6pjQgCsQUXmuCar3oDSVsaCnwUZil"><u>second ministerial exams for secondary education</u></a>. Both HTTP traffic and announced IP address space from Iraq dropped during these shutdowns, as seen in the graphs below.</p><p>(Note that the red annotation bar visible on September 11 &amp; 12 on both the country and network-level graphs below highlights an internal data pipeline issue, and is not associated with an Internet shutdown in Iraq.)</p><p>This round of government-directed shutdowns impacted multiple local network providers, including <a href="https://radar.cloudflare.com/as58322"><u>AS58322 (Halasat)</u></a>, <a href="https://radar.cloudflare.com/as51684"><u>AS51684 (AsiaCell)</u></a>, <a href="https://radar.cloudflare.com/as203214"><u>AS203214 (HulumTele)</u></a>, <a href="https://radar.cloudflare.com/as199739"><u>AS199739 (Earthlink)</u></a>, and <a href="https://radar.cloudflare.com/as59588"><u>AS59588 (ZAINAS)</u></a>. In reviewing the distribution of mobile device and desktop traffic at a network level, gaps were observed during the shutdowns on <a href="https://radar.cloudflare.com/traffic/as58322?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS58322</u></a> and <a href="https://radar.cloudflare.com/traffic/as199739?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS199739</u></a>, and to a lesser extent, <a href="https://radar.cloudflare.com/traffic/as203214?dateStart=2024-08-28&amp;dateEnd=2024-09-17#mobile-vs-desktop"><u>AS203214</u></a>, suggesting that these networks were completely offline, while AS56184 and AS59588 remained at least partially online. (This is also corroborated by complete or partial loss of announced IP address space across these networks during the shutdowns.)</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>A first round of exam-related Internet shutdowns took place in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> earlier this year, between May 26 and June 13, and were discussed in our <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria</u></a> blog post. A second set of exams, and the associated Internet shutdowns requested by the Ministry of Education, began on July 25 and ran through August 8, as specified in the schedule <a href="https://www.facebook.com/photo/?fbid=862569062570288&amp;set=a.449047400589125"><u>published by Syrian Telecom on its Facebook page</u></a>.</p><p>The length of the shutdowns varied by day — they all began at 07:00 local time (04:00 UTC), but the end times ranged between 09:45 -10:30 local time (06:45 - 07:30 UTC). The graphs below show the impact at a country level, as well as to <a href="https://radar.cloudflare.com/as29256"><u>AS29256 (Syrian Telecom)</u></a>, the <a href="https://radar.cloudflare.com/routing/sy"><u>primary telecommunications provider within the country</u></a>.</p><p>These shutdowns were also covered in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>Mauritania</h3>
      <a href="#mauritania">
        
      </a>
    </div>
    <p>On August 12, a round of <a href="https://ami.mr/fr/archives/251895"><u>baccalaureate exams began</u></a> in <a href="https://radar.cloudflare.com/mr"><u>Mauritania</u></a>, and in an effort to <a href="https://akhbarwatan.net/%D9%85%D9%88%D8%B1%D9%8A%D8%AA%D8%A7%D9%86%D9%8A%D8%A7-%D9%82%D8%B7%D8%B9-%D8%A7%D9%84%D8%A5%D9%86%D8%AA%D8%B1%D9%86%D8%AA-%D8%A8%D8%B3%D8%A8%D8%A8-%D8%A7%D9%84%D9%85%D8%B3%D8%A7%D8%A8%D9%82%D8%A7/"><u>prevent student cheating on the exams</u></a>, the government instituted multiple Internet shutdowns that impacted several major mobile providers. Two shutdowns were observed on August 12, between 08:00 - 12:00 local time (08:00 - 12:00 UTC) and between 15:00 - 19:00 local time (15:00 - 19:00 UTC), and an additional one was observed on August 13, between 08:00 - 12:30 local time (08:00 - 12:30 UTC). Impacted network providers included <a href="https://radar.cloudflare.com/as37508"><u>AS37508 (Mattel)</u></a>, <a href="https://radar.cloudflare.com/as37541"><u>AS37541 (Chinguitel)</u></a>, and <a href="https://radar.cloudflare.com/as29544"><u>AS29544 (Mauritel)</u></a>. Announced IP address space for these networks remained unchanged during the shutdown periods, suggesting that that mobile subscriber connectivity was disabled, as opposed to the networks effectively being disconnected from the Internet, as we have seen in other countries.</p><p>Exam-related Internet shutdowns are, unfortunately, not new to Mauritania, as authorities in the country also implemented them <a href="https://smex.org/mauritania-the-drawbacks-of-disrupting-mobile-internet-after-prisoners-escape/"><u>between 2017 and 2020</u></a>.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Eswatini (Swaziland)</h3>
      <a href="#eswatini-swaziland">
        
      </a>
    </div>
    <p>On July 14, MTN Eswatini (AS327765) informed customers via <a href="https://x.com/MTNEswatini/status/1812558000009163027"><u>a post on X</u></a> that “<i>connection to the internet and data services is currently intermittent, because of fiber cable breaks resulting from wildfires.</i>” This apparent connection disruption was visible in Cloudflare Radar between 19:30 and 20:15 local time (17:30 and 18:15 UTC).</p>
    <div>
      <h3>Cameroon</h3>
      <a href="#cameroon">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/cm"><u>Cameroon</u></a>, a fiber cut that occurred on August 4 during sanitation work disrupted mobile connectivity for Cameroon Telecommunications (<a href="https://radar.cloudflare.com/as15964"><u>AS15964 (Camtel)</u></a>) customers for over half a day. According to a (translated) <a href="https://x.com/Camtelonline/status/1820133286058062079"><u>post on X from Camtel</u></a>, “<i>We inform you that due to the sanitation work carried out in the city of Yaoundé, at the place called Cradat, our Voice and Data services have been temporarily interrupted on the entire mobile network.</i>” The observed disruption occurred between 03:00 - 16:30 local time (02:00 - 15:30 UTC). Although it initially started during a time when traffic was lower overnight anyway, both <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as15964&amp;dt=2024-08-04_2024-08-04&amp;timeCompare=2024-07-28"><u>request</u></a> and <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=as15964&amp;dt=2024-08-04_2024-08-04&amp;timeCompare=2024-07-28"><u>bytes</u></a> traffic remained lower than the same time a week prior during the duration of the disruption.</p>
    <div>
      <h3>Liberia</h3>
      <a href="#liberia">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/lr"><u>Liberia</u></a> Telecommunications Authority <a href="https://www.facebook.com/TelecommunicationsAuthorityLIBERA/posts/pfbid0Ryktd7oPg1c8UYc1kAiDWo8aQPK3uUADDkuUYgSdeZtC2tYn4JiCYr66oZQoRBc2l"><u>posted an announcement to their Facebook page</u></a> on August 21 noting that “<i>We have been informed by the CCL that the ACE Cable is experiencing interruptions.</i>” (The <a href="https://ace-submarinecable.com/en/submarine-cable/"><u>Africa Coast to Europe (ACE) submarine cable</u></a> connects multiple countries along the West Coast of Africa to Portugal and Europe.) The announcement further noted that the first signs of interruption occurred at 01:00 local time (and UTC), and that <a href="https://radar.cloudflare.com/as37410"><u>Lonestar Cell MTN (AS37410)</u></a> was among the providers that had been “gravely affected” by the cut.</p><p>We observed traffic on Lonestar Cell MTN dropping just after 01:00, in line with the announcement. The network experienced a complete outage lasting over a day and a half, before traffic started to recover at 14:00 local time (and UTC) on August 22. In a <a href="https://www.facebook.com/LonestarCellMTN/posts/pfbid02xE2qxVEt1XnCHgqftjkj34KQssez13PoGTjSGoBAH688g6m4G7XCLHM58SLBCW8Ll"><u>Facebook post</u></a> on August 22, Lonestar Cell MTN confirmed that Internet service had been restored, and that customer accounts would be credited with 500 MB of data for free.</p>
    <div>
      <h3>Niger</h3>
      <a href="#niger">
        
      </a>
    </div>
    <p>A September 7 <a href="https://x.com/airtelniger/status/1832430266222096571"><u>post on X from Airtel Niger</u></a> alerted customers to Internet service disruptions caused by cuts on international fiber optic cables. As a land-locked country, <a href="https://radar.cloudflare.com/ne"><u>Niger</u></a> is dependent on terrestrial connections to networks in neighboring countries, but it isn’t clear which connection or country Airtel Niger’s post was referencing.</p><p>Two significant Internet disruptions were observed around the time of Airtel Niger’s post that we believe are related to the referenced fiber cuts. The first occurred between 18:00 - 21:00 local time (17:00 - 20:00 UTC) on September 6, visible at a country level and at a network level as well on <a href="https://radar.cloudflare.com/as37531"><u>AS37531 (Airtel Niger)</u></a> and <a href="https://radar.cloudflare.com/as37233"><u>AS37233 (Orange Niger / Zamani Telecom)</u></a>. The second disruption occurred between 10:45 - 12:00 local time (09:45 - 11:00 UTC) on September 7, visible at a country level as well as on those two networks. </p>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>Internet disruptions related to submarine cable failures often take a significant amount of time to resolve because of the challenges repair crews face in getting to, and accessing, the damaged portion of the cable, as it is frequently located deep underwater in the middle of an ocean. A September 14 submarine cable failure that impacted <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> lasted for over a week for a similar, but slightly different, reason.</p><p>A significant loss of traffic on Digicel Haiti was first observed at 08:00 local time (12:00 UTC) on September 14. On September 16, Digicel Haiti <a href="https://x.com/DigicelHT/status/1835774732743876713/photo/1"><u>posted a press release</u></a> confirming that since September 14, a failure had been detected on an international submarine cable belonging to Cable and Wireless, and that the cable damage occurred at Kaliko Beach Club (the property is <a href="https://www.haitilibre.com/en/news-43221-haiti-digicel-failure-detected-on-an-international-submarine-cable-against-a-backdrop-of-litigation.html"><u>reportedly</u></a> used as a cable entry point). Digicel noted that their technicians went to the scene of the damage immediately, but were denied access, apparently because of a business dispute dating back to 2021. The release also explained that technical teams had taken temporary steps to ensure the continuity of essential services, which prevented the incident from resulting in a complete loss of connectivity. On September 22, a subsequent <a href="https://x.com/DigicelHT/status/1837875515148898513/photo/1"><u>press release</u></a> posted by Digicel Haiti announced the restoration of Internet services as of 02:00 local time (06:00 UTC), and referenced vandalism as the cause of the cable damage.</p>
    <div>
      <h3>Kyrgyzstan</h3>
      <a href="#kyrgyzstan">
        
      </a>
    </div>
    <p>Reported damage to the “<a href="https://akipress.com/news:797695:Internet_disruptions_in_Kyrgyzstan_caused_by_damage_of_main_communication_channel/"><u>backbone wire</u></a>” or “<a href="https://economist-kg.translate.goog/novosti/2024/09/25/akniet-obiasnil-prichinu-probliem-s-dostupom-k-intiernietu-v-bishkiekie-i-chuiskoi-oblasti/?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp"><u>main cable</u></a>” of an <a href="https://kaktus-media.translate.goog/doc/510016_propal_internet_y_nekotoryh_sotovyh_operatorov_i_provayderov._pochemy.html?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp"><u>upstream provider</u></a> resulted in a brief Internet outage for <a href="https://radar.cloudflare.com/kg"><u>Kyrgyzstan</u></a> Internet provider <a href="https://radar.cloudflare.com/as50223"><u>Megacom (AS50223)</u></a> of September 25. <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a> is <a href="https://radar.cloudflare.com/routing/as50223"><u>listed</u></a> as Megacom’s only upstream provider.</p><p>The outage lasted for only an hour, between 15:45 and 16:45 local time (09:45 - 10:45 UTC), dropping both traffic and announced IP address space to zero. At a country level, traffic dropped as much as 72% as compared to the previous week. Given the complete loss of both traffic and IP address space, the damage likely occurred on the connection between Megacom and Rostelecom.</p>
    <div>
      <h2>Severe weather</h2>
      <a href="#severe-weather">
        
      </a>
    </div>
    <p>An active hurricane season during July, August, and September resulted in infrastructure damage caused by multiple hurricanes disrupting Internet connectivity in multiple places across the Caribbean and Southeastern United States.</p>
    <div>
      <h3>Grenada &amp; Saint Vincent and the Grenadines</h3>
      <a href="#grenada-saint-vincent-and-the-grenadines">
        
      </a>
    </div>
    <p>At the start of the third quarter, <a href="https://radar.cloudflare.com/gd"><u>Grenada</u></a> and <a href="https://radar.cloudflare.com/vc"><u>Saint Vincent and the Grenadines</u></a> both suffered significant damage from Hurricane Beryl, <a href="https://www.usatoday.com/story/news/nation/2024/07/03/hurricane-beryl-destruction-islands/74296817007/"><u>reportedly</u></a> causing destruction of infrastructure, buildings, agriculture, and the natural environment.</p><p>On July 1, traffic from Grenada dropped significantly at 10:00 local time (14:00 UTC), just ahead of <a href="https://www.cnn.com/2024/07/01/weather/hurricane-beryl-caribbean-landfall-monday/index.html"><u>landfall</u></a> on Grenada’s Carriacou Island. The most significant impacts to traffic were seen for approximately the first 24 hours, though traffic did not return to expected pre-storm levels until around 10:00 local time (14:00 UTC) on July 5.</p><p>Internet traffic in Saint Vincent and the Grenadines was also disrupted by Hurricane Beryl, also falling at 10:00 local time (14:00 UTC). Similar to Grenada, the most significant impact was seen in the first 24 hours, with consistent gradual recovery seen after that time. However, traffic did not return to expected pre-storm levels until July 11.</p>
    <div>
      <h3>Jamaica</h3>
      <a href="#jamaica">
        
      </a>
    </div>
    <p>As Hurricane Beryl continued across the Caribbean, it <a href="https://x.com/weatherchannel/status/1808576720234008765"><u>passed Jamaica on July 3</u></a>. The associated damage that it caused impacted Internet connectivity on the island, with traffic dropping significantly around 14:00 local time (19:00 UTC). As the graph below shows, the disruption was preceded by higher than normal traffic volumes, presumably due to residents looking for information about Beryl. The disruption lasted nearly a week, with traffic returning to expected levels on July 10.</p>
    <div>
      <h3>U.S. Virgin Islands</h3>
      <a href="#u-s-virgin-islands">
        
      </a>
    </div>
    <p>The following month, damage from Tropical Storm Ernesto caused <a href="https://x.com/VIWAPA/status/1824110275710091527"><u>power outages across the U.S. Virgin Islands</u></a>, resulting in disruptions to Internet connectivity. Traffic from the islands dropped precipitously at 22:00 local time on August 13 (02:00 UTC on August 14) and remained lower for over two days, before returning to expected pre-storm levels around 11:00 local time (15:00 UTC) on August 16.</p>
    <div>
      <h3>Bermuda</h3>
      <a href="#bermuda">
        
      </a>
    </div>
    <p>Over the course of the following few days, Ernesto strengthened from a tropical storm into a hurricane, but had weakened by the time it hit <a href="https://radar.cloudflare.com/bm"><u>Bermuda</u></a> on August 16/17. In this case, damage was <a href="https://www.reuters.com/business/environment/hurricane-ernesto-weakens-still-dangerous-it-closes-bermuda-2024-08-17/"><u>reportedly</u></a> limited to power outages, downed trees, and flooding, but even this limited damage disrupted Internet connectivity on the island. As the storm made landfall on the island, traffic levels dropped over 80% at 22:00 local time on August 16 (01:00 UTC on August 17). Traffic levels remained depressed for about two and a half days, recovering to expected levels around 09:00 local time (12:00 UTC) on August 19.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p><a href="https://www.dw.com/en/nepal-floods-landslides-leave-at-least-151-dead/a-70354640"><u>Heavy rains in Nepal</u></a> at the end of September resulted in flooding and landslides across much of the country, which in turn resulted in power outages and Internet disruptions. One such disruption believed to be associated with the impacts of the storm was observed on September 28, when <a href="https://radar.cloudflare.com/as23752"><u>AS23752 (Nepal Telecom)</u></a>, <a href="https://radar.cloudflare.com/as45650"><u>AS45650 (Vianet)</u></a>, <a href="https://radar.cloudflare.com/as139922"><u>AS139922 (Dishhome)</u></a>, and <a href="https://radar.cloudflare.com/as17501"><u>AS17501 (Worldlink)</u></a> all saw traffic drop 50 - 70% between 14:15 - 16:00 local time (08:30 - 10:15 UTC).</p>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    <p>A disruption to traffic from <a href="https://radar.cloudflare.com/as11427"><u>AS11427 (Charter Communications/Spectrum)</u></a> in Texas that occurred between 12:30 and 19:30 local time on July 9 (17:30 - 00:30 UTC) was caused by “<i>a third-party infrastructure issue caused by the impact of Hurricane Beryl</i>”, according to a July 9 <a href="https://x.com/Ask_Spectrum/status/1810804196112806016"><u>post on X</u></a> from the provider. Spectrum <a href="https://x.com/Ask_Spectrum/status/1810735748410396680"><u>acknowledged the issue</u></a> shortly after it began, and <a href="https://x.com/Ask_Spectrum/status/1810851153053118568"><u>followed up again</u></a> after service had been restored.</p><p>Hurricane Helene <a href="https://www.wistv.com/2024/10/03/reviewing-hurricane-helenes-destructive-path-through-southeast/"><u>made landfall in northern Florida</u></a> as a Category 4 storm late in the evening (local time) on September 26, and over the following hours and days, <a href="https://www.usatoday.com/story/graphics/2024/09/29/hurricane-helene-damage-maps/75440587007/"><u>continued north</u></a> through Georgia, South Carolina, and North Carolina, and into Tennessee. Even as it weakened, it caused historic flooding and damage to roads, homes, power lines, and telecommunications infrastructure. Below, we review the traffic impacts observed at a state level in three of the most impacted states, as well as exploring the impact at a network level for selected providers. (<a href="https://www.kentik.com/blog/author/doug-madory/">Doug Madory at Kentik</a> published an excellent <a href="https://www.kentik.com/blog/hurricane-helene-devastates-network-connectivity-in-parts-of-the-south/"><u>blog post exploring the impact of Helene</u></a> from the perspective of their data, and the networks referenced below were informed by that post.)</p>
    <div>
      <h4>Georgia</h4>
      <a href="#georgia">
        
      </a>
    </div>
    <p>Helene entered Georgia early morning on Friday, September 27, and by midday (local time), peak traffic was approximately 20% lower than peak levels seen in the days ahead of the storm. (The lower peaks on September 28 &amp; 29 are likely due to it being a weekend.) At a state level, peak traffic remained lower over the following week, with more recovery seen heading into the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aYsyZNt5qCWqJhgK8yt1g/0f8be9f2ed8c2ab5121caef9b8e079ff/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_Georgia.png" />
          </figure><p>One of the most significantly impacted network providers in Georgia was <a href="https://radar.cloudflare.com/as11240?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS11240 (ATC Broadband)</u></a>, which saw traffic start to drop around 22:00 local time on September 26 (02:00 UTC on September 27). Subscribers and customers experienced a near complete outage until around 08:00 local time on September 30 (12:00 UTC), when traffic volumes slowly started to recover. The normal diurnal traffic pattern became more clear in the following days, with peak traffic levels continuing to increase over the next week as well.</p><p>Other network providers in Georgia that experienced significant impacts include <a href="https://radar.cloudflare.com/as400511?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS400511 (Clearwave Fiber)</u></a>, <a href="https://radar.cloudflare.com/as394473?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS394473 (Brantley Telephone Company)</u></a>, <a href="https://radar.cloudflare.com/as40285?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS40285 (Northland Cable Television)</u></a>, <a href="https://radar.cloudflare.com/as15313?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS15313 (Pembroke Telephone Company)</u></a>, and <a href="https://radar.cloudflare.com/as397118?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS397118 (Glenwood Telephone Company)</u></a>.</p>
    <div>
      <h4>South Carolina</h4>
      <a href="#south-carolina">
        
      </a>
    </div>
    <p>The midday traffic peak on September 27 in South Carolina was just 65% of the preceding days, with the peaks remaining lower over the following two weekend days. Traffic remained somewhat lower during the week following Helene, with peak increases becoming more evident the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40euoNqEw8bwaAqVgmsmaQ/ccf5c7114e26a85f6445ce9eaf21b00c/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_South_Carolina.png" />
          </figure><p>At <a href="https://radar.cloudflare.com/as19212?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS19212 (Piedmont Rural Telephone)</u></a> in South Carolina, traffic began to fall rapidly around midnight local time on September 27 (04:00 UTC), reaching a state of near complete outage over the next eight hours. A gradual recovery is visible over the following several days, with a more regular pattern becoming evident on October 1, with rapid growth over the following week, accelerating towards the end of the week.</p><p>Other network providers in South Carolina, including <a href="https://radar.cloudflare.com/as397068?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS397068 (Carolina Connect)</u></a>, <a href="https://radar.cloudflare.com/as10279?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS10279 (West Carolina Communications)</u></a>, <a href="https://radar.cloudflare.com/as20222?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS20222</u></a> &amp; <a href="https://radar.cloudflare.com/as21898?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS21898 (TruVista)</u></a>, and <a href="https://radar.cloudflare.com/as14615?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS14615 (Rock Hill Telephone)</u></a>, also experienced significant disruptions to connectivity in the wake of Helene.</p>
    <div>
      <h4>North Carolina</h4>
      <a href="#north-carolina">
        
      </a>
    </div>
    <p>Although a drop in traffic is visible in the graph for North Carolina on September 27, it occurs after a midday peak in line with previous days, and the magnitude is not as significant as that seen in South Carolina and Georgia. Traffic peaks over the following week are in line with the week preceding Helene’s arrival, with higher peaks seen the week of October 6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ggc01nO3m5J85jNwm5rSF/13af760fe7a839472ae5c14116042f9c/SEVERE_WEATHER_-_UNITED_STATES_-_Helene_-_North_Carolina.png" />
          </figure><p>North Carolina providers <a href="https://radar.cloudflare.com/as53488?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS53488 (Morris Broadband)</u></a> and <a href="https://radar.cloudflare.com/as53274?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS53274 (Skyrunner)</u></a> both experienced multi-day disruptions, likely related to damage from Helene. However, these disruptions took Morris Broadband completely offline several times over the course of a week — the announced IP address space graph below shows three distinct drops to zero, aligning with outages visible in the traffic graph, when the network was effectively disconnected from the Internet. A similar but less severe pattern was seen at Skyrunner, which lost 75-80% of announced IP address space for a two-day period covering September 27-29, aligning with an outage visible in the associated traffic graph.</p><p>Other impacted network providers in North Carolina included <a href="https://radar.cloudflare.com/as22191?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS22191 (Wilkes Communications)</u></a> and <a href="https://radar.cloudflare.com/as23118?dateStart=2024-09-24&amp;dateEnd=2024-10-07"><u>AS23118 (Skyline Telephone)</u></a>.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Venezuela</h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p>A nationwide power outage in <a href="https://radar.cloudflare.com/ve"><u>Venezuela</u></a> on August 30 was, <a href="https://www.reuters.com/business/energy/venezuelas-capital-caracas-other-regions-face-power-outage-2024-08-30/"><u>according to President Nicolás Maduro</u></a>, the result of an attack on the Guri Reservoir, Venezuela's largest hydroelectric project. A <a href="https://www.reuters.com/business/energy/venezuelas-capital-caracas-other-regions-face-power-outage-2024-08-30/"><u>published report</u></a> indicated that all 24 of the country's states reported a total or partial loss of electricity supply. The loss of power unsurprisingly caused an Internet disruption, with country-level traffic dropping 82%, starting around 04:45 local time (08:45 UTC). Traffic began to increase as electricity returned to various parts of the country throughout the day, and returned to expected levels just after midnight local time on August 31 (04:00 UTC). </p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>On August 30, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid0krBvZqWT7AfF8HjTPdm9Y84QmmkgfUzPjhtgxZjzEpyVqRLFS6VBt5vR43s5dxiHl"><u>posted a Customer Alert on its Facebook page</u></a>, issued at 21:57 local time (18:57 UTC), stating that “<i>We have lost power supply to various parts of the country except North Rift region and sections of Western region.</i>” Approximately a half hour before that alert, Kenya’s Internet traffic began to drop, falling as much as 61%. Just two hours later, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid0m4kP2NwdiDPnH4UpWH39QkpLANTWc6SR3bpiHxnwCUdBvwwou7p1skfaWbghRFWml"><u>posted a follow up</u></a>, stating “<i>Following the partial outage affecting several parts of the country this evening, we are pleased to report that power supply has now been restored to the entire Western region, as well as parts of Central Rift, South Nyanza, and Nairobi regions.</i>” However, traffic did not return to expected levels for several more hours, taking until 06:00 local time (03:00 UTC).</p><p>A week later, on September 6, Kenya Power Care <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02BcJVt9uu1N3mmGzf9mivyXev4FSJVpPZ5ni1VkZC9WSdYyYyk7MCMtignBPzcVnyl"><u>posted another similar Customer Alert</u></a>, noting that “<i>We are experiencing a power outage affecting several parts of the country, except sections of North Rift and Western regions.</i>” This alert was issued at 09:20 local time (06:20 UTC), and follows a drop in Internet traffic that started around 09:00 local time (06:00 UTC). Traffic dropped approximately 45% during this power outage, and returned to expected levels around 16:00 local time (13:00 UTC). Traffic recovery aligns with a <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02VzrAMQeuTrmfyywXeB7qXFyAmeM1eEQCBX6dvY3DHbyfUoTjgTJATcg9cToBk7zal"><u>subsequent Customer Alert posted on Facebook</u></a>, where Kenya Power Care stated “<i>We are glad to report that normal electricity supply was restored across the country as at 3:49pm”.</i></p><p>A statement from Energy and Petroleum Cabinet Secretary Opiyo Wandayi, <a href="https://www.facebook.com/KenyaPowerLtd/posts/pfbid02Nck9kx6NFmvFRdLEpzPxk1UPW3HtNw41PHNhHd3PMR2Y73BpkMALZmNU3mkar8DPl"><u>shared on Facebook by Kenya Power Care</u></a>, explained the cause of the power outage: “<i>Today, Friday 6th September 2024 at 8.56 am, the 220kV High Voltage Loiyangalani transmission line tripped at Suswa substation while evacuating 288MW from Lake Turkana Wind Power (LTWP) plant. This was followed by a trip on the Ethiopia – Kenya 500kV DC interconnector that was then carrying 200MW, resulting to a total loss of 488MW…</i>” </p>
    <div>
      <h3>Ecuador</h3>
      <a href="#ecuador">
        
      </a>
    </div>
    <p>According to a (translated) September 7 <a href="https://x.com/OperadorCenace/status/1832431918563872871"><u>post on X from CENACE</u></a>, the national electricity operator in <a href="https://radar.cloudflare.com/ec"><u>Ecuador</u></a>, “<i>We inform the public that due to a fault in the Molino substation bar, which is connected to the Paute generation, there has been a power outage in some provinces of the country. Cenace's technical team, in coordination with the distribution companies, is working to gradually restore electrical service. It is estimated that it will take 3 to 4 hours maximum for the supply to return to normal.</i>” The post was published at 09:53 local time (14:53 UTC), approximately an hour after Internet traffic from the country began to drop. Traffic returned to expected levels just under four hours later, at around 12:30 local time (17:30 UTC), in line with CENACE’s predicted time for power to be fully restored.</p><p>On September 18/19, the first of several planned nightly power outages to enable needed grid maintenance in Ecuador disrupted Internet connectivity. Traffic dropped by over 60% as compared to the same time the prior week starting around 21:30 local (02:30 UTC), with the power outages <a href="https://www.americaeconomia.com/en/node/288653"><u>reportedly</u></a> scheduled for 22:00 - 06:00 local time. Internet traffic recovered to expected levels around 06:00 local time (11:00 UTC) as power was restored. Similar power cuts were <a href="https://ec.usembassy.gov/alert-series-of-nationwide-overnight-power-outages-and-curfews/"><u>reportedly planned from September 23 to September 27</u></a>, but these power outages did not appear to impact <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=ec&amp;dt=2024-09-22_2024-09-28&amp;timeCompare=1"><u>traffic levels in Ecuador as compared to the previous week</u></a>. </p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/sn"><u>Senegal’s</u></a> power company, Senelec, <a href="https://x.com/Senelecofficiel/status/1834245424787394629"><u>posted a communiqué on X</u></a> on September 12 that stated (translated) “<i>Senelec informs its valued customers that an incident that occurred this morning at the Hann substation resulted in the loss of the OMVS interconnected network and disruptions to electricity distribution.</i>” This disruption to electricity distribution also resulted in a disruption to Internet traffic, which dropped sharply at 13:00 local time (13:00 UTC), falling as much as 80%. Traffic recovered to expected levels by 20:00 local time (20:00 UTC) around the same time that Senelec <a href="https://x.com/Senelecofficiel/status/1834320225954922533"><u>posted a followup about the incident</u></a> that stated (translated) “<i>Effective restoration of electricity supply in all localities.</i>”</p>
    <div>
      <h2>Maintenance</h2>
      <a href="#maintenance">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>As we discussed above, Internet users in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> were impacted by an exam-related Internet shutdown from 07:00 - 10:15 local time (04:00 - 07:15 UTC) on July 30. However, just an hour after connectivity was restored, another disruption occurred, as seen in both the traffic and announced IP address space graphs below. According to a (translated) <a href="https://www.facebook.com/photo?fbid=868145108679350&amp;set=a.449047403922458"><u>Facebook post from Syrian Telecom</u></a>, “...<i>during the periodic maintenance of one of the air conditioners in one of the technical halls, an explosion occurred, which caused the internet circuits to be temporarily out of service.</i>” Traffic remained depressed for approximately eight hours, recovering to expected levels around 19:00 local time (16:00 UTC).</p>
    <div>
      <h2>Cyberattack</h2>
      <a href="#cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>Roskomnadzor, Russia’s Internet regulate, <a href="https://t.me/roskomnadzorro/1897"><u>blamed</u></a> a brief disruption in traffic observed in <a href="https://radar.cloudflare.com/ru"><u>Russia</u></a> and on <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a> on August 21 on a distributed denial-of-service (DDoS) attack that targeted Russian telecommunications operators. The disruption was brief, lasting from around 13:45 until 14:30 Moscow time (10:45 - 11:30 UTC). Roskomnadzor <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>subsequently stated</u></a> "<i>As of 3 PM Moscow time, the attack has been repelled, and services are operating normally.</i>" The disruption <a href="https://www.barrons.com/news/large-scale-outages-hit-telegram-whatsapp-in-russia-3a08695c"><u>reportedly</u></a> impacted messaging services Telegram and WhatsApp, <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>as well as</u></a> Wikipedia, Yandex, VKontakte, telecom support services, and mobile banking apps. Some experts <a href="https://www.uawire.org/massive-internet-outage-in-russia-kremlin-s-attempt-to-block-messaging-apps-causes-nationwide-disruption"><u>questioned the official explanation</u></a>, suggesting instead that the disruption was due to <a href="https://therecord.media/russia-blames-websites-apps-outages-on-ddos"><u>centralized interference from Roskomnadzor</u></a>.</p>
    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Palestine</h3>
      <a href="#palestine">
        
      </a>
    </div>
    <p>We have covered Internet disruptions related to the ongoing conflict in Gaza multiple times since October 2023, both on <a href="https://x.com/search?q=gaza%20internet%20(from%3Acloudflareradar)&amp;src=typed_query&amp;f=live"><u>Cloudflare Radar’s presence on X</u></a>, and on the Cloudflare blog (<a href="https://blog.cloudflare.com/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><u>1</u></a>, <a href="https://blog.cloudflare.com/q4-2023-internet-disruption-summary/"><u>2</u></a>, <a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary/"><u>3</u></a>). In many of these cases, Paltel (AS12975) has posted notices on social media regarding service disruptions and outages. On September 8, <a href="https://www.facebook.com/paltel.970/posts/pfbid036YptxzF77Rk5U7tVGT5Xh4Yx4897BVoeb4qsZNhGkLh1XxLCTLMzDjp1RLAkBfJHl"><u>Paltel posted a message on its Facebook page</u></a>, stating (translated) “<i>We regret to announce the suspension of home internet services in the central and southern areas of the Gaza Strip, due to the ongoing aggression.</i>”</p><p>Within the Gaza, Rafah, Deir al-Balah Governorates, we observed a sharp drop in traffic at 18:00 local time (16:00 UTC). The impact appeared to be most significant in Rafah and Deir al-Balah. Traffic returned to expected levels around 23:00 local time (21:00 UTC), and Paltel <a href="https://www.facebook.com/paltel.970/posts/pfbid0hJxQReZimYRnNxbMNeyscVCtwhS2wnA4Us6fucJ4WntFuQeS3BAKqhMWxJJqFzaVl"><u>confirmed the service restoration in a subsequent Facebook post</u></a>, stating (translated) “<i>We would like to announce the return of home Internet services in central and southern Gaza Strip to the way it was before it was interrupted hours ago.</i>”	</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QELKmNYaZC5NmvkTDreST/f913dde97df36d81772756d528745980/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Gaza_Governorate.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3zALCKZTWs6E62cptuxPjq/cd71ff38103f4574b7d2f6e3c3b66ab6/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Rafah_Governorate.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yvARj41pkM60UhcfNtEEC/4963c76fe2ef45802211ae2b6ebbe5ff/MILITARY_ACTION_-_PALESTINE_-_Gaza_-_Deir_al-Balah_Governorate.png" />
          </figure>
    <div>
      <h3>Lebanon</h3>
      <a href="#lebanon">
        
      </a>
    </div>
    <p><a href="https://www.cnn.com/world/live-news/israel-lebanon-war-hezbollah-09-27-24#cm1lbrhcd001k3b6mxt9ij3lb"><u>Israeli airstrikes targeting the Lebanese capital of Beirut</u></a> on September 28 likely knocked local network provider <a href="https://radar.cloudflare.com/as42852"><u>Solidere (AS42852)</u></a> offline for several hours. The graph below shows a loss of traffic starting around 12:15 local time (10:15 UTC), at the same time a complete loss of announced IP address space occurred. Most of Solidere’s IP address space started to get announced again at 14:45 local time (12:45 UTC), and a slight increase in traffic was seen at that time as well. Traffic levels fully recovered just after 18:00 local time (16:00 UTC), and announced IP address space had stabilized by that time as well. </p>
    <div>
      <h2>Fire</h2>
      <a href="#fire">
        
      </a>
    </div>
    
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>A fire near a data center in Blida Province, <a href="https://radar.cloudflare.com/dz"><u>Algeria</u></a> disrupted connectivity on AS327931 (Djezzy) at 13:00 and local time (12:00 UTC) on July 24. According to a (translated) <a href="https://x.com/djezzy/status/1816272546284855678"><u>X post from Djezzy</u></a>, “<i>Djezzy announced fluctuations in its services in some areas of the country, as it was a victim of a fire that broke out on Wednesday, July 24, 2024, in a warehouse of one of the companies located near its technical center in the state of Blida.</i>” The post from Djezzy predicted that “<i>97% of the sites will be restored by around 3 am [July 25]</i>”, but traffic did not return to expected levels until the end of the day on July 25.</p>
    <div>
      <h2>Unknown</h2>
      <a href="#unknown">
        
      </a>
    </div>
    
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    <p>On Monday, September 30, customers on Verizon’s mobile network in multiple cities across the United States <a href="https://apnews.com/article/verizon-outage-sos-mode-phone-service-b03c9b8615e0650669339daa2eaa1713"><u>reported</u></a> experiencing a loss of connectivity. Impacted phones showed “SOS” instead of the usual bar-based signal strength indicator, and customers complained of an inability to make or receive calls on their mobile devices. Although initial reports of connectivity problems started around 09:00 ET (13:00 UTC), we didn’t see a noticeable change in request volume at an ASN level until about two hours later. <a href="https://radar.cloudflare.com/as6167"><u>AS6167 (CELLCO)</u></a> is the <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> used by Verizon for its mobile network.</p><p>Just before 12:00 ET (16:00 UTC), Verizon <a href="https://x.com/VerizonNews/status/1840780785084985777"><u>published a social media post acknowledging the problem</u></a>, stating “We are aware of an issue impacting service for some customers. Our engineers are engaged, and we are working quickly to identify and solve the issue.” As the <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as6167&amp;dt=2024-09-30_2024-09-30&amp;timeCompare=2024-09-23"><u>graph</u></a> below shows, a slight decline (-5%) in HTTP traffic as compared to traffic at the same time a week prior is first visible around 11:00 ET (15:00 UTC), and request volume fell as much as 9% below expected levels at 13:45 ET (17:45 UTC).</p><p>Media reports listed cities including Chicago, Indianapolis, New York City, Atlanta, Cincinnati, Omaha, Phoenix, Denver, Minneapolis, Seattle, Los Angeles, and Las Vegas as being most impacted. Traffic graphs illustrating the impacts seen in these cities can be found in our <a href="https://blog.cloudflare.com/impact-of-verizons-september-30-outage-on-internet-traffic/"><i><u>Impact of Verizon’s September 30 outage on Internet traffic</u></i></a> blog post.</p><p>Traffic appeared to return to expected levels around 17:15 ET (21:15 UTC). At 19:18 ET (23:18 UTC), a <a href="https://x.com/VerizonNews/status/1840893978411221191"><u>social media post</u></a> from Verizon noted “<i>Verizon engineers have fully restored today's network disruption that impacted some customers. Service has returned to normal levels.</i>”</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>On July 31, <a href="https://radar.cloudflare.com/pk"><u>Pakistan</u></a> experienced a wide-scale Internet disruption that lasted approximately two hours, between 13:30 - 15:30 local time (08:30 - 10:30 UTC). Traffic only dropped ~45% at a country level, but <a href="https://radar.cloudflare.com/as17557"><u>AS17557 (PTCL)</u></a> experienced a near complete loss of traffic, while traffic at <a href="https://radar.cloudflare.com/as24499"><u>AS24499 (Telenor Pakistan)</u></a> dropped nearly 90%. Together, the two network providers serve an estimated nine million users, and are among the top five Internet service providers in the country.</p><p>The actual cause of the disruption is disputed. It was <a href="https://www.globalvillagespace.com/internet-outage-in-pakistan/"><u>reported</u></a> that the Pakistan Telecommunication Authority (PTA) attributed the disruptions to a technical glitch in the international submarine cable affecting the Pakistan Telecommunication Company Limited (PTCL) network. However, another <a href="https://incpak.com/national/internet-services-outtage-across-pakistan/"><u>published report</u></a> noted “According to our sources, the government’s latest firewall edition to block the content was misconfigured, resulting in Internet connectivity disruption.” Additional details can be found in our August 1 blog post, <a href="https://blog.cloudflare.com/a-recent-spate-of-internet-disruptions-july-2024/"><i><u>A recent spate of Internet disruptions</u></i></a><i>.</i></p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>On August 14, subscribers of <a href="https://radar.cloudflare.com/gb"><u>UK</u></a> service provider <a href="https://radar.cloudflare.com/as25135"><u>Vodafone (AS25135)</u></a> <a href="https://www.dailymail.co.uk/sciencetech/article-13742755/Vodafone-network-crashes-internet.html"><u>reported problems</u></a> accessing both mobile and landline Internet connections. Starting around 11:00 local time (10:00 UTC), we observed traffic starting to drop, ultimately falling 43% below the same time the prior week. The disruption was fairly short-lived, as traffic returned to expected levels by 13:30 local time (12:30 UTC). Vodafone did not acknowledge the issue on social media, nor did it provide a public explanation for what caused the disruption.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although Internet disruptions observed during the third quarter had a variety of underlying causes, those caused by power outages due to aging or insufficiently maintained electrical infrastructure are worth highlighting. Of course, widespread power outages always create a massive inconvenience for impacted populations, but over the last several years, as communication, entertainment, commerce, and more have become increasingly reliant on the Internet, the impact of these outages has become even more significant, because losing electrical power largely means losing Internet connectivity. Although mobile connectivity may still be available in some cases, it is decidedly not a complete replacement, not to mention that mobile devices will eventually need to be recharged. While addressing the underlying infrastructure issues require non-trivial amounts of time, resources, and money, governments appear to be taking steps towards doing so.</p><p>Visit <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> for additional insights around Internet disruptions, routing issues, Internet traffic trends, security and attacks, and Internet quality. Follow us on social media at <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via e-mail.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">3xoUhxvPcDFTiYCT9CjHhs</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network trends and natural language: Cloudflare Radar’s new Data Explorer & AI Assistant]]></title>
            <link>https://blog.cloudflare.com/radar-data-explorer-ai-assistant/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare Radar Data Explorer provides a simple Web-based interface to build more complex API queries, including comparisons and filters, and visualize the results. The accompanying AI Assistant translates a user’s natural language statements or questions into the appropriate Radar API calls. ]]></description>
            <content:encoded><![CDATA[ <p><b></b><a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> showcases global Internet traffic patterns, attack activity, and technology trends and insights. It is powered by data from Cloudflare's global network, as well as aggregated and anonymized data from Cloudflare's <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS Resolver</u></a>, and is built on top of a rich, publicly accessible <a href="https://developers.cloudflare.com/radar/"><u>API</u></a>. This API allows users to explore Radar data beyond the default set of visualizations, for example filtering by protocol, comparing metrics across multiple locations or autonomous systems, or examining trends over two different periods of time. However, not every user has the technical know-how to make a raw API query or process the JSON-formatted response.</p><p>Today, we are launching the <a href="https://radar.cloudflare.com/explorer"><u>Cloudflare Radar Data Explorer</u></a>, which provides a simple Web-based interface to enable users to easily build more complex API queries, including comparisons and filters, and visualize the results. And as a complement to the Data Explorer, we are also launching an AI Assistant, which uses <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Workers AI</u></a> to translate a user’s natural language statements or questions into the appropriate Radar API calls, the results of which are visualized in the Data Explorer. Below, we introduce the AI Assistant and Data Explorer, and also dig into how we used Cloudflare Developer Platform tools to build the AI Assistant.</p>
    <div>
      <h2>Ask the AI Assistant</h2>
      <a href="#ask-the-ai-assistant">
        
      </a>
    </div>
    <p>Sometimes, a user may know what they are looking for, but aren’t quite sure how to build the relevant API query by selecting from the available options and filters. (The sheer number may appear overwhelming.) In those cases, they can simply pose a question to the AI Assistant, like “Has there been an uptick in malicious email over the last week?” The AI Assistant makes a series of Workers AI and Radar API calls to retrieve the relevant data, which is visualized within seconds:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HRBy5Bm5aNQ1gUj1MBCj5/e0fcd717765a8f234996b9e98e43389a/image8.png" />
          </figure><p>The AI Assistant pane is found on the right side of the page in desktop browsers, and appears when the user taps the “AI Assistant” button on a mobile browser. To use the AI Assistant, users just need to type their question into the “Ask me something” area at the bottom of the pane and submit it. A few sample queries are also displayed by default to provide examples of how and what to ask, and clicking on one submits it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79srygHorwU84nyQg9KLSl/be609d62b0ebf4a708f6f523fed817f1/Screenshot_2024-09-26_at_20.32.43.png" />
          </figure><p>The submitted question is evaluated by the AI Assistant (more <a href="#AIAssistant"><u>below</u></a> on how that happens), and the resulting visualization is displayed in the <b>Results</b> section of the Data Explorer. In addition to the visualization of the results, the appropriate <b>Data</b>, <b>Filter</b>, and <b>Compare</b> options are selected in the <b>Query</b> section above the visualization, allowing the user to further tune or refine the results if necessary. The <i>Keep current filters</i> toggle within the AI Assistant pane allows users to build on the previous question. For example, with that toggle active, a user could ask “Traffic in the United States”, see the resultant graph, and then ask “Compare it with traffic in Mexico” to add Mexico’s data to the graph.</p>
    <div>
      <h2>Building a query directly</h2>
      <a href="#building-a-query-directly">
        
      </a>
    </div>
    <p>For users that prefer a more hands-on approach, a wide variety of Radar datasets are available to explore, including traffic metrics, attacks, Internet quality, email security, and more. Once the user selects a dataset, the <i>Breakdown By:</i> dropdown is automatically populated with relevant options (if any), and <b>Filter</b> options are also dynamically populated. As the user selects additional options, the visualization in the <b>Result</b> section is automatically updated.</p><p>In addition to building the query of interest, Data Explorer also enables the user to compare the results, both against a specific date range and/or another location or <a href="https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (AS)</u></a>. To compare results with the immediately previous period (the last seven days with the seven days before that, for instance), just toggle on the <i>Previous period</i> switch. Otherwise, clicking on the <i>Date Range</i> field brings up a calendar that enables the user to select a starting date — the corresponding date range is intelligently selected, based on the date range selected in the <b>Filter</b> section. To compare results across locations or ASNs, clicking on the “Location or ASN” field brings up a search box in which the user can enter a location (country/region) name, AS name, or AS number, with search results updating as the user types. Note that locations can be compared with other locations or ASes, and ASes can be compared with other ASes or locations. This enables a user, for example, to compare trends for their ISP with trends for their country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R9F5Cxe8gkJCUHzLitNH3/87225186868c22f4a3b17a19c1bddd8c/image7.png" />
            
            </figure>
    <div>
      <h2>Visualizing the results</h2>
      <a href="#visualizing-the-results">
        
      </a>
    </div>
    <p>Much of the value of Cloudflare Radar comes from its visualizations – the graphs, maps, and tables that illustrate the underlying data, and Data Explorer does not disappoint here. Depending on the dataset and filters selected, and the volume of data returned, results may be visualized in a time series graph, bar chart, <a href="https://en.wikipedia.org/wiki/Treemapping"><u>treemap</u></a>, or global <a href="https://en.wikipedia.org/wiki/Choropleth_map"><u>choropleth map</u></a>. The visualization type is determined automatically based on the contents of the API response. For example, the presence of countryalpha2 keys in the response means a choropleth map will be used, the presence of timestamps in the response means a line graph (“xychart”) should be shown, and more than 40 items in the response selects a treemap as the visualization type.</p><p>To illustrate the extended visualizations available in Data Explorer, the figure below is an expanded version of one that would normally be found on <a href="https://radar.cloudflare.com/adoption-and-usage/us#http-1-x-vs-http-2-vs-http-3"><u>Radar’s </u><b><u>Adoption &amp; Usage</u></b><u> page</u></a>. The “standard” version of the graph plots the shares of the HTTP versions over the last seven days for the United States, as well as the summary share values. In this <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=http_version&amp;loc=US&amp;filters=botClass%253DLikely_Human%252CdeviceType%253DMobile&amp;dt=7d&amp;timeCompare=1&amp;compareWith=701"><u>extended version of the graph generated in the Data Explorer</u></a>, we compare data for the United States with HTTP version share data for <a href="https://radar.cloudflare.com/as701"><u>AS701 (Verizon)</u></a>, for both the past seven days and the previous seven-day period. In addition to the comparisons plotted on the time series graph, the associated summary values are also compared in an accompanying bar chart. This comprehensive visualization makes comparisons easy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Euh3n9A79zjXN05GQsTu0/e53fcfc5630beba215babd237875c610/image2.png" />
          </figure><p>For some combinations of datasets/filters/comparisons, time series graphs can get quite busy, with a significant number of lines being plotted. To isolate just a single line on the graph, double-click on the item in the legend. To add/remove additional lines back to/from the graph, single-click on the relevant legend item.</p><p>Similar to other visualizations on Radar, the resulting graphs or maps can be downloaded, copied, or embedded into another website or application. Simply click on the “Share” button above the visualization card to bring up the <b>Share</b> modal dialog. We hope to see these graphs shared in articles, blog posts, and presentations, and to see embedded visualizations with real-time data in your portals and operations centers!</p>
    <div>
      <h2>Still want to use the API? No problem.</h2>
      <a href="#still-want-to-use-the-api-no-problem">
        
      </a>
    </div>
    <p>Although Data Explorer was designed to simplify the process of building, and viewing the results of, more complex API queries, we recognize that some users may still want to retrieve data directly from the API. To enable that, Data Explorer’s <b>API</b> section provides copyable API calls as a direct request URL and a <a href="https://curl.se"><u>cURL</u></a> command. The raw data returned by the query is also available to copy or download as a JSON blob, for those users that want to save it locally, or paste it into another application for additional manipulation or analysis.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W3Zqrpfdtb0BgTnyV0bhu/e65e49260a67d0460b3e6e5d41fb7ae7/image6.png" />
          </figure><h2>How we built the AI Assistant</h2><p>Knowing all that AI is capable of these days, we thought that creating a system for an <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-large-language-model/"><u>LLM</u></a> to answer questions didn’t seem like an overly complex task. While there were some challenges, Cloudflare’s developer platform tools thankfully made it fairly straightforward. </p>
    <div>
      <h3>LLM-assisted API querying</h3>
      <a href="#llm-assisted-api-querying">
        
      </a>
    </div>
    <p>The main challenge we encountered in building the API Assistant was the large number of combinations of datasets and parameters that can potentially be visualized in the Data Explorer. There are around 100 <a href="https://developers.cloudflare.com/radar/"><u>API endpoints</u></a> from which the data can be fetched, with most able to take multiple parameters.</p><p>There were a few potential approaches to getting started. One was to take a previously trained LLM and further train it with the API endpoint descriptions in order to have it return the output in the required structured format which would then be used to execute the API query. However, for the first version, we decided against this approach of <a href="https://developers.cloudflare.com/workers-ai/fine-tunes/"><u>fine-tuning</u></a>, as we wanted to quickly test a few different models supported by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, and we wanted the flexibility to easily add or remove parameter combinations, as Data Explorer development was still under way. As such, we decided to start with prompt engineering, where all the endpoint-specific information is placed in the instructions sent to the LLM.</p><p>Putting the full detailed description of the API endpoints supported by the Data Explorer into the system prompt would be possible for an LLM with a larger context window (the number of tokens the model takes as input before generating output). Newer models are getting better with the <a href="https://github.com/gkamradt/LLMTest_NeedleInAHaystack"><u>needle in a haystack problem</u></a>, which refers to the issue whereby LLMs do not retrieve information (the needle) equally well if it is placed in different positions within the long textual input (the haystack). However, <a href="https://cs.stanford.edu/~nfliu/papers/lost-in-the-middle.arxiv2023.pdf"><u>it has been empirically shown</u></a> that the position of information within the large context still matters. Additionally, many of the Radar API endpoints have quite similar descriptions, and putting all the descriptions in a single instruction could be more confusing for the model, and the processing time also increases with larger contexts. Based on this, we adopted the approach of having multiple inference calls to an LLM.</p><p>First, when the user enters a question, a <a href="https://workers.cloudflare.com/"><u>Worker</u></a> sends this question and a short general description of the available datasets to the LLM, asking it to determine the topic of the question. Then, based on the topic returned by the model, a system prompt is generated with the endpoint descriptions, including only those related to the topic. This prompt, along with the original question, is sent to the LLM asking it to select the appropriate endpoint and its specific parameters. At the same time, two parallel inference calls to the model are also made, one with the question and the system prompt related to the description of location parameters, and another with the description of time range parameters. Then, all three model outputs are put together and validated.</p><p>If the final output is a valid dataset and parameter combination, it is sent back to the Data Explorer, which executes the API query and displays the resulting visualization for the user. Different LLMs were tested for this task, and at the end, <a href="https://developers.cloudflare.com/workers-ai/models/openhermes-2.5-mistral-7b-awq/"><u>openhermes-2.5-mistral-7b</u></a>, trained on code datasets, was selected as the best option. To give the model more context, not only is the user’s current question sent to the model, but the previous one and its response are as well, in case the next question asked by the user is related to the previous one. In addition, calls to the model are sent through Cloudflare’s <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, to allow for caching, rate limiting, and logging.</p><p>After the user is shown the result, they can indicate whether what was shown to them was useful or not by clicking the “thumbs up” or “thumbs down” icons in the response. This rating information is saved with the original question in <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, our <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database</a>, so the results can be analyzed and applied to future AI Assistant improvements.</p><p>The full end-to-end data flow for the Cloudflare Radar AI Assistant is illustrated in the diagram below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EMv28isng00dvxUwmVKWE/958791d319985a3441cbce7234fa1588/image1.png" />
          </figure>
    <div>
      <h3>When the LLM doesn’t know the answer</h3>
      <a href="#when-the-llm-doesnt-know-the-answer">
        
      </a>
    </div>
    <p>In some cases, however, the LLM may not “know” the answer to the question posed by the user. If the model does not generate a valid final response, then the user is shown three alternative questions. The intent here is to guide the user into asking an answerable question — that is, a question that is answerable with data from Radar.</p><p>This is achieved using a previously compiled (static) list of various questions related to different Radar datasets. For each of these questions, their <a href="https://www.cloudflare.com/en-gb/learning/ai/what-are-embeddings/"><u>embedding</u></a> is calculated using an <a href="https://developers.cloudflare.com/workers-ai/models/bge-small-en-v1.5"><u>embeddings model</u></a>, and stored in our <a href="https://developers.cloudflare.com/vectorize/"><u>Vectorize</u></a> <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-vector-database/"><u>vector database</u></a>. “Embeddings” are  numerical representations of textual data (vectors) capturing their semantic meaning and relationships, with similar text having vectors that are closer. When a user’s question does not generate a valid model response, the embedding of that question is calculated, and its vector is compared against all the stored vectors from the vector database, and the three most similar ones are selected. These three questions, determined to be similar to the user's original question, are then shown to the user.</p><p>There are also cases when the LLM gives answers which do not correspond to what the user asked, as hallucinations <a href="https://arxiv.org/pdf/2401.11817"><u>are currently inevitable</u></a> in LLMs, or when time durations are calculated inaccurately, as LLMs sometimes struggle with mathematical calculations. To help guard against this, AI Assistant responses are first validated against the API schema to confirm that the dataset and the parameter combination is valid. Additionally, Data Explorer dropdown options are automatically populated based on the AI Assistant’s response, and the chart titles are also automatically generated, so the user always knows exactly what data is shown in the visualization, even if it might not answer their actual question. </p>
    <div>
      <h2>Looking ahead</h2>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>We’re excited to enable more granular access to the rich datasets that currently power Cloudflare Radar. As we add new datasets in the future, such as DNS metrics, these will be available through Data Explorer and AI Assistant as well.</p><p>As noted above, Radar offers a predefined set of visualizations, and these serve as an excellent starting point for further exploration. We are adding links from each Radar visualization into Data Explorer, enabling users to further analyze the associated data to answer more specific questions. Clicking the “pie chart” icon next to a graph’s description brings up a Data Explorer page with the relevant metrics, options, and filters selected.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O1sG7QnjASEX81lu6ooBy/d81664234dfc8024121eedba75aaef6d/image5.png" />
          </figure><p>Correlating observations across two different metrics is another capability that we are also working on adding to Data Explorer. For example, if you are investigating an Internet disruption, you will be able to plot traffic trends and announced IP address space for a given country or autonomous system on the same graph to determine if both dropped concurrently.</p><p>But for now, use the Data Explorer and AI Assistant to go beyond what Cloudflare Radar offers, finding answers to your questions about what’s happening on the Internet.  If you share Data Explorer visualizations on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). You can also reach out on social media, or contact us via email, with suggestions for future Data Explorer and AI Assistant functionality.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LCKQEfkvBhOQFugqOGhy2/239db21c6fc18a830b8643171534372f/image4.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4R2kUv9mZSgnAXmKOKTbLz</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[A global assessment of third-party connection tampering]]></title>
            <link>https://blog.cloudflare.com/connection-tampering/</link>
            <pubDate>Thu, 05 Sep 2024 07:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare brings visibility to the practice of connection tampering as observed from our global network. ]]></description>
            <content:encoded><![CDATA[ <p>Have you ever made a phone call, only to have the call cut as soon as it is answered, with no obvious reason or explanation? This analogy is the starting point for understanding connection tampering on the Internet and its impact. </p><p>We have <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>found</u></a> that 20 percent of all Internet connections are abruptly closed before any useful data can be exchanged. Essentially, every fifth call is cut before being used. As with a phone call, it can be challenging for one or both parties to know what happened. Was it a faulty connection? Did the person on the other end of the line hang up? Did a third party intervene to stop the call?  </p><p>On the Internet, Cloudflare is in a unique position to help figure out when a third party may have played a role. Our global network allows us to identify patterns that suggest that an external party may have intentionally tampered with a connection to prevent content from being accessed. Although they are often hard to decipher, the ways connections are abruptly closed give clues to what might have happened. Sources of tampering generally do not try to hide their actions, which leaves hints of their existence that we can use to identify detectable ‘signatures’ in the connection protocol. As we explain below, there are other protocol features that are less likely to be spoofed and that point to third party actions. We can use these hints to build signature patterns of connection tampering that can be recognized.</p><p>To be clear, there are many reasons a third party might tamper with a connection. Enterprises may tamper with outbound connections from their networks to prevent users from interacting with spam or phishing sites. ISPs may use connection tampering to enforce court or regulatory orders that demand website blocking to address copyright infringement or for other legal purposes. Governments may mandate large-scale censorship and information control. </p><p>Despite the fact that everyone knows it happens, no other large operation has previously looked at the use of connection tampering at scale and across jurisdictions. We think that creates a notable gap in understanding what is happening in the Internet ecosystem, and that shedding light on these practices is important for transparency and the long-term health of the Internet. So today, we’re proud to share a view of global connection tampering practices.</p><p>The full technical details were recently peer-reviewed and published in “<a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>Global, Passive Detection of Connection Tampering</u></a>” at ACM SIGCOMM, with its <a href="https://youtu.be/RD73IgzQMFo?si=OWvNnlNNLalbhygV&amp;t=2984"><u>public presentation</u></a>. We’re also announcing a new <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard</u></a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-connection-tampering-summary"><u>API</u></a> on Cloudflare Radar that shows a near real-time view of specific connection timeout and reset events – the two mechanisms dominant in tampering experienced by users<b> </b>connecting to Cloudflare’s network globally.</p><p>To better understand our perspective, it helps to understand the nature of connection tampering and reasons we’re talking about it.</p>
    <div>
      <h2>Global insights for a global audience</h2>
      <a href="#global-insights-for-a-global-audience">
        
      </a>
    </div>
    <p>Evidence of connection tampering is visible in networks all around the world. We were initially shocked that, globally, about 20% of all connections to Cloudflare close unexpectedly before any useful data exchange occurs — consistent with connection tampering. Here is a snapshot of these anomalous connections seen by Cloudflare that, as of today, <a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>we’re sharing on Radar</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nPz5Ulu2YS7eV6Hpmniwg/fa2537c949602d057dfa83a6a599f553/2544-2.png" />
          </figure><p><i><sub>via </sub></i><a href="https://radar.cloudflare.com/security-and-attacks?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><i><sub>Cloudflare Radar</sub></i></a></p><p>It’s not all tampering, but some of it clearly is, as we describe in more detail below. The challenge is filtering through the noise to determine which anomalous connections can confidently be attributed to tampering.</p>
    <div>
      <h2>Macro-level analysis and validation</h2>
      <a href="#macro-level-analysis-and-validation">
        
      </a>
    </div>
    <p>In <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>our work</u></a> we identified 19 patterns of anomalous connections as being candidate signatures for connection tampering. From those, we found that 14 had been previously reported by active “on the ground” measurement efforts, which presented an opportunity for validation at macro-level: If we observe our tampering signatures from Cloudflare’s network in the same places others observe them from the ground, we could have greater confidence that the signatures capture true cases of connection tampering when observed elsewhere, where there has been no prior reporting. To mitigate the risk of confirmation bias from looking where tampering is known to exist, we decided to look everywhere at the same time.</p><p>Taking that approach, the figure below, taken from our peer-review <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>study</u></a>, is a visual side-by-side comparison of each of the 19 signatures. The data is taken from a two-week interval starting January 26, 2023. Within each signature column is the proportion of matching connections broken down by the country where the connection originated. For example, the column third from the right labeled with ⟨PSH → RST;RST<sub>0</sub>⟩ indicates that we almost exclusively observed that signature on connections from China. Overall, what we find is a mirror of known cases from public and prior reports, which is an indication that our methodology works.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4w1iJCVyRwZdgblT7uk2tZ/53a3201f13cf1b4994db8f8a43b9d64b/2544-3.png" />
            
            </figure><p><i><sub></sub></i><a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><i><sub><u>Figure 1</u></sub></i></a><i><sub>: Signature matching across countries: Each column is the total global number of connections matching a specific signature. Within each column is the proportion of connections initiations from individual countries matching that signature.</sub></i></p><p>Interestingly, by honing in on prevalence, and setting aside the raw number of signature matches, interesting patterns emerge. As a result of this data-driven perspective, unexpected macro-insights also emerge. If we focus on the three most populous countries in the world ranked by <a href="https://worldpopulationreview.com/country-rankings/internet-users-by-country"><u>number of Internet users</u></a>, connections from China contribute a substantial portion of matches across no fewer than 9 of the signatures. This is perhaps unsurprising, but reinforces prior studies that find evidence of the Great Firewall (GFW) being made of many <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>different deployments and implementations</u></a> of blocking mandates. Next, matches on connections from India also contribute substantially to nine 9 different signatures, five of which are in common with signatures where China matches feature highly. Looking at the third most populous, the United States, a visible if not substantial proportion of matches appear on all but two of the signatures.</p><p>A snapshot of signature distributions per-country, also taken from the peer-review <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>study</u></a>, appears below for a select set of countries. The global distribution is included for comparison. The dark gray portions marked ⟨SYN → ∅⟩ are included for completeness, but have more non-tampering alternative explanations than the others (for example, as result of a low-rate <a href="https://blog.cloudflare.com/the-rise-of-multivector-amplifications/"><u>SYN flood</u></a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/57Dip4I995kVVjXAhQxMrH/da5414d088777c000551a66589b80c3f/2544-4.png" />
            
            </figure><p><a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><sub><i><u>Figure 4</u></i></sub></a><sub><i>: Signature distribution per country: The percentage of connections originating from select countries (and globally) that match a particular signature, or are not tampered with.</i></sub></p><p>From this perspective we again observe patterns that match prior studies. We focus first on rates above the global average, and ignore the noisiest signature ⟨SYN → ∅⟩ in medium-gray; there are simply too many other explanations for a signature match at this earliest possible stage. Among all connections from Turkmenistan (TM), Russia (RU), Iran (IR), and China (CN), roughly 80%, 30%, 40%, and 30%, respectively, of those connections match a tampering signature. The data also reveals high signature match rates where no prior reports exist. For example, connections from Peru (PE) and Mexico (MX), match roughly 50% and 25%, respectively; <a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>analysis of individual networks</u></a> in these countries suggests a likely explanation is zero-rating in mobile and cellular networks, where an ISP allows access to certain resources (but not others) at no cost. If we look below the global average, Great Britain (GB), the United States (US), and Germany (DE), each match a signature on about 10% of connections.</p><p>The data makes clear that connection tampering is widespread, and close to many users, if not most. In many ways, it’s closer than most know. To explain why, we explain connection tampering with a very familiar communication tool, the telephone.</p>
    <div>
      <h2>Explaining tampering with telephone calls</h2>
      <a href="#explaining-tampering-with-telephone-calls">
        
      </a>
    </div>
    <p>Connection tampering is a way for a third party to block access to particular content. However, it’s not enough for the third party to know the <i>type</i> of content it wants to block. The third party can only block an identity by name. </p><p>Ultimately, connection tampering is possible only by accident – an unintended side effect of protocol design. On the Internet, the most common identity is the domain name. In a communication on the Internet, the domain name is most often transmitted in the “<a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-sni/"><u>server name indication (SNI)</u></a>” field in TLS – exposed in cleartext for all to see.</p><p>To understand why this matters, it helps to understand what connection tampering looks like in human-to-human communications without the Internet. The Internet itself looks and operates much like the postal system, which relies only on addresses and never on names. However, the way most people use the Internet is much more like the “<a href="https://en.wikipedia.org/wiki/Plain_old_telephone_service"><u>plain old telephone system</u></a>,” which <i>requires</i> names to succeed.</p><p>In the telephone system, a person first dials a phone number, <i>not</i> a name. The call is <code>connected</code> and usable only after the other side answers, and the caller hears a voice.  The caller asks for a name only <i>after</i> the call is connected. The call manifests in the system as energy signals that do not identify the communicating parties. Finally, after the call ends, a new call is required to communicate again.</p><p>On the Internet, a client such as a browser “establishes a connection.” Much like a telephone caller, it initiates a connection request to a server’s <code>number</code>, which is an IP address. The longest-standing “connection-oriented” protocol to connect two devices is called the <a href="https://cloudflare.tv/shows/this-week-in-net/this-week-in-net-50th-anniversary-of-the-tcp-paper/oZKEA4v4"><u>Transmission Control Protocol</u></a>, or TCP. The domain name is transmitted in isolation from the connection establishment, much like asking for a name once the phone is answered. The connections are “logical” identified by metadata that does not identify communicating parties. Finally, a new connection is established with each new visit to a website.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BzA3XvqopuaP1WSg0rK6X/fe39d77acdc14c1d984512dfdb01279c/2544-5.png" />
          </figure><p><sub><i>Comparison between a TCP connection and a telephone call</i></sub></p><p>What happens if a telephone company is required to prevent a call to some party? One option is to modify or manipulate phone directories so a caller can’t get the phone number they need to dial the phone that makes the call; this is the essence of <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-dns-filtering/"><u>DNS filtering</u></a>. A second option is to block all calls to the phone number, but this inadvertently affects others, just like <a href="https://blog.cloudflare.com/consequences-of-ip-blocking/"><u>IP blocking</u></a> does.</p><p>Once a phone call is initiated, the only way for the telephone company to know <i>who</i> is being called is to listen in on the call and wait for the caller to say, “is so-and-so there?” or “can I speak with so-and-so?” Mobile and cellular calls are no exception. The idea that the number we call <i>is</i> the person who will answer is just an expectation – it has never been the reality. For example, a parent could get a number to give to their child, or a taxi company could leave the mobile phone with whomever is on-shift at the time. As a result, the telephone company <i>must listen in</i>. Once it hears a certain name it can cut the call; neither side would have any idea what has happened – this is the very definition of connection tampering on the Internet. </p><p>For the purpose of establishing a communication channel, phone calls and TCP connections are at least comparable, and arguably exactly the same – not least because the domain name is transmitted separately from establishing a connection.</p><p>Similarly, on the Internet, the only way for a third party to know the intended recipient of a connection is to “look inside” of packets as they are transmitted. Where a telephone company would have to listen for a name, a third party on the Internet waits to see something it does not like, most often a forbidden name. Recall from above the unintended side-effect of the protocol: the name is visible in the SNI, which is required to help encrypt the data communication. When that happens, the third party causes one or both devices to close the connection by either dropping messages or injecting specially-crafted messages that cause the communicating parties to abort the connection.</p><p>The mechanisms to trigger tampering begin with <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/"><u>deep packet inspection (DPI)</u></a>, which means looking into the data portions that lie beyond the address and other metadata belonging to the connection. It’s safe to say that this functionality does not come for free; whether it’s an ISP’s router or a parental proxy, DPI is an expensive operation that gets more expensive at large scale or high speed. </p><p>One last point worth mentioning is that weaknesses in telephone tampering similarly appear in connection tampering. For example, the sound of Jean and Gene are indistinguishable to any ear, despite being different names. Similarly, tampering with connections to Twitter’s short-form name “t.co” would also affect “microsoft.com” – and <a href="https://en.wikipedia.org/wiki/Internet_censorship_in_Russia#Deep_packet_inspection"><u>has</u></a>.</p>
    <div>
      <h2>A live view of tampering during Mahsa Amini protests</h2>
      <a href="#a-live-view-of-tampering-during-mahsa-amini-protests">
        
      </a>
    </div>
    <p>Before we delve deeply into the technical, there is one more motivation that is personal to many at Cloudflare. Transparency is important and the reason we started this work, but it was after seeing the data <i>during</i> the Mahsa Amini protests in Iran in 2022 that we committed internally to share the data on Radar. </p><p>The figure below is for connections from Iran during 17 days overlapping the protests. The plot-lines track individual signals of anomalous connections, including signatures of <a href="https://blog.cloudflare.com/passive-detection-of-connection-tampering"><u>different types</u></a> of connection tampering. This data pre-dates the Radar service, so we have elected to share this representation from the <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>peer-reviewed paper</u></a>. It was also the first visual example of the value of the data if it could be shared via Radar. 
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3IKNhC2gLo7CeUQclssiuM/58300eccf981f132689ee75b57db8cb2/2544-6.png" />
          </figure><p><sub><i></i></sub><a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><sub><i><u>Figure 8</u></i></sub></a><sub><i>: Signature match rates longitudinally in Iran during a period of nation-wide protests. (𝑥-axis is local time.)</i></sub></p><p></p><p>From the data there are two observations that stick out. First is the way that the lines appear stable before the protests, then increase after the protests began. Second is the variation between the lines over time, in particular the lines in light gray, dark purple, and dark green. Recall that each line is a different tampering signature, so the variation between lines suggests changes in the underlying causes – either the mechanisms at work, or the traffic that invokes them.</p><p>We emphasize that a signature match, alone, does not in itself mean there is tampering. However, in the case of Iran in 2022 there were public reports of blocking of various forms. The methods in use at the time, specifically <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-sni/"><u>Server Name Indication (SNI)</u></a>-based blocking of access to content, had also previously been <a href="https://ooni.org/post/2020-iran-sni-blocking/"><u>well-documented</u></a>, and matched with our observations represented by the figure above.</p><p>What about today? Below we see the Radar view of the twelve months from August 2023 to August 2024. Each color represents a different stage of the connection where tampering might happen. In the previous 12 months, TCP connection anomalies in Iran are lower than the <a href="https://radar.cloudflare.com/security-and-attacks?dateStart=2024-08-01&amp;dateEnd=2024-08-08"><u>worldwide averages</u></a>, overall, but appear significantly higher in the portion of anomalies represented by the light-blue region. This “Post ACK” phase of communication is often associated with SNI-based blocking. (In the graph above, the relevant signatures are represented by the dark purple and dark green lines.) Alongside, the changing proportions of the different plot-lines since mid-December 2023 suggest that techniques have been changing over time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qhesraWkFdNPbWgx2x0xX/1a72a1707e768270c29d570b5bd35545/2544-7.png" />
          </figure><p><i><sub>via </sub></i><a href="https://radar.cloudflare.com/security-and-attacks/ir?dateStart=2023-08-26&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><i><sub>Cloudflare Radar</sub></i></a></p>
    <div>
      <h2>The importance of an open network measurement community</h2>
      <a href="#the-importance-of-an-open-network-measurement-community">
        
      </a>
    </div>
    <p>As a testament to the importance of open measurement and research communities, this work very literally “<a href="https://en.wikipedia.org/wiki/Standing_on_the_shoulders_of_giants">builds on the shoulders of giants</a>.” It was produced in collaboration with researchers at the <a href="https://www.cs.umd.edu/">University of Maryland</a>, <a href="https://www.epfl.ch/">École Polytechnique Fédérale de Lausanne</a>, and the <a href="https://cse.engin.umich.edu/">University of Michigan</a>, but does not exist in isolation. There have been extensive efforts to measure connection tampering, most of which comes from the censorship measurement community. The bulk of that work consists of <i>active</i> measurements, in which researchers craft and transmit probes in or along networks and regions to identify blocking behavior. Unsurprisingly, active measurement has both strengths and weaknesses, as described in <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>Section 2</u></a> in the paper). </p><p>The counterpart to active measurement, and the focus of our project, is <i>passive</i> measurement, which takes an “observe and do nothing” approach. Passive measurement comes with its own strengths and weaknesses but, crucially, it relies on having a good vantage point such as a large network operator. Each of active and passive measurements are most effective when working in conjunction, in this case helping to paint a more complete picture of the impact of connection tampering on users.</p><p>Most importantly, when embarking upon any type of measurement, great care must be taken to understand and <a href="https://cacm.acm.org/magazines/2016/10/207765-ethical-considerations-in-network-measurement-papers/fulltext"><u>evaluate the safety of the measurement</u></a> since the risk imposed on people and networks are often indirect, or hidden from view.</p>
    <div>
      <h2>Limitations of our data</h2>
      <a href="#limitations-of-our-data">
        
      </a>
    </div>
    <p>We have no doubt about the importance of being transparent with connection tampering, but we also need to be explicit about the limits on the insights that can be gleaned from the data. As passive observers of connections to the Cloudflare network – and only the Cloudflare network – we are only able to see or infer the following:</p><ol><li><p><b>Signs of connection tampering, but not where it happened.</b> Any software or device between the client’s application and the server systems can tamper with a connection. The list ranges from purpose-built systems, to firewalls in the enterprise or home broadband router, and protection software installed on home or school computers. <i>All we can infer is where the connection started</i> (albeit at the limits of geolocation inaccuracies inherent in the Internet’s design)<i>.</i></p></li><li><p><b>(Often, but not always) What triggered the tampering, but not why.</b> Typically, tampering systems are triggered by domain names, keywords, or regular expressions. With enough repetition, and manual inspection, it may be possible to identify the <i>likely</i> cause of tampering, but not the reasons. Many tampering system designs are prone to unintended consequences, among them the <a href="https://en.wikipedia.org/wiki/Internet_censorship_in_Russia#Deep_packet_inspection"><u>t.co</u></a> example mentioned above.</p></li><li><p><b>Who and what </b><b><i>is</i></b><b> affected, but not who or what </b><b><i>could</i></b><b> be affected.</b> As passive observers, there are limits on the kinds of inferences we can make. For example, observable tampering on 1000 out of 1001 connections to <code>example.com</code> suggests that tampering is likely on the next connection attempt. However, that says nothing about connections to <code>another-example.com</code>. </p></li></ol>
    <div>
      <h2>Data, data, data: Extracting signals from the noise</h2>
      <a href="#data-data-data-extracting-signals-from-the-noise">
        
      </a>
    </div>
    <p>If you just want to get and use the data on Radar, see our “<a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>how to</u></a>” guide. Otherwise, let’s understand the data itself.</p><p>The focus of this work is <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/"><u>TCP</u></a>. In our data there are two mechanisms available to a third-party to force a connection to close: <a href="https://en.wikipedia.org/wiki/Packet_drop_attack"><u>dropping packets</u></a> to induce timeouts or <a href="https://en.wikipedia.org/wiki/TCP_reset_attack#TCP_resets"><u>injecting forged TCP RST packets</u></a>, each with various deployment choices. Individual tampering signatures may be reflections of those choices. For comparison, a graceful TCP close is initiated with a FIN packet. </p>
    <div>
      <h3>Connection tampering signatures</h3>
      <a href="#connection-tampering-signatures">
        
      </a>
    </div>
    <p>Our detection mechanism evaluates sets of packets in a connection against a set of <i>signatures</i> for connection tampering. The signatures are hand-crafted from signatures identified in prior work, and by analyzing samples of connections to Cloudflare’s network that we classify as <i>anomalous </i>– connections that close early, and ungracefully by way of a RST packet or timeout within the first 10 packets from the client. We analyzed the samples and found that 19 patterns accounted for 86.9% of all possibly tampered connections in the samples, shown in the table below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LssSxT9SkDpXzMXtPmtZ1/a18e564cf39613bb7fe7569337d91b65/2544-8.png" />
          </figure><p><sub></sub><a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><sub><u>Table 1</u></sub></a><sub>: The comprehensive set of tampering signatures we identify through global passive measurements.</sub></p><p></p><p>To help reason about tampering, we also classed the 19 signatures above according to the stage of the connection lifetime in which they appear. Each stage implies something about the middlebox, as described below alongside corresponding sequence diagrams:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49GKWrmtfdg9Xpk0K2RiGJ/f0e755a2ba1fcac763a44185bf566f61/Screenshot_2024-09-04_at_2.57.52_PM.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6xZbuENcYfkucNmVUJmwQv/b1f69b105c2e19eb9f5ef583d50416b8/Screenshot_2024-09-04_at_2.58.00_PM.png" />
          </figure><p></p><ul><li><p><b>(a) Post-SYN (mid-handshake)</b>: Tampering is likely triggered by the destination IP address because the middlebox has likely not seen application data, which is typically transmitted after the handshake completes.</p></li><li><p><b>(b) Post-ACK (immediately after handshake)</b>: The connection is established and immediately forced to close before seeing any data. It is possible, even likely, that the middlebox has likely seen a data packet; for example, the host header in HTTP or SNI field in TLS. </p></li><li><p><b>(c) Post-PSH (after first data packet)</b>: The middlebox has definitely seen the first data packet because the server has received it. The middlebox may have been waiting for a packet with a PSH flag, typically set to indicate data in the packet should be delivered to the application on receipt, without delay. The likely middlebox is likely a <a href="https://en.wikipedia.org/wiki/Man-on-the-side_attack"><u>monster-on-the-side</u></a> because it permits the offending packet to reach the destination.</p></li><li><p><b>(d) Later-in-flow (after multiple data packets)</b>: Tampering at later stages in the connection (not immediately after the first data packet, but still within the first 10 packets). The prevalence of encrypted data in TLS makes this the least likely stage for tampering to occur. The likely triggers are keywords appearing in cleartext later in (HTTP) connections, or by the likes of enterprise proxies and parental protection software that has visibility into encrypted traffic and can reset connections when certain keywords are encountered. </p></li></ul>
    <div>
      <h3>Accounting for alternative explanations</h3>
      <a href="#accounting-for-alternative-explanations">
        
      </a>
    </div>
    <p>How can we be confident that the signatures above detect middlebox tampering, and not just atypical client behavior? One of the challenges of passive measurement is that we do not have full visibility into the clients connecting to our network, so absolute positives are hard if not impossible. Instead, we look for strong positive evidence of tampering, that must first begin by identifying <b>false positives</b>. </p><p>We are aware of the following sources of false positives that can be hard to disambiguate from true sources of tampering. <i>All but the last occur in the first two stages</i> of the connection, before data packets are received. </p><ul><li><p><b>Scanners</b> are client-side applications that probe servers to elicit responses. Some scanner software uses fixed bits in the header to self-identify, which helps us filter. For example, we found that <a href="https://zmap.io/"><u>Zmap</u></a> accounts for approximately 1% of all <code>⟨SYN → RST⟩</code> signature matches.</p></li><li><p><b>SYN flood attacks</b> are another likely source of false positives, especially for signatures in the Post-SYN connection stage like the <code>⟨SYN → ∅⟩</code> and <code>⟨SYN → RST⟩</code> signatures. These are less likely to appear in our dataset collection, which happens <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>after the DDoS protection</u></a> systems.</p></li><li><p><b>Happy Eyeballs</b> is a <a href="https://datatracker.ietf.org/doc/html/rfc8305"><u>common technique</u></a> used by dual-stack clients in which the client initiates an IPv6 connection to the server and, with some delay to favor IPv6, also makes an IPv4 connection. The client keeps the connection that succeeds first and drops the other. Clients that cease transmission or close the connection with a RST instead of a FIN would show up in the data, matching the <code>⟨SYN → RST⟩</code> signature. </p></li><li><p><b>Browser-triggered RSTs</b> may appear at any stage of the connection, but especially for signatures that match later in a connection (after multiple data packets). It might be triggered, for example, by a user closing a browser tab. Unlike targeted tampering, however, RSTs originating from browsers are unlikely to be biased towards specific services or websites. </p></li></ul><p>How can we separate legitimate client-initiated false positives from third-party tampering? We seek an evidence-based approach to distinguish tampering signatures from other signals within the dataset. For this we turn to individual bits in the packet headers.</p>
    <div>
      <h3>Signature validation – letting the data speak</h3>
      <a href="#signature-validation-letting-the-data-speak">
        
      </a>
    </div>
    <p>Signature matches in isolation are insufficient to make good determinations. Alongside, we can find further supporting evidence of their accuracy by examining connections in aggregate – if the cause is tampering, and tampering is targeted, then there must be other patterns or markers in common. For example, we expect browser behavior to appear worldwide; however, as we showed above, signatures that match on connections in only some places or some time intervals stick out. </p><p>Similarly, we expect certain characteristics in contiguous packets within a connection to also stick out, and indeed they do, namely in the <a href="https://datatracker.ietf.org/doc/html/rfc6864"><u>IP-ID</u></a> and <a href="https://www.cloudflare.com/learning/cdn/glossary/time-to-live-ttl/"><u>TTL</u></a> fields in the IP header.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CVNobND5JzSYY4rszgem9/6b533f5a3681cf8c4f05d6a6179c0630/Screenshot_2024-09-04_at_2.57.36_PM.png" />
          </figure><p><b>The IP-ID (IP identification) field</b> in the IPv4 packet header is usually a fixed per-connection value, often incremented by the client for each subsequent packet it sends. In other words, we expect the change in IP-ID value in subsequent packets sent from the same client to be small. Thus, large changes in IP-ID value between subsequent packets are unexpected in normal connections, and could be used as an indicator of packet injection. This is exactly what we see in the figure above, marked (a), for a select set of signatures.</p><p><b>The Time-to-Live (TTL) field </b>offers another clue for detecting injected packets. Here, too, most client implementations use the same <a href="https://www.cloudflare.com/learning/cdn/glossary/time-to-live-ttl/"><u>TTL</u></a> for each packet sent on a connection, usually set initially to either 64 or 128 and decremented by every router along the packet’s route. If a RST packet does not have the same TTL as other packets in a connection, it’s a strong signal that it was injected. Looking at the figure above, marked (b), we can see marked differences in TTLs, indicating the presence of a third party. </p><p>We strongly encourage readers to read the <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>underlying details</u></a> of how and why these make sense.  Connections with high maximum IP-ID and TTL differences give positive evidence for traffic tampering, but the <i>absence</i> of these signals does not necessarily mean that tampering did not occur, as some middleboxes are known to <a href="https://censoredplanet.org/assets/censorship-devices.pdf"><u>copy IP header values</u></a> including the IP-ID and TTL from the original packets in the connection. Our interest is in responsibly ensuring our dataset has indicative value.</p><p><b>There is one last caveat: </b>While our tampering signatures capture many forms of tampering, there is still potential for<b> false negatives</b> for connections that <i>were</i> tampered with but escaped our detection. Some examples are connections terminated after the first 10 packets (since we don’t sample that far), FIN injection (a less common alternative to RST injection), or connections where all packets are dropped before reaching Cloudflare’s servers. Our signatures also do not apply to <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP-based protocols</u></a> such as QUIC. We hope to expand the scope of our connection tampering signatures in the future.</p>
    <div>
      <h2>Case studies</h2>
      <a href="#case-studies">
        
      </a>
    </div>
    <p>To get a sense of how this looks on the Cloudflare network, below we provide further examples of TCP connection anomalies that are consistent with <a href="https://ooni.org/reports/"><u>OONI reports</u></a> of connection tampering.</p><p>For additional insights from this specific study, see the full technical <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>paper</u></a> and <a href="https://www.youtube.com/watch?v=DyDv3MHICto&amp;list=PLU4C2_kotFP2JAkoL6pcgbb52f6GIJJd7&amp;ab_channel=ACMSIGCOMM"><u>presentation</u></a>. For other regions and networks not listed below, please see the <a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>new data on Radar</u></a>.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Reporting from <a href="https://tribune.com.pk/story/2491142/pakistan-should-be-transparent-about-internet-disruptions-surveillance-amnesty-international"><u>inside</u></a> Pakistan suggests changes in users’ Internet experience throughout August 2024. Taking a look at a two-week interval in early August, there is a significant shift in Post-ACK connection anomalies starting on August 9, 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38SPF52mjzVCDvEnO63hhu/c1a5e7b57d3f63bcf12349dbe7e1b377/2544-12.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/pk?dateStart=2024-08-03&amp;dateEnd=2024-08-17#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>The August 9 Post-ACK spike can be almost entirely attributed to <a href="https://radar.cloudflare.com/as56167"><u>AS56167 (Pak Telecom Mobile Limited)</u></a>, shown below in the first image, where Post-ACK anomalies jumped from under 5% to upwards of 70% of all connections, and has remained high since. Correspondingly, we see a significant reduction in the number of successful HTTP requests reaching Cloudflare’s network from clients in AS56167, below in the second image, which provides evidence that connections are being disrupted. This Pakistan example reinforces the importance of corroborating reports and observations, discussed in more detail in the <a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>Radar dataset release</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6y0WGCYjlvOhOurny2rN7p/6afbbd35e037beac32728f0e93b1fe17/2544-13.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS56167?dateStart=2024-08-03&amp;dateEnd=2024-08-17#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aFE80hJQ5f6uJprUYFmEt/b79ffa0e1c8e30fcb57d9a8bb97c41b3/2544-14.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/traffic/AS56167?dateStart=2024-08-03&amp;dateEnd=2024-08-17#http-traffic"><sub><i>Cloudflare Radar</i></sub></a></p>
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p>A <a href="https://ooni.org/post/2024-tanzania-lgbtiq-censorship-and-other-targeted-blocks/"><u>OONI report</u></a> from April 2024 discusses targeted connection tampering in <a href="https://radar.cloudflare.com/tz"><u>Tanzania</u></a>. The report states that this blocking is observed on the client side as connection timeouts after the <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/"><u>Client Hello</u></a> message during the <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/"><u>TLS handshake</u></a>, indicating that a middlebox is dropping the packet containing the Client Hello message. On the server side, connections tampered with in this way would appear as Post-ACK timeouts as the PSH packet containing the Client Hello message never reaches the server.</p><p>Looking at the Post-ACK data represented in the light-blue portion, below, we find matching evidence: close to 30% of all new TCP connections from Tanzania appear as Post-ACK anomalies. Breaking this down further (not shown in the plots below), approximately one third is due to timeouts, consistent with the OONI report above. The remainder is due to RSTs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IVvmuECBkPhL8xS7fdOcV/203ca4916a474d2c06f02d6a3f04d006/2544-15.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/tz?dateStart=2024-07-24&amp;dateEnd=2024-08-20#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p></p>
    <div>
      <h3>Ethiopia</h3>
      <a href="#ethiopia">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/et"><u>Ethiopia</u></a> is another location with <a href="https://ooni.org/post/2023-ethiopia-blocks-social-media/"><u>previously-reported</u></a> connection tampering. Consistent with this, we see elevated rates of Post-PSH TCP anomalies across networks in Ethiopia. Our internal data shows that the majority of Post-PSH anomalies in this case are due to RSTs, although timeouts are also prevalent.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YTj7Kypiu0nSjmvZ00Jjo/b3306284a04a67d91351da645b6332f7/2544-16.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/et?dateStart=2024-07-24&amp;dateEnd=2024-08-20#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>The majority of traffic arriving to Cloudflare’s servers from IP addresses geolocated in Ethiopia is from <a href="https://radar.cloudflare.com/as24757"><u>AS24757 (Ethio Telecom)</u></a>, shown below in the first image, so it is perhaps unsurprising that its data closely matches the country-wide distribution of connection anomalies. The number of Post-PSH connections originating from <a href="https://radar.cloudflare.com/as328988"><u>AS328988 (SAFARICOM TELECOMMUNICATIONS ETHIOPIA PLC)</u></a>, shown below in the second image, are higher in proportion and account for over 33% of all connections from that network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43sDPBfmz2u2JIRIPN0htd/6e0825edaef48ba73df9180a30411231/2544-17.png" />
          </figure><p><sub>via </sub><a href="https://radar.cloudflare.com/security-and-attacks/AS24757?dateStart=2024-07-24&amp;dateEnd=2024-08-20#tcp-resets-and-timeouts"><sub>Cloudflare Radar</sub></a></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fyguCauAPqdXYXkCvhjAl/7e86f97f2b71a73cbf3d8c95d27a92b1/2544-18.png" />
          </figure><p><sub>via </sub><a href="https://radar.cloudflare.com/security-and-attacks/AS328988?dateStart=2024-07-24&amp;dateEnd=2024-08-20#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p>
    <div>
      <h2>Reflecting on the present to promote a resilient future</h2>
      <a href="#reflecting-on-the-present-to-promote-a-resilient-future">
        
      </a>
    </div>
    <p>Connection tampering is a blocking mechanism that is deployed in various forms throughout the Internet. Although we have developed ways to help detect and understand it globally, the experience is just as individual as an interrupted phone call.</p><p>Connection tampering is also made possible <i>by accident</i>. It works because domain names are visible in cleartext. But it may not always be this way. For example, <a href="https://datatracker.ietf.org/doc/draft-ietf-tls-esni/"><u>Encrypted Client Hello (ECH)</u></a> is an emerging building block that encrypts the SNI field. </p><p>We’ll continue to look for ways to talk about network activity and disruption, all to foster wider conversations. Check out the newest additions about connection anomalies on <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>Cloudflare Radar</u></a> and the <a href="https://blog.cloudflare.com/tcp-resets-timeouts"><u>corresponding blog post</u></a>, as well as the <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>peer-reviewed technical paper</u></a> and its <a href="https://youtu.be/RD73IgzQMFo?si=OWvNnlNNLalbhygV&amp;t=2984"><u>15-minute summary talk</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Research]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">2PQ5yUYNh250JZfC8YuElJ</guid>
            <dc:creator>Ram Sundara Raman</dc:creator>
            <dc:creator>Luke Valenta</dc:creator>
            <dc:creator>Marwan Fayed</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bringing insights into TCP resets and timeouts to Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/tcp-resets-timeouts/</link>
            <pubDate>Thu, 05 Sep 2024 07:00:00 GMT</pubDate>
            <description><![CDATA[ New TCP resets and timeouts dataset on Cloudflare Radar surfaces connection tampering, scanning, DoS attacks, and more. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare handles over 60 million HTTP requests per second globally, with <a href="https://radar.cloudflare.com/adoption-and-usage"><u>approximately 70%</u></a> received over <a href="https://datatracker.ietf.org/doc/html/rfc9293"><u>TCP</u></a> connections (the remaining are <a href="https://datatracker.ietf.org/doc/html/rfc9000"><u>QUIC</u></a>/<a href="https://datatracker.ietf.org/doc/html/rfc768"><u>UDP</u></a>). Ideally, every new TCP connection to Cloudflare would carry at least one request that results in a successful data exchange, but that is far from the truth. In reality, we find that, globally, <a href="https://radar.cloudflare.com/security-and-attacks/#tcp-resets-and-timeouts"><u>approximately 20%</u></a> of new TCP connections to Cloudflare’s servers time out or are closed with a TCP “abort” message either before any request can be completed or immediately after an initial request.</p><p>This post explores those connections that, for various reasons, appear to our servers to have been halted unexpectedly before any useful data exchange occurs. Our work reveals that while connections are normally ended by clients, they can also be closed due to third-party interference. Today we’re excited to launch a new <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard</u></a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-tcp-resets-timeouts-summary"><u>API endpoint</u></a> on Cloudflare Radar that shows a near real-time view of TCP connections to Cloudflare’s network that terminate within the first 10 ingress packets due to resets or timeouts, which we’ll refer to as <i>anomalous</i> TCP connections in this post. Analyzing this anomalous behavior provides insights into scanning, connection tampering, DoS attacks, connectivity issues, and other behaviors.</p><p>Our ability to generate and share this data via Radar follows from a global investigation into <a href="https://blog.cloudflare.com/connection-tampering"><u>connection tampering</u></a>. Readers are invited to read the technical details in the peer-review <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>study</u></a>, or see its <a href="https://youtu.be/RD73IgzQMFo?si=OWvNnlNNLalbhygV&amp;t=2984"><u>corresponding presentation</u></a>. Read on for a primer on how to use and interpret the data, as well as how we designed and deployed our detection mechanisms so that others might replicate our approach.</p><p>To begin, let’s discuss our classification of normal vs anomalous TCP connections.</p>
    <div>
      <h2>TCP connections from establishment to close</h2>
      <a href="#tcp-connections-from-establishment-to-close">
        
      </a>
    </div>
    <p>The Transmission Control Protocol (TCP) is a protocol for reliably transmitting data between two hosts on the Internet (<a href="https://datatracker.ietf.org/doc/rfc9293/"><u>RFC 9293</u></a>). A TCP connection passes through several distinct stages, from connection establishment, to data transfer, to connection close.</p><p>A TCP connection is established with a 3-way handshake. The handshake begins when one party, called the client, sends a packet marked with the ‘SYN’ flag to initialize the connection process. The server responds with a “SYN+ACK” packet where the ‘ACK’ flag acknowledges the client’s initialization ‘SYN’. Additional synchronization information is included in both the initialization packet and its acknowledgement. . Finally, the client acknowledges the server’s SYN+ACK packet with a final ACK packet to complete the handshake.</p><p>The connection is then ready for data transmission. Typically, the client will set the PSH flag on the first data-containing packet to signal to the server’s TCP stack to forward the data immediately up to the application. Both parties continue to transfer data and acknowledge received data until the connection is no longer needed, at which point the connection is closed.</p><p><a href="https://datatracker.ietf.org/doc/html/rfc9293#section-3.6"><u>RFC 9293</u></a> describes two ways in which a TCP connection may be closed:</p><ul><li><p>The normal and graceful TCP close sequence uses a FIN exchange. Either party can send a packet with the FIN flag set to indicate that they have no more data to transmit. Once the other party acknowledges that FIN packet, that direction of the connection is closed. When the acknowledging party is finished transmitting data, it transmits its own FIN packet to close, since each direction of the connection must be closed independently.</p></li><li><p>An abort or “reset” signal in which one party transmits RST packets, instructing the other party to immediately close and discard any connection state. Resets are generally sent when some unrecoverable error has occurred.</p></li></ul><p>The full lifetime of a connection that closes gracefully with a FIN is captured in the following sequence diagram.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/eh8fIM3Ei3Y9WapGgRuhC/995421abee0d6aeb257e2700db9759ee/1622-2.png" />
            
            </figure><p><i><sub>A normal TCP connection starts with a 3-way handshake and ends with a FIN handshake</sub></i></p><p>Additionally, a TCP connection may be terminated by a <a href="https://blog.cloudflare.com/when-tcp-sockets-refuse-to-die/"><u>timeout</u></a> which specifies the maximum duration that a connection can be active without receiving data or acknowledgements. An inactive connection, for example, can be kept open with <a href="https://blog.cloudflare.com/when-tcp-sockets-refuse-to-die/"><u>keepalive</u></a> messages. Unless overridden, the global default duration specified in RFC 9293 is five minutes.</p><p>We consider TCP connections <i>anomalous</i> when they close via either a reset or timeout from the client side.</p>
    <div>
      <h2>Sources of anomalous connections</h2>
      <a href="#sources-of-anomalous-connections">
        
      </a>
    </div>
    <p>Anomalous TCP connections may not themselves be problematic but they can be a symptom of larger issues, especially when occurring at early (pre-data) stages of TCP connections. Below is a non-exhaustive list of potential reasons that we might observe resets or timeouts:</p><ul><li><p><b>Scanners: </b>Internet scanners may send a SYN packet to probe if a server responds on a given port, but otherwise fail to clean up a connection once the probe has elicited a response from the server.</p></li><li><p><b>Sudden Application Shutdowns: </b>Applications might abruptly close open connections if they are no longer required. For example, web browsers may send RSTs to terminate connections after a tab is closed, or connections can time out if devices lose power or connectivity.</p></li><li><p><b>Network Errors: </b>Unstable network conditions (e.g., a severed cable connection could result in connection timeouts)</p></li><li><p><b>Attacks: </b>A malicious client may send attack traffic that appears as anomalous connections. For instance, in a <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> (half-open) attack, an attacker repeatedly sends SYN packets to a target server in an attempt to overwhelm resources as it maintains these half-opened connections.</p></li><li><p><b>Tampering:</b> Firewalls or other middleboxes capable of intercepting packets between a client and server may drop packets, causing timeouts at the communicating parties. Middleboxes capable of deep packet inspection (DPI) might also leverage the fact that the TCP protocol is unauthenticated and unencrypted to <a href="https://en.wikipedia.org/wiki/Packet_injection"><i><u>inject</u></i><u> packets</u></a> to disrupt the connection state. See our <a href="https://blog.cloudflare.com/connection-tampering"><u>accompanying blog post</u></a> for more details on connection tampering.</p></li></ul><p>Understanding the scale and underlying reasons for anomalous connections can help us to mitigate failures and build a more robust and reliable network. We hope that sharing these insights publicly will help to improve transparency and accountability for networks worldwide.</p><h2>How to use the dataset</h2><p>In this section, we provide guidance and examples of how to interpret the TCP resets and timeouts dataset by broadly describing three use cases: confirming previously-known behaviors, exploring new targets for followup study, and longitudinal studies to capture changes in network behavior over time.</p><p>In each example, the plot lines correspond to the stage of the connection in which the anomalous connection closed, which provides valuable clues into what might have caused the anomaly. We place each incoming connection into one of the following stages:</p><p><b>Post-SYN (mid-handshake)</b>: Connection resets or timeouts after the server received a client’s SYN packet. Our servers will have replied, but no acknowledgement ACK packet has come back from the client before the reset or timeout. <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>Packet spoofing</u></a> is common at this connection stage, so geolocation information is especially unreliable.</p><p><b>Post-ACK (immediately post-handshake)</b>: Connection resets or timeouts after the handshake completes and the connection is established successfully. Any subsequent data, that may have been transmitted, never reached our servers.</p><p><b>Post-PSH (after first data packet)</b>: Connection resets or timeouts after the server received a packet with the PSH flag set. The PSH flag indicates that the TCP packet contains data (such as a <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-happens-in-a-tls-handshake/#:~:text=The%20%27client%20hello%27%20message%3A"><u>TLS Client Hello</u></a> message) that is ready to be delivered to the application.</p><p><b>Later (after multiple data packets)</b>: Connection resets within the first 10 packets from the client, but after the server has received multiple data packets.</p><p><b>None</b>: All other connections.</p><p>To keep focus on legitimate connections, the dataset is constructed after connections are processed and filtered by Cloudflare’s attack mitigation systems.  For more details on how we construct the dataset, see <a href="#anomalousTCP"><u>below.</u></a></p>
    <div>
      <h3>Start with a self-evaluation</h3>
      <a href="#start-with-a-self-evaluation">
        
      </a>
    </div>
    <p>To start, we encourage readers to visit the <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard on Radar</u></a> to view the results worldwide, and for their own country and ISP.</p><p>Globally, as shown below, about 20% of new TCP connections to Cloudflare’s network are closed by a reset or timeout within the first 10 packets from the client. While this number seems astonishingly high, it is in-line with prior studies. As we’ll see, rates of resets and timeouts vary widely by country and network, and this variation is lost in the global averages.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cR6Nfm1H3juXU6oB9RS9o/6f53f4295f3ce98b8dd32c4b28aba847/1622-3.png" />
          </figure><p><i><sub>via </sub></i><a href="https://radar.cloudflare.com/security-and-attacks?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><i><sub>Cloudflare Radar</sub></i></a></p><p>The <a href="https://radar.cloudflare.com/us"><u>United States</u></a>, my home country, shows anomalous connection rates slightly lower than the worldwide averages, largely due to lower rates for connections closing in the Post-ACK and Post-PSH stages (those stages are more reflective of middlebox <a href="https://blog.cloudflare.com/connection-tampering"><u>tampering</u></a> behavior). The elevated rates of Post-SYN are typical in most networks due to scanning, but may include packets that spoof the true client’s IP address. Similarly, high rates of connection resets in the Later connection stage (after the initial data exchange, but still within the first 10 packets) might be applications responding to human actions, such as browsers using RSTs to close unwanted TCP connections after a tab is closed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hRm0W9UEhzZ9olt89yvgx/0dd609db5d9808869e73c10d7f2c628e/1622-4.png" />
          </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/us?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>My home ISP <a href="https://radar.cloudflare.com/as22773"><u>AS22773 (Cox Communications)</u></a> shows rates comparable to the US as a whole. This is typical of most residential ISPs operating in the United States.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SYQfFbeBYgrlv4p6q75l8/09773b7cb9de8facaaa96c1609480d81/1622-5.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS22773?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Contrast this against <a href="https://radar.cloudflare.com/as15169"><u>AS15169 (Google LLC)</u></a>, which originates many of Google’s <a href="https://developers.google.com/search/docs/crawling-indexing/overview-google-crawlers"><u>crawlers and fetchers</u></a>. This network shows significantly lower rates of resets in the “Later" connection stage, which may be explained by the larger proportion of automated traffic, not driven by human user actions (such as closing browser tabs).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CXdHL80q8qjJ3zbQUOJXT/2acb5e977b689ba201b8afe664795067/1622-6.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS15169?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Indeed, our <a href="https://radar.cloudflare.com/traffic"><u>bot detection system</u></a> classifies over 99% of HTTP requests from AS15169 as automated. This shows the value of collating different types of data on Radar.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/cTokDpCivHG1RLV2vHZaj/4c57daf869ad01c21edf6c306b016f5d/1622-7.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/traffic/AS15169?dateStart=2024-07-28&amp;dateEnd=2024-08-26#bot-vs-human"><sub><i>Cloudflare Radar</i></sub></a></p><p>The new anomalous connections dataset, like most that appear on Radar, is passive – it only reports on observable events, not what causes them. In this spirit, the graphs above for Google’s network reinforce the reason for corroborating observations, as we discuss next.</p>
    <div>
      <h2>One view for a signal, more views for corroboration</h2>
      <a href="#one-view-for-a-signal-more-views-for-corroboration">
        
      </a>
    </div>
    <p>Our passive measurement approach works at Cloudflare scale. However, it does not identify root causes or ground truth on its own. There are many plausible explanations for why a connection closed in a particular stage, especially when the closure is due to reset packets and timeouts. Attempts to explain by relying solely on this data source can only lead to speculation. </p><p>However, this limitation can be overcome by combining with other data sources such as active measurements. For example, corroborating with reports from <a href="https://ooni.org/"><u>OONI</u></a> or <a href="https://censoredplanet.org/"><u>Censored Planet</u></a>, or with on-the-ground reports, can give a more complete story. Thus, one of the major use cases for the TCP resets and timeouts dataset is to understand the scale and impact of previously-documented phenomena.</p>
    <div>
      <h3>Corroborating Internet-scale measurement projects</h3>
      <a href="#corroborating-internet-scale-measurement-projects">
        
      </a>
    </div>
    <p>Looking at <a href="https://radar.cloudflare.com/as398324"><u>AS398324</u></a> would suggest something terribly wrong, with more than half of connections showing up as anomalous in the Post-SYN stage. However, this network turns out to be CENSYS-ARIN-01, from Internet scanning company <a href="https://censys.com/"><u>Censys</u></a>. Post-SYN anomalies can be the result of network-layer scanning, where the scanner sends a single SYN packet to probe the server, but does not complete the TCP handshake. There are also high rates of Later anomalies, which could be indicative of application-layer scanning, as indicated by the near 100% proportion of connections being classified as automated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2D4kF4Uphgq33pPsjEHbwS/a3796c3c0bee6dfa71ea33e2f6ab9d26/1622-8.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS398324?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Indeed, similar to AS15169, we classify over 99% of requests from AS398324 as automated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hmzGC09VELKJpeX5tx7Eq/3bfe704f0eb0613f31606bfe72782137/1622-9.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/traffic/AS398324?dateStart=2024-07-28&amp;dateEnd=2024-08-26#bot-vs-human"><sub><i>Cloudflare Radar</i></sub></a></p><p>So far, we’ve looked at networks that generate high volumes of scripted or automated traffic. It’s time to look further afield.</p>
    <div>
      <h3>Corroborating connection tampering</h3>
      <a href="#corroborating-connection-tampering">
        
      </a>
    </div>
    <p>The starting point of this dataset was a research project to understand and detect active connection tampering, in a similar spirit to our work on <a href="https://blog.cloudflare.com/monsters-in-the-middleboxes"><u>HTTPS interception</u></a>. The reasons we set out to do are explained in detail in our <a href="https://blog.cloudflare.com/connection-tampering"><u>accompanying blog post</u></a>.</p><p>A <a href="https://go.gale.com/ps/anonymous?id=GALE%7CA175630128&amp;it=r&amp;linkaccess=abs&amp;issn=10727825"><u>well-documented</u></a> technique in the wild to force connections to close is <a href="https://www.ndss-symposium.org/wp-content/uploads/2017/09/weav.pdf"><u>reset injection</u></a>. With reset injection, middleboxes on the path to the destination inspect data portions of packets. When the middlebox sees a packet to a forbidden domain name, it injects forged TCP Reset (RST) packets to one or both communicating parties to cause them to abort the connection. If the middlebox did not drop the forbidden packet first, then the server will receive both the client packet that triggered the middlebox tampering – perhaps containing a TLS Client Hello message with a <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-sni/"><u>Server Name Indication (SNI)</u></a> field – followed soon afterwards by the forged RST packet.</p><p>In the TCP resets and timeouts dataset, a connection disrupted via reset injection would typically appear as a Post-ACK, Post-PSH, or Later anomaly (but, as a reminder, not all anomalies are due to reset injection).</p><p>As an example, the reset injection technique is <a href="https://go.gale.com/ps/anonymous?id=GALE%7CA175630128&amp;it=r&amp;linkaccess=abs&amp;issn=10727825"><u>known</u></a> and commonly associated with the so-called Great Firewall of China (GFW). Indeed, looking at Post-PSH anomalies in connections originating from IPs geolocated to <a href="https://radar.cloudflare.com/cn"><u>China</u></a>, we see higher rates than the worldwide average. However, looking at individual networks in China, the Post-PSH rates vary widely, perhaps due to the types of traffic carried or different implementations of the technique. In contrast, rates of Post-SYN anomalies are consistently high across most major Chinese ASes; this may be scanners, spoofed SYN flood attacks, or <a href="https://www.usenix.org/conference/usenixsecurity23/presentation/wu-mingshi"><u>residual</u></a> <a href="https://gfw.report/publications/usenixsecurity23/en/"><u>blocking</u></a> with <a href="https://blog.cloudflare.com/consequences-of-ip-blocking"><u>collateral impact</u></a>. </p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ICLRlfg97CA9e716TJSwE/6333b5d2975ab139adfc0f7ede9abf6b/1622-10.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/cn?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p><a href="https://radar.cloudflare.com/as4134"><u>AS4134 (CHINANET-BACKBONE)</u></a> shows lower rates of Post-PSH anomalies than other Chinese ASes, but still well above the worldwide average.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NL6vTD9cXtVxQYfp3OvHT/dbb713b97a7690e45a0bedb22efa1cb1/1622-11.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS4134?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Networks <a href="https://radar.cloudflare.com/as9808"><u>AS9808 (CHINAMOBILE-CN)</u></a> and <a href="https://radar.cloudflare.com/as56046"><u>AS56046 (CMNET-Jiangsu-AP)</u></a> both show double-digit percentages of connections matching Post-PSH anomalies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2jQVLR8Shiz0NsMJuUhG4N/60b56c012e01d9aeea61447aa4a3f7fc/1622-12.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS9808?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fSHO4hANqymOvbjSIL6Uw/497a02d5f1496202f7a2d5a04043c54e/1622-13.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS56046?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>See our <a href="https://blog.cloudflare.com/connection-tampering"><u>deep-dive blog post</u></a> for more information about connection tampering.</p>
    <div>
      <h2>Sourcing new insights and targets for followup study</h2>
      <a href="#sourcing-new-insights-and-targets-for-followup-study">
        
      </a>
    </div>
    <p>TCP resets and timeouts dataset may also be a source for identifying new or previously understudied network behaviors, by helping to find networks that “stick out” and merit further investigation.</p>
    <div>
      <h3>Unattributable ZMap scanning</h3>
      <a href="#unattributable-zmap-scanning">
        
      </a>
    </div>
    <p>Here is one we’re unable to explain: Every day during the same 18-hour interval, over 10% of connections from UK clients never progress past the initial SYN packets, and just time out.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qPaXL6ViEyuJ3UhUi0kpG/26060221486166d782977014511d2b83/1622-14.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/gb?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Internal inspection revealed that almost all of the Post-SYN anomalies come from a scanner using <a href="https://zmap.io"><u>ZMap</u></a> at <a href="https://radar.cloudflare.com/as396982"><u>AS396982 (GOOGLE-CLOUD-PLATFORM)</u></a>, in what appears to be a full port scan across all IP address ranges. (The ZMap client responsibly self-identifies, based on ZMap’s responsible self-identification as discussed later.) We see a similar level of scan traffic from IP prefixes in AS396982 geolocated to the United States.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/756bijZU4xJpMvc78ZdbYl/370d1b939bf2023bb2fee550df7b492c/1622-15.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS396982?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p>
    <div>
      <h3>Zero-rating in mobile networks</h3>
      <a href="#zero-rating-in-mobile-networks">
        
      </a>
    </div>
    <p>A cursory look at anomaly rates at the country level reveals some interesting findings. For instance, looking at connections from <a href="https://radar.cloudflare.com/mx"><u>Mexico</u></a>, the rates of Post-ACK and Post-PSH anomalies often associated with connection tampering are higher than the global average. The profile for Mexico connections is also similar to others in the region. However, Mexico is a country with “<a href="https://freedomhouse.org/country/mexico/freedom-net/2023"><u>no documented evidence that the government or other actors block or filter internet content.</u></a>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bZjzlkqtRzmB5097m6z6S/e2e07a884a510d963b97c5e6ffd00ee2/1622-16.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/mx?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Looking at each of the top ASes by HTTP traffic volume in Mexico, we find that close to 50% of connections from <a href="https://radar.cloudflare.com/as28403"><u>AS28403 (RadioMovil Dipsa, S.A. de C.V., operating as Telcel)</u></a> are terminated via a reset or timeout directly after the completion of the TCP handshake (Post-ACK connection stage). In this stage, it’s possible a middlebox has seen and dropped a data packet before it gets to Cloudflare.</p><p>One explanation for this behavior may be <a href="https://en.wikipedia.org/wiki/Zero-rating"><u>zero-rating</u></a>, in which a cellular network provider allows access to certain resources (such as messaging or social media apps) at no cost. When users exceed their data transfer limits on their account, the provider might still allow traffic to zero-rated destinations while blocking connections to other resources.</p><p>To enforce a zero-rating policy, an ISP might use the <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-sni/"><u>TLS Server Name Indication (SNI)</u></a> to determine whether to block or allow connections. The SNI is sent in a data-containing packet immediately following the TCP handshake. Thus, if an ISP drops the packet containing the SNI, the server would still see the SYN and ACK packets from the client but no subsequent packets, which is consistent with a Post-ACK connection anomaly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KUfARxvDEogTFeh7PL4n5/68dc237c07a60e431cc2d2654cade2f7/1622-17.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS28403?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Turning to <a href="https://radar.cloudflare.com/pe"><u>Peru</u></a>, another country with a similar profile in the dataset, there are even higher rates of Post-ACK and Post-PSH anomalies compared to Mexico.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1vLO0sP2Ap3206PX4Ysdim/a4f0274b4d884703ff4b4d879a667d90/1622-18.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/pe?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Focusing on specific ASes, we see that <a href="https://radar.cloudflare.com/as12252"><u>AS12252 (Claro Peru)</u></a> shows high rates of Post-ACK anomalies similar to AS28403 in Mexico. Both networks are operated by the same parent company, <a href="https://www.americamovil.com/English/overview/default.aspx"><u>América Móvil</u></a>, so one might expect similar network policies and network management techniques to be employed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1doJKHsOHyYlY6t3LLVmdm/147d8239981bc580b9fd53cf2b7b4d89/1622-19.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/AS12252?dateStart=2024-07-28&amp;dateEnd=2024-08-26#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Interestingly, <a href="https://radar.cloudflare.com/as6147"><u>AS6147 (Telefónica Del Perú)</u></a> instead shows high rates of Post-PSH connection anomalies. This could indicate that this network uses different techniques at the network layer to enforce its policies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/44i6wdU8oWl8CTl1YDZVES/7ac4728c15e4a0627f262f8dcd791be2/1622-20.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/dz?dateStart=2024-06-06&amp;dateEnd=2024-06-19#tcp-resets-and-attacks"><sub><i>Cloudflare Radar</i></sub></a></p>
    <div>
      <h2>Changes over time, a longitudinal view</h2>
      <a href="#changes-over-time-a-longitudinal-view">
        
      </a>
    </div>
    <p>One of the most powerful aspects of our continuous passive measurement is the ability to measure networks over longer periods of time.</p>
    <div>
      <h3>Internet shutdowns</h3>
      <a href="#internet-shutdowns">
        
      </a>
    </div>
    <p>In our June 2024 blog post “<a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>Examining recent Internet shutdowns in Syria, Iraq, and Algeria</u></a>”, we shared the view of exam-related nationwide Internet shutdowns from the perspective of Cloudflare’s network. At that time we were preparing the TCP resets and timeouts dataset, which was helpful to confirm outside reports and get some insight into the specific techniques used for the shutdowns.</p><p>As examples of changing behavior, we can go “back in time” to observe exam-related blocking as it happened. In <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a>, during the exam-related shutdowns we see spikes in the rate of Post-SYN anomalies. In reality, we see a <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2024-05-20&amp;dateEnd=2024-06-19"><u>near-total drop in traffic</u></a> (including SYN packets) during these periods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3K5o8qI2wzozKrFlSm9x9S/d7778ba433055988ead0726ede69423c/1622-21.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/sy?dateStart=2024-05-20&amp;dateEnd=2024-06-19#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>
A <a href="https://x.com/CloudflareRadar/status/1816438072768078078"><u>second round</u></a> of shutdowns starting the last week of July are quite prominent as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YJVpto9QJBCkDm5DVLiVN/23a4b168065ebf47a062f89fc98d5048/1622-22.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/sy?dateStart=2024-07-20&amp;dateEnd=2024-08-19#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>Looking at connections from <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a>, Cloudflare’s view of exam-related shutdowns appears similar to those in Syria, with multiple Post-SYN spikes, albeit much less pronounced.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KZyGLIOyoEFH3sYTiuHzK/5539aba3877760e90bacf6889e51e0ad/1622-23.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/iq?dateStart=2024-05-17&amp;dateEnd=2024-06-10#tcp-resets-and-timeouts"><sub><i>Cloudflare Radar</i></sub></a></p><p>The <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>exams shutdown blog</u></a> also describes how <a href="https://radar.cloudflare.com/dz"><u>Algeria</u></a> took a more nuanced approach for restricting access to content during exam times: instead of full Internet shutdowns, evidence suggests that Algeria instead targeted specific connections. Indeed, during exam periods we see an increase in Post-ACK connection anomalies. This behavior would be expected if a middlebox selectively drops packets that contain forbidden content, while leaving other packets alone (like the initial SYN and ACK).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67LrJ8cb1XpYsEpzENs54M/775ee5671ef738a0afd93fc0a55b289a/1622-24.png" />
            
            </figure><p><sub><i>via </i></sub><a href="https://radar.cloudflare.com/security-and-attacks/dz?dateStart=2024-06-06&amp;dateEnd=2024-06-19#tcp-resets-and-attacks"><sub><i>Cloudflare Radar</i></sub></a></p><p>The examples above reinforce that this data is most useful when correlated with other signals. The data is also available via the <a href="https://developers.cloudflare.com/api/operations/radar-get-tcp-resets-timeouts-summary"><u>API</u></a>, so others can dive in more deeply. Our detection techniques are also transferable to other servers and operators, as described next.</p><h2>How to detect anomalous TCP connections at scale</h2><p>In this section, we discuss how we constructed the TCP resets and timeouts dataset. The scale of Cloudflare’s global network presents unique challenges for data processing and analysis. We share our techniques to help readers to understand our methodology, interpret the dataset, and replicate the mechanisms in other networks or servers.</p><p>Our methodology can be summarized as follows:</p><ol><li><p>Log a sample of connections arriving at our client-facing servers. This sampling system is completely passive, meaning that it has no ability to decrypt traffic and only has access to existing packets sent over the network. </p></li><li><p>Reconstruct connections from the captured packets. A novel aspect of our design is that only one direction needs to be observed, from client to server.</p></li><li><p>Match reconstructed connections against a set of signatures for anomalous connections terminated by resets or timeouts. These signatures consist of two parts: a <i>connection stage</i>, and a set of <i>tags</i> that indicate specific behaviors derived from the literature and our own observations.</p></li></ol><p>These design choices keep encrypted packets safe and can be replicated anywhere, without needing access to the destination server.</p>
    <div>
      <h2>First, sample connections</h2>
      <a href="#first-sample-connections">
        
      </a>
    </div>
    <p>Our main goal was to design a mechanism that scales, and gives us broad visibility into all connections arriving at Cloudflare’s network. Running traffic captures on each client-facing server works, but does not scale. We would also need to know exactly where and when to look, making continuous insights hard to capture. Instead, we sample connections from all of Cloudflare’s servers and log them to a central location where we could perform offline analysis.</p><p>This is where we hit the first roadblock: existing packet logging pipelines used by Cloudflare’s analytics systems log individual packets, but a connection consists of many packets. To detect connection anomalies we needed to see all, or at least enough, packets in a given connection. Fortunately, we were able to leverage a flexible logging system built by Cloudflare’s DoS team for <a href="https://developers.cloudflare.com/ddos-protection/about/how-ddos-protection-works/"><u>analyzing packets involved in DDoS attacks</u></a> in conjunction with a carefully crafted invocation of two <a href="https://manpages.debian.org/bookworm/iptables/iptables.8.en.html"><code><u>iptables</u></code></a> rules to achieve our goal.</p><p>The first <code>iptables</code> rule randomly selects and marks new connections for sampling. In our case, we settled on sampling one in every 10,000 ingress TCP connections. There’s nothing magical about this number, but at Cloudflare’s scale it strikes a balance between capturing enough without straining our data processing and analytics pipelines. The <code>iptables</code> rules only apply to packets after they have passed the DDoS mitigation system. As TCP connections can be long-lived, we sample only new TCP connections. Here is the <code>iptables</code> rule for marking connections to be sampled:</p>
            <pre><code>-t mangle -A PREROUTING -p tcp --syn -m state 
--state NEW -m statistic --mode random 
--probability 0.0001 -m connlabel --label &lt;label&gt; 
--set -m comment --comment "Label a sample of ingress TCP connections"
</code></pre>
            <p></p><p>Breaking this down, the rule is installed in the <code>mangle</code> table (for modifying packets) in the chain that handles incoming packets (<code>-A PREROUTING</code>). Only TCP packets with the SYN flag set are considered (<code>-p tcp --syn</code>) where there is no prior state for the connection (<code>--state NEW</code>). The filter selects one in every 10,000 SYN packets (<code>-m statistic –mode random --probability 0.0001</code>) and applies a label to the connection (<code>-m connlabel --label &lt;label&gt; --set</code>).</p><p>The second iptables rule logs subsequent packets in the connection, to a maximum of 10 packets. Again, there’s nothing magic about the number 10 other than that it’s generally enough to capture the connection establishment, subsequent request packets, and resets on connections that close before expected.</p>
            <pre><code>-t mangle -A PREROUTING -m connlabel --label 
&lt;label&gt; -m connbytes ! --connbytes 11 
--connbytes-dir original --connbytes-mode packets 
-j NFLOG --nflog-prefix "&lt;logging flags&gt;" -m 
comment --comment "Log the first 10 incoming packets of each sampled ingress connection"
</code></pre>
            <p></p><p>This rule is installed in the same chain as the previous rule. It matches only packets from sampled connections <code>(-m connlabel --label &lt;label&gt;)</code>, and only the first 10 packets from each connection (<code>-m connbytes ! --connbytes 11 --connbytes-dir original --connbytes-mode packets</code>). Matched packets are sent to NFLOG (<code>-j NFLOG --nflog-prefix "&lt;logging flags&gt;"</code>) where they’re picked up by the logging system and saved to a centralized location for offline analysis.</p>
    <div>
      <h2>Reconstructing connections from sampled packets</h2>
      <a href="#reconstructing-connections-from-sampled-packets">
        
      </a>
    </div>
    <p>Packets logged on our servers are inserted into <a href="https://blog.cloudflare.com/tag/clickhouse/"><u>ClickHouse</u></a> tables as part of our analytics pipeline. Each logged packet is stored in its own row in the database. The next challenge is to reassemble packets into the corresponding connections for further analysis. Before we go further, we need to define what a “connection” is for the purpose of this analysis.</p><p>We use the standard definition of a connection defined by the network 5-tuple of <code>protocol</code>, <code>source IP address</code>, <code>source port</code>, <code>destination IP address</code>, <code>destination port</code> with the following tweaks:</p><ul><li><p>We only sample packets on the <i>ingress</i> (client-to-server) half of a connection, so do not see the corresponding response packets from server to client. In most cases, we can infer what the server response will be based on our knowledge of how our servers are configured. Ultimately, the ingress packets are sufficient to learn anomalous TCP connection behaviors.</p></li><li><p>We query the ClickHouse dataset in 15-minute intervals, and group together packets sharing the same network 5-tuple within that interval. This means that connections may be truncated towards the end of the query interval. When analyzing connection timeouts, we exclude incomplete flows where the latest packet timestamp is within 10 seconds of the query cutoff.</p></li><li><p>Since resets and timeouts are most likely to affect <i>new</i> connections, we only consider sequences of packets starting with a SYN packet marking the beginning of a new TCP handshake. Thus, existing long-lived connections are excluded.</p></li><li><p>The logging system does not guarantee precise packet interarrival timestamps, so we consider only the set of packets that arrive, not ordered by their arrival time. In some cases, we can determine packet ordering based on TCP sequence numbers but it turns out not to significantly impact the results.</p></li><li><p>We filter out a small fraction of connections with multiple SYN packets to reduce noise in the analysis.</p></li></ul><p>With the above conditions for how we define a connection, we’re now ready to describe our analysis pipeline in more detail.</p>
    <div>
      <h2>Mapping connection close events to stages</h2>
      <a href="#mapping-connection-close-events-to-stages">
        
      </a>
    </div>
    <p>TCP connections transition through a series of stages from connection establishment through eventual close. The stage at which an anomalous connection closes provides clues as to <i>why</i> the anomaly occurred. Based on the packets that we receive at our servers, we place each incoming connection into one of four stages (Post-SYN, Post-ACK, Post-PSH, Later), described in more detail <a href="#dataset"><u>above</u></a>.</p><p>The connection close stage alone provides useful insights into anomalous TCP connections from various networks, and this is what is shown today on Cloudflare Radar. However, in some cases we can provide deeper insights by matching connections against more specific signatures.</p>
    <div>
      <h2>Applying tags to describe more specific connection behaviors</h2>
      <a href="#applying-tags-to-describe-more-specific-connection-behaviors">
        
      </a>
    </div>
    <p>The grouping of connections into stages as described above is done solely based on the TCP flags of packets in the connection. Considering other factors such as packet inter-arrival timing, exact combinations of TCP flags, and other packet fields (IP identification, IP TTL, TCP sequence and acknowledgement numbers, TCP window size, etc.) can allow for more fine-grained matching to specific behaviors.</p><p>For example, the popular <a href="http://zmap.io"><u>ZMap</u></a> scanner software fixes the IP identification field to 54321 and the TCP window size to 65535 in SYN packets that it generates (<a href="https://github.com/zmap/zmap/blob/c88db2917612328c843561101495e5263ef7ac5b/src/probe_modules/packet.c"><u>source code</u></a>). When we see packets arriving to our network that have these exact fields set, it is likely that the packet was generated by a scanner using ZMap.</p><p>Tags can also be used to match connections against known signatures of tampering middleboxes. A large body of active measurements work (for instance, <a href="https://www.ndss-symposium.org/wp-content/uploads/2017/09/weav.pdf"><u>Weaver, Sommer, and Paxson</u></a>) has found that some middleboxes deployments exhibit consistent behaviors when disrupting connections via reset injection, such as setting an IP TTL field that differs from other packets sent by the client, or sending both a RST packet and a RST+ACK packet. For more details on specific connection tampering signatures, see the <a href="https://blog.cloudflare.com/connection-tampering"><u>blog post</u></a> and the <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>peer-reviewed paper</u></a>.</p><p>Currently, we define the following tags, which we intend to refine and expand over time. Some tags only apply if another tag is also set, as indicated by the hierarchical presentation below (e.g., the <code>fin</code> tag can only apply when the <code>reset</code> tag is also set).</p><ul><li><p><code>timeout</code>: terminated due to a timeout</p></li><li><p><code>reset</code>: terminated due to a reset (packet with RST flag set)</p><ul><li><p>fin: at least one FIN packet was received alongside one or more RST packets</p></li><li><p><code>single_rst</code>: terminated with a single RST packet</p></li><li><p><code>multiple_rsts</code>: terminated with multiple RST packets</p><ul><li><p><code>acknumsame</code>: the acknowledgement numbers in the RST packets were all the same and non-zero</p></li><li><p><code>acknumsame0</code>: the acknowledgement numbers in the RST packets were all zero</p></li><li><p><code>acknumdif</code>f: the acknowledgement numbers in the RST packets were different and all non-zero</p></li><li><p><code>acknumdiff0</code>: the acknowledgement numbers in the RST packets were different and one was zero</p></li></ul></li><li><p><code>single_rstack</code>: terminated with a single RST+ACK packet (both RST and ACK flags set)</p></li><li><p><code>multiple_rstacks</code>: terminated with a multiple RST+ACK packets</p></li><li><p><code>rst_and_rstacks</code>: terminated with a combination of RST and RST+ACK packets</p></li></ul></li><li><p><code>zmap</code>: SYN packet matches those generated by the ZMap scanner</p></li></ul><p>Connection tags are not currently visible in the Radar <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard</u></a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-tcp-resets-timeouts-summary"><u>API</u></a>, but we plan to release this additional functionality in the future.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we consider transparency and accountability to be a critical part of that mission. We hope that the insights and tools we are sharing help to shed light on anomalous network behaviors around the world.</p><p>While the current TCP resets and timeouts dataset should immediately prove useful to network operators, researchers, and Internet citizens as a whole, we’re not stopping here. There are several improvements we’d like to add in the future:</p><ul><li><p>Expand the set of tags for capturing specific network behaviors and expose them in the <a href="https://developers.cloudflare.com/api/operations/radar-get-tcp-resets-timeouts-summary"><u>API</u></a> and <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard</u></a>.</p></li><li><p>Extend insights to connections from Cloudflare to customer origin servers.</p></li><li><p>Add support for QUIC, which is currently used for over <a href="https://radar.cloudflare.com/adoption-and-usage"><u>30% of HTTP requests</u></a> to Cloudflare worldwide.</p></li></ul><p>If you’ve found this blog interesting, we encourage you to read the accompanying <a href="https://blog.cloudflare.com/connection-tampering"><u>blog post</u></a> and <a href="https://research.cloudflare.com/publications/SundaraRaman2023/"><u>paper</u></a> for a deep dive on connection tampering, and to explore the TCP resets and timeouts <a href="https://radar.cloudflare.com/security-and-attacks#tcp-resets-and-timeouts"><u>dashboard</u></a> and <a href="https://developers.cloudflare.com/api/operations/radar-get-tcp-resets-timeouts-summary"><u>API</u></a> on Cloudflare Radar. We welcome you to reach out to us with your own questions and observations at <a><u>radar@cloudflare.com</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Research]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">3SsAGFwmMK2KDYd7THI6Dn</guid>
            <dc:creator>Luke Valenta</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q2 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 16 Jul 2024 13:00:01 GMT</pubDate>
            <description><![CDATA[ Government directed shutdowns and cable cuts were both significant sources of Internet outages in Q2 2024. This post explores these disruptions, as well as others caused by power outages, maintenance, ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare’s network spans more than 320 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> functionality released earlier this year, we can explore the impact from a <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements">routing</a> perspective, as well as a traffic perspective, at both a <a href="https://twitter.com/CloudflareRadar/status/1768654743742579059">network</a> and <a href="https://twitter.com/CloudflareRadar/status/1773704264650543416">location</a> level.</p><p>As we have seen in previous years, nationwide exams take place across several MENA countries in the second quarter, and with them come <a href="#governmentdirected">government directed Internet shutdowns</a>. <a href="#cablecuts">Cable cuts</a>, both terrestrial and submarine, caused Internet outages across a number of countries, with the ACE submarine cable being a particular source of problems. <a href="#maintenance">Maintenance</a>, <a href="#poweroutages">power outages</a>, and <a href="#technicalproblems">technical problems</a> also disrupted Internet connectivity, as did <a href="#unknown">unknown</a> issues. And as we have frequently seen in the two-plus years since the conflict began, Internet connectivity in Ukraine suffers as a result of Russian <a href="#attacks">attacks</a>.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Government directed</h2>
    <div>
      <h3>Syria, Algeria, Iraq</h3>
      <a href="#syria-algeria-iraq">
        
      </a>
    </div>
    <p>Each spring, governments in several countries in the Middle East and North Africa (MENA) region order local telecommunications providers to shut down or disrupt Internet connectivity across the country in an effort to prevent students from cheating on national secondary and high school exams. These shutdowns/disruptions generally occur for several hours per day over a multi-week period. We covered such events in <a href="/exam-internet-shutdowns-iraq-algeria">2023</a>, <a href="/syria-sudan-algeria-exam-internet-shutdown">2022</a>, and <a href="/syria-exam-related-internet-shutdowns/">2021</a>, as they occurred in locations including Syria, Sudan, Algeria, and Iraq.</p><p>In June, we published <a href="/syria-iraq-algeria-exam-internet-shutdown"><i>Exam-ining recent Internet shutdowns in Syria, Iraq, and Algeria</i></a>, which examined the daily Internet shutdowns that took place in Iraq and Syria, as well as the two multi-hour daily disruptions in Algeria, which appeared to be pursuing a content blocking strategy, rather than a full nationwide shutdown. The post examined the impact that these shutdowns have on Internet traffic, and also analyzed routing information and traffic from other Cloudflare services in an effort to better understand how these shutdowns are being implemented.</p><p>In addition to the shutdowns covered in the previously referenced blog post, Iraq implemented a second round of shutdowns that started on June 23, and ran through at least July 14. Some of these shutdowns impacted the same set of networks seen in the first round, and some impacted networks in the autonomous Kurdistan region in the north.</p><p>Among the latter set, <a href="https://radar.cloudflare.com/as206206">AS206206 (Kurdistan Net)</a>, <a href="https://radar.cloudflare.com/as59625">AS59625 (Korek Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ-Online)</a>, and <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a> all implemented shutdowns on June 23, June 26, June 30, July 3, July 7, and July 10, between 06:00 - 08:00 local time (03:00 - 05:00 UTC).</p>






<p>Outside the autonomous Kurdistan region, networks including <a href="https://radar.cloudflare.com/as59588">AS59588 (Zainas)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (Asiacell)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a> implemented Internet shutdowns between 06:00 - 08:00 local time (03:00 - 05:00 UTC) on June 23, June 24, June 26, June 27, June 29, June 30, July 1, and July 2.</p>







<p>Both sets of shutdowns reviewed above appeared to have followed the same approach as the first round covered in the earlier blog post.</p>
    <div>
      <h3>Kenya, Burundi, Uganda, Rwanda, Tanzania</h3>
      <a href="#kenya-burundi-uganda-rwanda-tanzania">
        
      </a>
    </div>
    <p>Concerns over a potential Internet shutdown during planned protests against tax increases proposed in “<a href="https://en.wikipedia.org/wiki/Kenya_Finance_Bill_2024">Finance Bill 2024</a>” by the Kenyan government led to the publication of a joint statement signed by multiple organizations. The statement strongly urged the Kenyan government to refrain from enforcing any</p><p>Internet shutdowns or information controls, and highlighted the “disastrous economic effects” such a move could have. In response, the Communications Authority of Kenya <a href="https://x.com/CA_Kenya/status/1805311316719993274">issued a press release</a> stating that “<i>For the avoidance of doubt, the Authority has no intention whatsoever to shut down Internet traffic or interfere with the quality of connectivity. Such actions would be a betrayal of the Constitution as a whole, the freedom of expression in particular and our own ethos.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18VUH92c3DCiuL6Tlb9Ex1/d19d8a28302c53690fdd7ee8904d85d1/10.png" />
            
            </figure><p>As <a href="https://en.wikipedia.org/wiki/Kenya_Finance_Bill_protests">protests escalated</a> on June 25, Internet traffic in <a href="https://radar.cloudflare.com/ke">Kenya</a> dropped at 16:30 local time (13:30 UTC). Initially, this outage was thought to be due to issues with <a href="https://www.submarinecablemap.com/country/kenya">one or more undersea cables</a> that provide international connectivity to the country, with the potential cause supported by social media posts from <a href="https://x.com/SafaricomPLC/status/1805615681951375595">Safaricom</a> and <a href="https://x.com/AIRTEL_KE/status/1805635373680193836">Airtel</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nseWjxCypENox62FqSzFt/ca5f0eb0e634fca9597c1482b0834459/Screenshot-2024-07-14-at-10.56.25-PM.png" />
            
            </figure><p>Similar concurrent drops in Internet traffic were observed in <a href="https://radar.cloudflare.com/bi">Burundi</a>, <a href="https://radar.cloudflare.com/ug">Uganda</a>, <a href="https://radar.cloudflare.com/rw">Rwanda</a>, and <a href="https://radar.cloudflare.com/tz">Tanzania</a>, as shown below. Issues with submarine cables connected to one country can impact Internet connectivity in other countries if there is a dependency on that country/cable for upstream Internet connectivity. As such, the observed disruptions in those four countries were not that unusual. To that end, a (subsequently deleted) <a href="https://twitter.com/mtnug/status/1805707549385044057">post on X from MTN Uganda</a> noted: "<i>Our esteemed customers, We are experiencing a degraded service on all our internet services due to an outage caused by our connectivity supply through Kenya. Our technical teams and partners are working jointly to resolve the issue in the shortest time possible. In the interim, we kindly advise our customers to use *165# to access Mobile Money and other app based services. Thank you.</i>"</p>






<p>However, other participants in the Internet infrastructure community in Africa called the undersea cable outage explanation into question. Kyle Spencer, Executive Director of the <a href="https://www.uixp.co.ug/">Uganda Internet eXchange Point</a>, <a href="https://x.com/kyleville/status/1805614461190906295">posted on X</a> that “<i>I am told the Kenyan government ordered sea cable landing stations to disconnect circuits.</i>” Ben Roberts, Group CTIO at <a href="https://liquid.tech/">Liquid Intelligent Technologies</a> (a pan-African network infrastructure provider), <a href="https://x.com/benliquidkenya/status/1805851264082751756">posted</a> “<i>No cables are damaged this week.</i>” In addition, outages on undersea cables are rarely, if ever, resolved in a matter of hours, as this disruption was – they frequently last for days or weeks.</p><p>On June 26, Safaricom’s CEO <a href="https://www.standardmedia.co.ke/sports/business/article/2001497896/why-there-was-network-outage-during-protests-safaricom-ceo-explains">claimed</a> “This outage was occasioned by reduced bandwidth on some cables that carry Internet traffic”, contradicting the company’s original claim. No additional information was forthcoming from Airtel or the Communications Authority of Kenya, but as noted above, some within the industry believe that the disruption that impacted connectivity in Kenya, Burundi, Uganda, Rwanda, and Tanzania was directed by the government of Kenya, and was not caused by submarine cable outages.</p><h2>Cable cuts</h2>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>At 17:36 local time (21:36 UTC) on April 28, <a href="https://x.com/DigicelHT/status/1784698298290376936">Digicel Haiti posted an “important note” on X</a> that stated in part (translated) “<i>On April 27, 2024, the company suffered several attacks on its international optical infrastructure in the Drouya area on National Road #1. The optical fiber was damaged by the impact of cartridges after the armed clashes in the area for a few days. It affected several services such as internet (data), SMS, MonCash and international calling. For now, we are happy to inform the population that all services are restored to 100%.</i>” The graph below shows the impact of the fiber damage, <a href="https://radar.cloudflare.com/as27653">with AS27653 (Digicel Haiti)</a> suffering an Internet outage lasting nearly 24 hours, from around 17:30 local time (21:30 UTC) on April 27 through approximately 16:00 local time (20:00 UTC) on April 28, after which traffic quickly recovered.</p><p>Then on May 3, The Director General of Digicel Haiti <a href="https://x.com/jpbrun30/status/1786368179440079102">posted on X</a> that (translated) “<i>Digicel is informing the general public that it suffered two more damages to its international fiber infrastructure at 2am this morning. We have restored Moncash services, SMS, and Fiber Optic connections. Our crews are already on their way to address the apparent landslide in the Canaan area.</i>” The disruption caused by this fiber damage lasted for approximately eight hours, between 02:15 - 10:30 local time (06:15 - 14:30 UTC), and as seen in the graph below, appeared to have a nominal impact on traffic.</p>
    <div>
      <h3>Kenya, Madagascar, Malawi, Mozambique, Rwanda, Tanzania, Uganda</h3>
      <a href="#kenya-madagascar-malawi-mozambique-rwanda-tanzania-uganda">
        
      </a>
    </div>
    <p>On Sunday, May 12, issues with the <a href="https://www.submarinecablemap.com/submarine-cable/eastern-africa-submarine-system-eassy">EASSy</a> and <a href="https://www.submarinecablemap.com/submarine-cable/seacomtata-tgn-eurasia">Seacom</a> submarine cables again disrupted connectivity to East Africa, impacting a number of countries previously affected by a set of cable cuts that occurred nearly three months earlier. Insight into these earlier cable cuts and the initial impact of May’s cable damage was covered in our <a href="/east-african-internet-connectivity-again-impacted-by-submarine-cable-cuts"><i>East African Internet connectivity again impacted by submarine cable cuts</i></a> blog post.</p><p>Traffic levels across a number of the impacted countries dropped just before 11:00 local time (08:00 UTC).  The magnitude of the initial impact varied by country, with traffic initially dropping by 10-25% in <a href="https://radar.cloudflare.com/traffic/ke?dateStart=2024-05-12">Kenya</a>, <a href="https://radar.cloudflare.com/traffic/ug?dateStart=2024-05-12">Uganda</a>, <a href="https://radar.cloudflare.com/traffic/mg?dateStart=2024-05-12">Madagascar</a>, and <a href="https://radar.cloudflare.com/traffic/mz?dateStart=2024-05-12">Mozambique</a>, while traffic in <a href="https://radar.cloudflare.com/traffic/rw?dateStart=2024-05-12">Rwanda</a>, <a href="https://radar.cloudflare.com/traffic/mw?dateStart=2024-05-12">Malawi</a>, and <a href="https://radar.cloudflare.com/traffic/tz?dateStart=2024-05-12">Tanzania</a> dropped by one-third or more than compared to the previous week. The overall impact was most significant in Tanzania, Madagascar, and Rwanda, as seen in the graphs below. Traffic returned to expected levels at various times over the following week, ranging from a day and a half later (May 13) in Kenya to a week later (May 19) in Rwanda.</p><p>Repairs to the EASSy and Seacom cables <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_31may24-east-africa-eassy-seacom-subsea-activity-7202342753345650688-ll0q?utm_source=share&amp;utm_medium=member_desktop">were completed on May 31</a>. Repairs to the cables damaged in February were <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_09jul24-red-sea-subsea-cables-tentative-activity-7216513121945841664-towG?utm_source=share&amp;utm_medium=member_desktop">ongoing as of July 9</a>, as their location in a war zone complicates repair efforts.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>A <a href="https://x.com/LeNdjam_Post/status/1794475979567505735">reported</a> fiber optic cable cut in Cameroon disrupted Internet connectivity for customers of <a href="https://radar.cloudflare.com/as327802">Moov Africa TChad</a> on May 25. The outage lasted three hours, between 15:15 -18:15 local time (14:15 - 17:15 UTC), with the impact visible at a country level as well. Routing was disrupted too, as the number of IPv4 /24 prefixes (256 IPv4 addresses) announced by Moov Africa Tchad fell from eight to three during the disruption.</p><p>The event was similar to one that <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0kB9W5CkhVJqBq34agPWqG81yeCfLBijKYc6WiLDKLE79nPmhie4T9idZVStc8f6Xl">occurred on January 10</a>, when Moov Africa Tchad and country-level traffic was disrupted for over 12 hours “due to a cut in the optical fiber coming from Cameroon through which Chad has access to the Internet”. During that event, significant volatility was also observed from a routing perspective, as the volume of announced IPv4 address space shifted frequently at a <a href="https://radar.cloudflare.com/routing/as327802?dateStart=2024-01-10&amp;dateEnd=2024-01-11">network</a> and <a href="https://radar.cloudflare.com/routing/td?dateStart=2024-01-10&amp;dateEnd=2024-01-11">country</a> level during the disruption. As we noted last quarter, as a landlocked country, Chad is dependent on terrestrial Internet connections to/through neighboring countries, and the <a href="https://afterfibre.nsrc.org/">AfTerFibre cable map</a> illustrates Chad’s reliance on limited cable paths through Cameroon and Sudan.</p>
    <div>
      <h3>Gambia, Mauritania, Senegal</h3>
      <a href="#gambia-mauritania-senegal">
        
      </a>
    </div>
    <p>A <a href="https://x.com/CloudflareRadar/status/1798546000258417082">reported</a> “network interruption” on the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE) submarine cable</a> disrupted traffic across networks in the Gambia, Mauritania, and Senegal on June 5. <a href="https://radar.cloudflare.com/as25250">AS25250 (Gamtel)</a>, <a href="https://radar.cloudflare.com/as29544">AS29544 (Mauritel)</a>, and <a href="https://radar.cloudflare.com/as37649">AS37649 (Free/Tigo)</a> all saw traffic drop around 23:00 local time (23:00 UTC). As seen in the graphs below, the outage lasted for nearly 11 hours, with traffic recovering just 10:00 local time on June 6 (10:00 UTC). Mauritel saw a near complete outage, while Gamtel and Free/Tigo saw less severe impacts, possibly because they were able to <a href="https://x.com/Gamtel/status/1798513818873831562">shift traffic to back up links</a>.</p><h2>Maintenance</h2>
    <div>
      <h3>Guinea, Gambia, Sierra Leone, Liberia</h3>
      <a href="#guinea-gambia-sierra-leone-liberia">
        
      </a>
    </div>
    <p>Above, we discussed an unexpected network interruption on the ACE submarine cable that caused outages across multiple countries on June 5. However, two months earlier, a planned outage for repair work on the cable also disrupted connectivity across multiple African countries. A <a href="https://twitter.com/jeanfrancis/status/1777231780002615593">communiqúe</a> issued by the Ministry of Posts, Telecommunications and the Digital Economy in Guinea noted in part (translated) “<i>...the ACE (Africa Coast to Europe) network will undergo a planned outage on April 8, 2024, between midnight and 2:00 a.m. morning in the following countries: Guinea, Senegal, Gambia, Sierra Leone and Liberia. This total outage of approximately 2 hours will affect Internet traffic and international calls.</i>”</p><p>The graphs below show the impact to traffic in the listed countries for the planned two-hour repair window, though it appears that traffic did not return fully to expected levels after the repair window concluded – it is unclear why it remained slightly depressed. In addition, despite being listed as one of the impacted countries, no impact to traffic was observed in <a href="https://radar.cloudflare.com/sn?dateStart=2024-04-07&amp;dateEnd=2024-04-08">Senegal</a>.</p>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p>Rounding out a trifecta of entries about the ACE submarine cable, planned maintenance work on the cable by <a href="https://guilab.com.gn/">GUILAB</a> reportedly caused a multi-hour outage at <a href="https://radar.cloudflare.com/as37461">AS37461 (Orange Guinea)</a> and at a country level as well, lasting from 12:15 - 15:45 local time (12:15 - 15:45 UTC). (GUILAB is the company in charge of managing the capacity allocated to Guinea on the ACE submarine cable.) The maintenance work was reported by Orange Guinea in two X posts (<a href="https://web.archive.org/web/20240601134921/https://twitter.com/orangeguinee_gn/status/1796901855705907676">1</a>, <a href="https://web.archive.org/web/20240601134922/https://twitter.com/orangeguinee_gn/status/1796901858444755127">2</a>), although these posts were subsequently deleted.</p><h2>Power outage</h2>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>At 18:30 local time (15:30 UTC) on May 2, <a href="https://x.com/KenyaPower_Care/status/1786058653058961589">Kenya Power posted a “Power Outage Alert” on X</a> that stated “<i>At 5:40 PM (EAT) today, Thursday, 2nd May 2024, we experienced a system disturbance on the grid, resulting in power supply disruption in most parts of the country.</i>” The graph below shows the resultant impact on Internet connectivity in the country, with traffic dropping sharply between 17:30 - 17:45 local time (14:30 - 14:45 UTC). The drop in traffic lasted until approximately 21:30 local time (18:30 UTC), the same time that <a href="https://x.com/KenyaPower_Care/status/1786104840990437749">Kenya Power posted a “Power Supply Restoration” notice on X</a>, highlighting the restoration of power to parts of the country. Although the post-outage spike seen in the graph would suggest pent-up demand for online content, a <a href="https://radar.cloudflare.com/ke?dateStart=2024-04-28&amp;dateEnd=2024-05-04">longer-term view</a> of Kenya's Internet traffic shows traffic peaks at the same time (22:00 local time, 19:00 UTC) during the preceding two days as well.</p>
    <div>
      <h3>Ecuador</h3>
      <a href="#ecuador">
        
      </a>
    </div>
    <p>A nationwide <a href="https://www.cnn.com/2024/06/19/americas/ecuador-nationwide-blackout-intl-latam/index.html">power outage in Ecuador on June 19</a> impacted hospitals, homes, and the subway, in addition to causing a major disruption to Internet connectivity. The graph below shows Ecuador’s Internet traffic dropping sharply just after 15:00 local time (20:00 UTC). A <a href="https://x.com/RobertoLuqueN/status/1803531032978661816">post on X from Public Works Minister Roberto Luque</a> explained (translated) “<i>The immediate report that we received from CENACE is that there is a failure in the transmission line that caused a cascade disconnection, so there is no energy service on a national scale.</i>” A subsequent post pointed at a lack of investment in the underlying systems, and noted that as of 18:41 pm local time (23:41 UTC), “<i>95% of the energy has already been restored</i>”. After the initial sharp drop, traffic began to recover fairly quickly, and was effectively back to expected levels by the stated time.</p>
    <div>
      <h3>Albania, Bosnia, Montenegro</h3>
      <a href="#albania-bosnia-montenegro">
        
      </a>
    </div>
    <p>A sudden increase in power consumption related to increased usage due to high temperatures, as well electrical systems being impacted by the heat, caused a <a href="https://www.reuters.com/world/europe/power-blackout-hits-montenegro-bosnia-albania-croatias-adriatic-coast-2024-06-21/">widespread power outage</a> across Montenegro, Bosnia, and Montenegro on June 21. The outage <a href="https://www.msn.com/en-gb/news/world/several-countries-across-europe-have-been-hit-by-a-massive-power-cut/ar-BB1oDYDy">reportedly</a> originated in Montenegro after a 400-kilowatt transmission line exploded. While power outages are generally more localized to a single country, or region within a country, power distribution systems are linked across Balkan countries as part of the <a href="https://international-partnerships.ec.europa.eu/policies/global-gateway/electricity-corridor-western-balkans_en">Trans-Balkan Electricity Corridor</a>.</p><p>Published reports (<a href="https://www.msn.com/en-gb/news/world/several-countries-across-europe-have-been-hit-by-a-massive-power-cut/ar-BB1oDYDy">MSN</a>, <a href="https://www.reuters.com/world/europe/power-blackout-hits-montenegro-bosnia-albania-croatias-adriatic-coast-2024-06-21/">Reuters</a>) noted that electrical networks went down 12:00 - 13:00 local time (10:00 - 11:00 UTC), and that electricity suppliers in the impacted countries started restoring power by mid-afternoon, and had it largely restored by the evening. The graphs below show traffic from Albania, Bosnia, and Montenegro starting to drop around 12:00 local time (10:00 UTC), reaching its nadir in Albania and Bosnia at 12:30 local time (10:30 UTC) and at 13:00 local time (11:00 UTC) in Montenegro. Traffic recovered gradually over the next several hours as power was restored, returning to expected levels by 15:30 local time (13:30 UTC).</p><p>Croatia was reportedly impacted by the power outage as well, but <a href="https://radar.cloudflare.com/hr?dateStart=2024-06-21&amp;dateEnd=2024-06-21">no adverse impact to traffic</a> at a country level is visible during the timeframe that connectivity in the other countries was disrupted.</p><h2>Military action</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>During the two-plus years of the Russia-Ukraine conflict, Ukraine’s power grid has been a frequent target for Russian air attacks. When damage to Ukraine’s electrical power infrastructure occurs as a result of these attacks, Internet connectivity is also disrupted. <a href="https://apnews.com/article/ukraine-power-grid-russian-attacks-c763050237bcc1388747283bf336f8ad">Attacks on May 21</a> caused power outages across a number of areas in Ukraine. The most significant impact was in Sumy, where traffic dropped as low as 82% below the previous week at 00:00 on May 22 local time (21:00 UTC). As the graphs below illustrate, traffic was also lower than the previous week for several hours in Kyiv, Kharkiv, and Vinnytsia, with traffic returning to expected levels by around 08:00 local time (05:00 UTC) on May 22.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6glDuBLv30DAkA6PoUrx3S/0bd46f992616c555f1a339f17f4202f3/11.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pmAMdj3lv6eOeXHyB9D9Z/39888ca8908236c61a9e012bd265f4f2/12.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/640mnWgGRtUsIHSeoILNWV/63ead0b3dfc430f651eb8dcc6cd02c3f/13.png" />
            
            </figure><p>\</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6afAZfCn0vxaQbr81eAFGv/6bb391de75e320ac0a5f851df9733a49/14.png" />
            
            </figure><h2>Technical problems</h2>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>As we’ve covered in previous quarterly posts, Internet outages and disruptions aren’t always due to significant wide-scale events like severe weather, power outages, or cable cuts. Sometimes more mundane technical issues can cause problems when users try to access the Internet. One example of this occurred on April 15 in Malaysia, when customers of <a href="https://radar.cloudflare.com/as9930">Time Internet</a> experienced a network outage for nearly two hours. The company explained the reason for the outage in a <a href="https://www.facebook.com/TimeInternet/posts/pfbid0RbJE44cgJvxA9FQSKFTVoe4NbJBdGuwkyXjuB5URiAW78zmgS5x1V8YPUt91ym9Al">contrite post on their Facebook page</a>, stating in part “<i>This Internet service outage was by far the worst in our history - affecting approximately 40% of our customers. … At 5.38pm today, both our primary and secondary Secure DNS servers became unreachable. This means that any browser or service requiring a DNS address resolution was not able to reach its intended site.</i>” Because subscribers could not reach Time Internet’s DNS resolvers, they were unable to resolve hostnames for Internet services, sites, and applications, including those delivered by Cloudflare. This resulted in the drop in traffic seen in the graph below, which started just after 17:00 local time (05:00 UTC), and began to recover approximately an hour later. The company did not provide any additional information on what caused the DNS servers to fail.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p>In Nepal, a number of local Internet service providers including <a href="https://radar.cloudflare.com/as45650">AS45650 (Vianet)</a> and <a href="https://radar.cloudflare.com/as139922">AS139922 (Dishhome)</a> rely on Indian provider <a href="https://radar.cloudflare.com/as9498">Bharti Airtel</a> for upstream connectivity, enabling them to reach the rest of the Internet. A <a href="https://kathmandupost.com/money/2024/05/01/isps-warn-of-possible-internet-disruption">published report</a> underscores the reliance, noting “<i>Nepali ISPs buy 70 percent of their internet from Airtel.</i>”</p><p>On April 25, these ISPs <a href="https://www.nepalitelecom.com/latest-internet-shutdown-saga-in-nepal">warned</a> that their services could be interrupted because the Nepali government had not provided them with foreign exchange services that would enable them to pay bandwidth vendors such as Airtel, whom they reportedly owed USD $30 million to. On May 1, Airtel informed the delinquent Nepali providers that Internet services may be interrupted at any time due to the overdue payment, and on May 2, Airtel took that step. The graphs below show Vianet’s traffic dropping to near zero at 16:15 local time (10:30 UTC), recovering to expected levels six hours later. An hour later, at 17:15 local time (11:30 UTC), Dishhome’s traffic dropped significantly, though not as severely as Vianet’s. Dishhome’s traffic also recovered approximately six hours later.</p><p>Dishhome may not have experienced a near-complete outage like Vianet did because Bharti Airtel is one of <a href="https://radar.cloudflare.com/routing/as132799?dateStart=2024-05-02&amp;dateEnd=2024-05-02">four upstream providers used by its parent company</a>, whereas Bharti Airtel is <a href="https://radar.cloudflare.com/routing/as45650?dateStart=2024-05-02&amp;dateEnd=2024-05-02">one of Vianet's two upstream providers</a>.</p><p>A month later, on June 3, <a href="https://radar.cloudflare.com/as45650">AS45650 (Vianet)</a> and <a href="https://radar.cloudflare.com/as17501">AS17501 (Worldlink)</a> in Nepal experienced Internet disruptions that were <a href="https://myrepublica.nagariknetwork.com/news/internet-slowdown-across-nepal-due-to-airtel-network-issues/">reportedly</a> caused by routing issues on Bharti Airtel’s network. On Worldlink, a drop in traffic occurred between 12:15 - 14:00 local time (06:30 - 08:15 UTC), while on Vianet, the loss of traffic took place between 12:15 - 13:15 local time (06:30 - 07:30 UTC).</p><h2>Unknown</h2><p>Most of the Internet disruptions covered in this blog post series have a known root cause, whether admitted/stated by the impacted provider(s) or closely associated with a real world event (severe weather, power outage, etc.) However, other disruptions are observed and even publicized by the impacted provider, but no underlying reason for the outage is ever made public.</p>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>On May 21, <a href="https://radar.cloudflare.com/as10030">CelcomDigi (AS10030)</a> <a href="https://x.com/CelcomDigi/status/1792912132406657448">posted on X</a> that it was experiencing an outage on its network, and that it was working to resolve the issue as soon as possible. However. just 12 minutes later, it <a href="https://x.com/CelcomDigi/status/1792915174468301241">published a second post</a> stating that it had fully restored Celcom Internet service. These posts were made at 21:35 and 21:47 local time (13:35 and 13:47) respectively. However, as the graph below shows, traffic volumes had returned to expected levels over an hour earlier, as the observed Internet disruption on Celcom’s network lasted between 18:00 - 20:15 local time (10:00 - 12:15 UTC). (Note that the second disruption shown in the graph below was due to an internal Cloudflare data pipeline issue, and not any sort of problem with Celcom’s network.)</p>
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>SpaceX Starlink’s satellite Internet service is unique in that it has an international subscriber base, so outages on its network have a more wide-reaching impact than issues with an ISP that covers a single country. At 01:59 UTC on May 29, <a href="https://radar.cloudflare.com/as14593">Starlink</a> <a href="https://x.com/Starlink/status/1795636172972314730">shared on X</a> that it was currently experiencing a network outage, and that it was actively implementing a solution. Twenty-eight minutes later, it <a href="https://x.com/Starlink/status/1795643144094285883">posted</a> “<i>The network issue has been fully resolved.</i>” This brief outage is visible in the graph below as a slight dip in traffic. However, what is particularly interesting is the spike in traffic to Cloudflare from Starlink’s network following the resolution of the outage. The sharp increase and rapid decline of the traffic curve after service was restored suggests that it may be related to an automated connectivity check of some kind, rather than pent-up user demand for content.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>A near-complete Internet outage was observed in <a href="https://radar.cloudflare.com/td">Chad</a> on June 5 between 08:15 - 12:00 local time (07:15 - 11:00 UTC), as seen in the graph below. Routing was also impacted, as the number of IPv4 /24 address blocks (256 IPv4 addresses) announced by network providers in the country dropped by as much as 75% during the outage.</p><p>A <a href="https://fr.apanews.net/news/tchad-linternet-coupe-pendant-des-heures/">news item covering the outage</a> noted that only Starlink subscribers retained Internet access during the outage. It also noted that Chad has faced recurring Internet disruptions since 2016, either because of problems with fiber-optic cables, or due to government directed shutdowns in the name of national security. It is unclear what ultimately caused this particular outage.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>With an <a href="https://www.businessinsider.in/business/telecom/news/reliance-jio-and-airtel-add-nearly-5-million-subscribers-in-january-2024/articleshow/109040220.cms">estimated subscriber base in excess of over 460 million</a>, any Internet disruption affecting <a href="https://radar.cloudflare.com/as55836">Reliance Jio’s network (AS55836)</a> is going to have a widespread impact across India. On June 18, Reliance Jio experienced two disruptions that occurred between 13:15 - 17:15 local time (07:45 - 11:45 UTC). Each disruption lasted less than an hour, and dropped traffic levels to approximately half of those seen at the same time a week prior. <a href="https://www.editorji.com/tech-news/reliance-jio-down-big-outage-disrupts-services-1718706733637">Both mobile and fiber connectivity was affected</a>, and no additional information has been provided by Reliance Jio regarding the root cause of the connectivity issues.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As we become increasingly dependent on reliable Internet connectivity, we must recognize that that connectivity is itself reliant on a complex and interconnected foundation of physical, technical, and political factors. A failure in any one of these foundational components, whether due to a cable cut, power outage, misconfiguration, or government action, can have a significant impact, disrupting Internet connectivity for millions of users, potentially across multiple countries. While the resilience and reliability of the physical and technical components can be improved through redundancy and best practices, political factors have arguably proven to be the hardest to address. However, organizations like <a href="https://www.accessnow.org/">AccessNow</a>, through their <a href="https://www.accessnow.org/campaign/keepiton/">#KeepItOn</a> campaign, mobilize people, communities, and civil society actors globally to fight against government-directed Internet shutdowns, which can have <a href="https://pulse.internetsociety.org/en/netloss/">significant financial consequences</a>.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions, routing issues, Internet traffic trends, security and attacks, and Internet quality. Follow us on social media at <a href="https://x.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or <a>contact us via e-mail</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">5ka42ShR5MS2QH9vV2Dpn</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q1 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q1-2024-internet-disruption-summary/</link>
            <pubDate>Mon, 29 Apr 2024 13:00:09 GMT</pubDate>
            <description><![CDATA[ The first quarter of 2024 kicked off with quite a few Internet disruptions. Perhaps most interestingly, RPKI, DNS, and DNSSEC issues were among the technical problems that disrupted connectivity for subscribers across multiple network providers ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6k1NK6vOkPAt8lFkq7iKEQ/3e38a7a4846ea723b9227e974d91600b/image1-21.png" />
            
            </figure><p>Cloudflare’s network spans more than 310 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions. Thanks to recently released Cloudflare Radar <a href="https://developers.cloudflare.com/radar/glossary/#bgp-announcements">functionality</a>, this quarter we have started to explore the impact from a routing perspective, as well as a traffic perspective, at both a <a href="https://twitter.com/CloudflareRadar/status/1768654743742579059">network</a> and <a href="https://twitter.com/CloudflareRadar/status/1773704264650543416">location</a> level.</p><p>The first quarter of 2024 kicked off with quite a few Internet disruptions. <a href="#cablecuts">Damage to both terrestrial and submarine cables</a> caused problems in a number of locations, while <a href="#militaryaction">military action</a> related to ongoing geopolitical conflicts impacted connectivity in other areas. <a href="#governmentdirected">Governments</a> in several African countries, as well as Pakistan, ordered Internet shutdowns, focusing heavily on mobile connectivity. Malicious actors known as <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Suda</a>n claimed responsibility for <a href="#cyberattacks">cyberattacks</a> that disrupted Internet connectivity in Israel and Bahrain. <a href="#maintenance">Maintenance</a> and <a href="#poweroutages">power outages</a> forced users offline, resulting in observed drops in traffic. And in a more unusual turn, <a href="#orangeespana">RPKI</a>, <a href="#plusnetuk">DNS</a>, and <a href="#russia">DNSSEC</a> issues were among the <a href="#technicalproblems">technical problems</a> that disrupted connectivity for subscribers across multiple network providers.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Cable cuts</h2>
    <div>
      <h3>Moov Africa Tchad</h3>
      <a href="#moov-africa-tchad">
        
      </a>
    </div>
    <p>Reported fiber optic cable damage that occurred in <a href="https://radar.cloudflare.com/cm">Cameroon</a> on January 10 further disrupted connectivity for customers of <a href="https://radar.cloudflare.com/as327802">AS327802 (Moov Africa Tchad / Millicom)</a> a telecommunications provider in Chad. According to a (translated) <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0kB9W5CkhVJqBq34agPWqG81yeCfLBijKYc6WiLDKLE79nPmhie4T9idZVStc8f6Xl">Facebook post from Moov Africa Tchad</a>, “<i>On the afternoon of January 10, 2024, there was a breakdown of the internet due to a cut in the optical fiber coming from Cameroon through which Chad has access to the internet, the one coming from Sudan being unavailable for a while.</i>” It is unclear whether the referenced cable cut occurred in Cameroon or Chad, and the mentioned <a href="https://radar.cloudflare.com/sd">Sudan</a> cable issue may be <a href="/q4-2023-internet-disruption-summary#:~:text=of%20Internet%20service.-,Chad,-On">the one covered in our Q4 2023 summary post</a>. As a landlocked country, Chad is dependent on terrestrial Internet connections to/through neighboring countries, and the <a href="https://afterfibre.nsrc.org/">AfTerFibre cable map</a> illustrates Chad’s reliance on limited cable paths through Cameroon and Sudan.</p><p>The graphs below show that Moov Africa Tchad traffic was disrupted for over 12 hours starting midday (UTC) on January 10, and the disruption was visible at a country level as well. The fiber cut also resulted in significant volatility from a routing perspective, as the volume of announced IPv4 address space shifted frequently at a <a href="https://radar.cloudflare.com/routing/as327802?dateStart=2024-01-10&amp;dateEnd=2024-01-11">network</a> and <a href="https://radar.cloudflare.com/routing/td?dateStart=2024-01-10&amp;dateEnd=2024-01-11">country</a> level during the disruption.</p><p>A second less severe disruption was also observed during the morning (UTC) of January 11. That disruption was <a href="https://twitter.com/DarkWebDispatch/status/1745080174519923165">reportedly</a> due to an <a href="https://crisis24.garda.com/alerts/2024/01/chad-residual-internet-service-disruptions-possible-over-coming-hours-following-hours-long-outage-across-country-jan-10">alleged cyberattack</a> by Anonymous Sudan that targeted <a href="https://radar.cloudflare.com/as328594">AS328594 (SudaChad Telecom)</a>, which is an <a href="https://radar.cloudflare.com/routing/as327802">upstream provider for Moov Africa Tchad</a>.</p>
    <div>
      <h3>Orange Burkina Faso</h3>
      <a href="#orange-burkina-faso">
        
      </a>
    </div>
    <p>On February 15, a brief (~30 minute) but complete significant Internet disruption was observed at <a href="https://radar.cloudflare.com/as37577">AS37577 (Orange Burkina Faso)</a>. According to the translation of a communiqué <a href="https://twitter.com/OrangeBurkina/status/1758179417065464103">posted by the provider on social media</a>, “<i>The incident is due to a fiber cut, which causes a disruption of Internet services for certain customers.</i>” Orange did not specify whether it was a more localized fiber cut, or damage to one of the terrestrial fibers that cross the country. The incident took the network completely offline, as the ASN’s amount of announced IPv4 address space <a href="https://radar.cloudflare.com/routing/as37577?dateStart=2024-02-15&amp;dateEnd=2024-02-15">dropped to zero</a> for the duration.</p>
    <div>
      <h3>MTN Nigeria</h3>
      <a href="#mtn-nigeria">
        
      </a>
    </div>
    <p><a href="https://twitter.com/MTNNG/status/1762909655620063594">MTN Nigeria turned to social media</a> on February 28 to let customers know that “<i>You have been experiencing challenges connecting to the network due to a major service outage caused by multiple fibre cuts, affecting voice and data services.</i>” A <a href="https://crisis24.garda.com/alerts/2024/02/nigeria-lingering-internet-and-telecommunications-disruptions-likely-in-areas-across-country-following-nationwide-outage-feb-28">published report</a> described the impact, noting “<i>Millions of customers nationwide were impacted by the hours-long outage, especially in Lagos.</i>” Connectivity was disrupted for approximately seven hours between 13:30 - 20:30 local time (12:30 - 19:30 UTC), and the provider <a href="https://twitter.com/MTNNG/status/1762972229195702692">posted a followup note</a> just before midnight local time stating that service had been fully restored.</p>
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>A 16-hour Internet disruption on March 2/3 at <a href="https://radar.cloudflare.com/as27653">AS27653 (Digicel Haiti)</a> was due to a double fiber cut <a href="https://www.reuters.com/world/americas/haitian-police-unions-plead-help-after-attack-main-prison-2024-03-03/">as a result of violence</a> related to attempts to oust Prime Minister Ariel Henry. Starting around 22:00 local time on March 2 (03:00 on March 3), a complete outage was observed for approximately nine hours. Some recovery in traffic occurred for approximately two-and-a-half hours, followed by a three hour near-complete disruption. Digicel Haiti effectively disappeared from the Internet during the nine-hour outage, as no IPv4 or IPv6 address space was announced by the network during that time.</p>
    <div>
      <h3>SKY (Philippines)</h3>
      <a href="#sky-philippines">
        
      </a>
    </div>
    <p>A brief traffic disruption observed on <a href="https://radar.cloudflare.com/as23944">AS23944 (SKY)</a> in the <a href="https://radar.cloudflare.com/ph">Philippines</a> on March 18 was likely related to a fiber cut. In an <a href="https://twitter.com/SKYserves/status/1769688520124227960">advisory posted by SKY</a> on social media, they stated that “<i>SKY services in several areas in Marikina, Pasig and Quezon City are currently affected by a cut-fiber issue</i>”, listing 45 affected areas. Traffic was most significantly impacted between 20:00 - 21:00 local time (12:00 - 13:00 UTC), although full recovery took several more hours. Only a <a href="https://radar.cloudflare.com/routing/as23944?dateStart=2024-03-18&amp;dateEnd=2024-03-18">minor impact to routing</a> resulting from the fiber cut was observed.</p>
    <div>
      <h3>Multiple African countries</h3>
      <a href="#multiple-african-countries">
        
      </a>
    </div>
    <p>On March 14, damage to multiple submarine cables off the west coast of Africa impacted Internet connectivity across multiple countries in West and Southern Africa. The damage was <a href="https://www.itweb.co.za/article/news-analysis-why-undersea-cables-broke-sas-public-cloud/G98Yd7LGK4pvX2PD">reportedly</a> caused by underwater rock falls, and in addition to disrupting Internet connectivity, also <a href="https://web.archive.org/web/20240314144626/https://status.cloud.microsoft/">caused availability issues for Microsoft Azure and Office 365 cloud services</a>.</p><p>The <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a>, <a href="https://www.submarinecablemap.com/submarine-cable/sat-3wasc">Submarine Atlantic 3/West Africa Submarine Cable (SAT-3/WASC)</a>, <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West Africa Cable System (WACS)</a>, and <a href="https://www.submarinecablemap.com/submarine-cable/mainone">MainOne</a> cables <a href="https://www.internetsociety.org/resources/doc/2024/2024-west-africa-submarine-cable-outage-report/">were all damaged</a>, and impacted 13 African countries including <a href="https://radar.cloudflare.com/bj">Benin</a>, <a href="https://radar.cloudflare.com/bf">Burkina Faso</a>, <a href="https://radar.cloudflare.com/cm">Cameroon</a>, <a href="https://radar.cloudflare.com/ci">Côte d’Ivoire</a>, <a href="https://radar.cloudflare.com/gm">Gambia</a>, <a href="https://radar.cloudflare.com/gh">Ghana</a>, <a href="https://radar.cloudflare.com/gn">Guinea</a>, <a href="https://radar.cloudflare.com/lr">Liberia</a>, <a href="https://radar.cloudflare.com/na">Namibia</a>, <a href="http://radar.cloudflare.com/ne">Niger</a>, <a href="https://radar.cloudflare.com/ng">Nigeria</a>, <a href="https://radar.cloudflare.com/za">South Africa</a>, and <a href="https://radar.cloudflare.com/tg">Togo</a>.</p><p>Comparatively brief disruptions were observed in <a href="https://radar.cloudflare.com/ne?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Niger</a>, <a href="https://radar.cloudflare.com/traffic/gn?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Guinea</a>, and <a href="https://radar.cloudflare.com/traffic/gm?dateStart=2024-03-14&amp;dateEnd=2024-03-14">Gambia</a>, lasting from under an hour to approximately two hours.</p><p>However, the disruptions stretched out across multiple days in countries including <a href="https://radar.cloudflare.com/traffic/tg?dateStart=2024-03-11&amp;dateEnd=2024-03-17">Togo</a>, <a href="https://radar.cloudflare.com/traffic/lr?dateStart=2024-03-11&amp;dateEnd=2024-03-17">Liberia</a>, and <a href="https://radar.cloudflare.com/traffic/gh?dateStart=2024-03-11&amp;dateEnd=2024-03-31">Ghana</a>, where it took several weeks for traffic to return to previously observed peak levels.</p><p>Operators in impacted countries attempted to maintain availability by shifting traffic to Google’s <a href="https://www.submarinecablemap.com/submarine-cable/equiano">Equiano</a> submarine cable, which <a href="https://www.capacitymedia.com/article/2czls1jc2s3jtornuuhvk/news/exclusive-equianos-togo-landing-station-sees-4x-increase-in-traffic">reportedly</a> experienced a 4x increase in traffic, and <a href="https://www.moroccoworldnews.com/2024/03/361490/west-africa-internet-outage-highlights-moroccos-crucial-role-in-regional-connectivity">Morocco’s</a> <a href="https://www.submarinecablemap.com/submarine-cable/maroc-telecom-west-africa">Maroc Telecom West Africa</a> submarine cable. Service on the <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_08apr24-west-africa-multiple-cables-outages-activity-7183050367440441344-iyTI?utm_source=share&amp;utm_medium=member_desktop">SAT-3</a> cable was fully restored as of April 6, with repairs on <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_wacsabrcable-sat3abrcable-activity-7187430036432408576-404i?utm_source=share&amp;utm_medium=member_desktop">ACE</a> completed on April 17, repairs to <a href="https://www.linkedin.com/feed/update/urn:li:activity:7187430036432408576/">WACS</a> and <a href="https://www.linkedin.com/posts/philippe-devaux-218423199_wacsabrcable-sat3abrcable-activity-7185980538434801664-dfa3?utm_source=share&amp;utm_medium=member_desktop">MainOne</a> expected to be done by April 28.</p><p>Additional details and observations can be found in our blog post <a href="/undersea-cable-failures-cause-internet-disruptions-across-africa-march-14-2024/"><i>Undersea cable failures cause Internet disruptions for multiple African countries</i></a>.</p>
    <div>
      <h3>Red Sea</h3>
      <a href="#red-sea">
        
      </a>
    </div>
    <p>On February 24, three submarine cables that run through the Red Sea were damaged: the <a href="https://www.submarinecablemap.com/submarine-cable/seacomtata-tgn-eurasia">Seacom/Tata cable</a>, the <a href="https://www.submarinecablemap.com/submarine-cable/asia-africa-europe-1-aae-1">Asia Africa Europe-1</a> (AAE-1), and the <a href="https://www.submarinecablemap.com/submarine-cable/europe-india-gateway-eig">Europe India Gateway</a> (EIG). It is <a href="https://www.bloomberg.com/news/articles/2024-03-06/anchor-from-houthi-sunk-ship-likely-damaged-undersea-cables">believed</a> that the cables were cut by the anchor of the <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/">Rubymar</a>, a cargo ship that was damaged by a ballistic missile on February 18. At the time of the disruption, Seacom <a href="https://www.itweb.co.za/article/seacom-confirms-cable-outage-in-red-sea/KPNG8v8NyDNM4mwD">confirmed</a> the damage to their cable, while the owners of the other two cables did not publish similar confirmations.</p><p>While the cable cuts <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/#:~:text=impacted%20countries%20in%20East%20Africa">reportedly</a> impacted countries in East Africa, including <a href="https://radar.cloudflare.com/traffic/tz?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Tanzania</a>, <a href="https://radar.cloudflare.com/traffic/ke?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Kenya</a>, <a href="https://radar.cloudflare.com/traffic/ug?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Uganda</a>, and <a href="https://radar.cloudflare.com/traffic/mz?dateStart=2024-02-22&amp;dateEnd=2024-02-28">Mozambique</a>, no loss of traffic was observed across these countries in <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><h2>Military action</h2>
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>On February 2, Cloudflare observed a loss of traffic at <a href="https://radar.cloudflare.com/as15706">AS15706 (Sudatel)</a> and <a href="https://radar.cloudflare.com/as36972">AS36972 (MTN Sudan)</a>, with a similar loss occurring on February 7 at <a href="https://radar.cloudflare.com/as36998">AS36998 (Zain Sudan / SDN Mobitel)</a>. The disruption at MTN Sudan aligns with a <a href="https://twitter.com/MTNSudan1/status/1753528636949274956">social media post</a> from the provider, in which they stated (translated) “<i>We regret the interruption of all services due to circumstances beyond our control. While we apologize for the inconvenience caused by this interruption, we assure you of our endeavor to restore the service as soon as possible, and you will be notified of the return of the service.</i>” On February 5, several days after their outage started, Zain Sudan published a <a href="https://twitter.com/ZainSudan/status/1754487740102533170">social media post</a> that stated (translated) “<i>Zain Sudan has been constantly striving to maintain communication and Internet service to serve its valued subscribers, and we would like to point out that the current network outage is due to circumstances beyond its control, with our hopes that safety will prevail, and that service will be restored as soon as possible.</i>” Sudatel did not share any information about the status of its network. On February 4, Digital Rights Lab - Sudan <a href="https://twitter.com/drlab_sudan/status/1754134933772128326">posted on social media</a> that “<i>Our sources confirmed that</i> <a href="https://twitter.com/RSFSudan"><i>@RSFSudan</i></a> <i>forces tookover data centers of ISPs in Khartoum, #Sudan.</i>” It is likely that the Internet outages observed across these providers are related to these takeovers, part of the <a href="https://www.cfr.org/global-conflict-tracker/conflict/power-struggle-sudan">military conflict that has been underway in the country</a> since April 15, 2023.</p><p>The disruptions on these networks varied in length. At Sudatel, traffic started to return on February 11. At Zain Sudan, traffic began to return on March 3, corroborated by a <a href="https://twitter.com/ZainSudan/status/1764217865530376300">social media post</a> that stated (translated) “<i>Zain network is gradually returning to work and allows its subscribers to communicate for free for a limited time. Zain promises to continue working to restore its network in the rest of the states.</i>” Traffic had not yet returned on MTN Sudan by the end of the first quarter.</p>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>In February, the Ukraine/Russia war reached the two-year mark, and over that time, we have covered a number of Internet outages in Ukraine caused by conflict-related attacks. On February 22, <a href="https://therecord.media/massive-missile-russian-barrage-internet-outages-blackouts">Russian air strikes on critical infrastructure in Ukraine</a> damaged energy facilities across the country, resulting in widespread power outages. These power outages caused Internet disruptions across multiple regions in Ukraine, including Kharkiv, Zaporizhzhia, Odessa, Dnipropetrovsk Oblast, and Khmelnytskyi Oblast. Traffic initially dropped around 05:00 local time (03:00 UTC), falling as much as 68% in Kharkiv. However, all regions saw lower traffic levels for several days as compared to the week before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TBMLgZ73lfMRAB4Jpey7d/222ffab926e47c66ce043ab3fda388b4/Mar-22---Ukraine---Kharkiv.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VQ0RIhitP3TNnn3pkVtT2/fcbd02cae5fb89c3737bf3bf0309eec4/Mar-22---Ukraine---Khmel.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4s3Twlv8ycp3hRwoTfq7Vd/244fdea99065f2ecf3072ccb2f0d7cb7/Mar-22---Ukraine---Dnipro.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LDrhWYS0DOwOYd93MRiJH/70f2cf5561ae703f40581303feb058ca/Mar-22---Ukraine---Odessa.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ej2ZJcMsl0b4pSzOJZYHI/fdd67fe3d9fb0d6caadc0cce0b2f9e17/Mar-22---Ukraine---Zap.png" />
            
            </figure>
    <div>
      <h3>Gaza Strip</h3>
      <a href="#gaza-strip">
        
      </a>
    </div>
    <p>In our <a href="/q4-2023-internet-disruption-summary"><i>Q4 2023 Internet disruption summary</i></a> blog post, we <a href="/q4-2023-internet-disruption-summary#:~:text=In%20addition%20to%20the%20outages%20illustrated%20above">noted that</a> throughout October, November, and December, <a href="https://paltel.ps/en/home">Paltel (Palestine Telecommunications Company)</a> had published several social media posts about disruptions to its landline, mobile, and Internet services. During the first quarter of 2024, similar outages were observed on <a href="https://twitter.com/Paltelco/status/1745813735627727091">January 12</a>, <a href="https://twitter.com/Paltelco/status/1749464176756449631">January 22</a>, and <a href="https://twitter.com/QudsNen/status/1765100306353017128">March 5</a>. Paltel attributes these outages to the ongoing aggression related to the war with Israel.</p><p>The associated outages during the quarter varied in length, from just a few hours to over a week. Each outage is shown in the graphs below, which show Paltel traffic within four Palestinian governorates in the Gaza Strip region. While it appears that the Gaza governorate suffered a disruption to traffic as connectivity remained available, complete outages occurred in the Khan Yunis, Rafah, and Deir al-Balah governorates.</p><p><b>January 12-19</b></p><figure>
    <table>
        <colgroup>
            <col></col>
            <col></col>
        </colgroup>
        <tbody>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3awubGpVqUX91wiBfu72l8/b0f6d073446e830b304fb1e80f14d963/Jan_12-19_-_Gaza_-_Gaza.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3awubGpVqUX91wiBfu72l8/b0f6d073446e830b304fb1e80f14d963/Jan_12-19_-_Gaza_-_Gaza.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/1yxGzVFOk0gVLyZtje7gnw/e188aa8a748e5fe73218cc98950a22a5/Jan_12-19_-_Gaza_-_Khan_Yunis.png"><img src="https://images.ctfassets.net/slt3lc6tev37/1yxGzVFOk0gVLyZtje7gnw/e188aa8a748e5fe73218cc98950a22a5/Jan_12-19_-_Gaza_-_Khan_Yunis.png" /></a></figure>
                </td>
            </tr>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3ZCHTnNigLCapNMRp6Du9R/17600648639a68925b04ee3158f4384b/Jan_12-19_-_Gaza_-_Rafah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3ZCHTnNigLCapNMRp6Du9R/17600648639a68925b04ee3158f4384b/Jan_12-19_-_Gaza_-_Rafah.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2dy1u4WsydG2TtEaBFmOPF/07ea2b4e3c94c3fa4afbdbc8771a1aa8/Jan_12-19_-_Gaza_-_Deir_al-Balah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2dy1u4WsydG2TtEaBFmOPF/07ea2b4e3c94c3fa4afbdbc8771a1aa8/Jan_12-19_-_Gaza_-_Deir_al-Balah.png" /></a></figure>
                </td>
            </tr>
        </tbody>
    </table>
</figure><p><b>January 22-24</b></p><figure>
    <table>
        <colgroup>
            <col></col>
            <col></col>
        </colgroup>
        <tbody>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/4csFWELPuqnSc6nVcpYc5K/a250d1fd1d71cd547bb9b1100ece5a79/Jan_22-24_-_Gaza_-_Gaza.png"><img src="https://images.ctfassets.net/slt3lc6tev37/4csFWELPuqnSc6nVcpYc5K/a250d1fd1d71cd547bb9b1100ece5a79/Jan_22-24_-_Gaza_-_Gaza.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2ogmrVWjlFTErdAmNUSGCr/1c109227deb6863c52b3e447d8b6a6c5/Jan_22-24_-_Gaza_-_Khan_Yunis.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2ogmrVWjlFTErdAmNUSGCr/1c109227deb6863c52b3e447d8b6a6c5/Jan_22-24_-_Gaza_-_Khan_Yunis.png" /></a></figure>
                </td>
            </tr>
            <tr>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/2wINE0xDB1VPPf9fcG3Gcd/203de374fad17372fa68cd2c7ac5dde9/Jan_22-24_-_Gaza_-_Rafah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/2wINE0xDB1VPPf9fcG3Gcd/203de374fad17372fa68cd2c7ac5dde9/Jan_22-24_-_Gaza_-_Rafah.png" /></a></figure>
                </td>
                <td>
                    <figure><a href="https://images.ctfassets.net/slt3lc6tev37/3H88zS4AETXDokBSY2HwYt/d90233525244dac1cb5dbcd3c12f8869/Jan_22-24_-_Gaza_-_Deir_al-Balah.png"><img src="https://images.ctfassets.net/slt3lc6tev37/3H88zS4AETXDokBSY2HwYt/d90233525244dac1cb5dbcd3c12f8869/Jan_22-24_-_Gaza_-_Deir_al-Balah.png" /></a></figure>
                </td>
            </tr>
        </tbody>
    </table>
</figure><p><b>March 5</b></p><h2>Cyberattacks</h2><p>In addition to the previously discussed cyberattack that impacted connectivity for <a href="https://radar.cloudflare.com/as327802">AS327802 (Moov Africa Tchad / Millicom)</a> on January 11, several other observed Internet disruptions were caused by cyberattacks in the first quarter.</p>
    <div>
      <h3>HotNet Internet Services (Israel)</h3>
      <a href="#hotnet-internet-services-israel">
        
      </a>
    </div>
    <p>Anonymous Sudan <a href="https://twitter.com/DailyDarkWeb/status/1760266153467760708">reportedly</a> launched an attack against <a href="https://radar.cloudflare.com/as12849">AS12849 (HotNet Internet Services)</a>, a major <a href="https://en.wikipedia.org/wiki/Hot_(Israel)">Israeli telecommunications provider</a>. The attack was apparently brief, as it only disrupted traffic between 22:00 on February 20 and 00:00 on February 21 local time (20:00 to 22:00 UTC on February 20). Although brief, the attack succeeded in knocking the provider offline as the <a href="https://radar.cloudflare.com/routing/as12849?dateStart=2024-02-20&amp;dateEnd=2024-02-21">volume of IPv4 and IPv6 address space announced by HotNet</a> fell to zero during the period the attack occurred.</p>
    <div>
      <h3>Zain Bahrain</h3>
      <a href="#zain-bahrain">
        
      </a>
    </div>
    <p>Anonymous Sudan also <a href="https://twitter.com/FalconFeedsio/status/1764364189492236676?s=20">reportedly</a> targeted <a href="https://radar.cloudflare.com/as31452">AS31452 (Zain Bahrain)</a> with a cyber attack. This attack appeared to be less severe than the one that targeted HotNet in Israel, but it also lasted significantly longer, with traffic disrupted between 20:45 on March 3 and 18:15 on March 4 local time (17:45 on March 3 to 15:15 on March 4 UTC). No impact to <a href="https://radar.cloudflare.com/routing/as31452?dateStart=2024-03-03&amp;dateEnd=2024-03-04">announced IP address space</a> was observed. Zain Bahrain acknowledged the connectivity disruption in a <a href="https://twitter.com/ZainBahrain/status/1764678419147538492">social media post on March 4</a>, noting (translated) “<i>We would like to inform you that some customers may encounter difficulties in using some of our services. Our technical team works to avoid these difficulties as quickly as possible.</i>”</p>
    <div>
      <h3>Multiple networks in Ukraine</h3>
      <a href="#multiple-networks-in-ukraine">
        
      </a>
    </div>
    <p>On March 13, <a href="https://therecord.media/ukraine-isps-attacks-solntsepek-sandworm-gru">an attack targeted a number of Ukrainian telecommunications providers</a>, including <a href="https://radar.cloudflare.com/as16066">AS16066 (Triangulum)</a>, <a href="https://radar.cloudflare.com/as34359">AS34359 (Link Telecom Ukraine)</a>, <a href="https://radar.cloudflare.com/as197522">AS197522 (Kalush Information Network)</a>, <a href="https://radar.cloudflare.com/as52074">AS52074 (Mandarun)</a>, and <a href="https://radar.cloudflare.com/as29013">AS29013 (LinkKremen)</a>. Triangulum appeared to be the most significantly impacted, experiencing a near complete loss of traffic between March 13 and March 20, as seen below. Triangulum posted a notice on its <a href="https://www.triangulum.ua/">website</a>, noting in part “<i>On March 13, 2024, a hacker attack was carried out on a number of Ukrainian providers. At 10:28 a.m. on March 13, 2024, a large-scale technical failure occurred on our Company's network, as a result of which it became impossible to provide electronic communication services. The Company's employees, together with employees of the Cyber ​​Police and the National Cyber ​​Security Coordination Center, are taking comprehensive measures around the clock aimed at restoring the entire range of services as soon as possible. Services are being restored gradually. Full recovery may take several days.</i>”</p><p>Other affected providers experienced comparatively shorter connectivity disruptions. The near complete outage at Mandarun lasted approximately a day, while the others saw outages lasting around seven hours, starting around 11:30 local time (09:30 UTC) on March 13, with connectivity returning to typical levels around 08:00 local time (06:00 UTC) on March 14.</p><h2>Government directed</h2>
    <div>
      <h3>Comoros</h3>
      <a href="#comoros">
        
      </a>
    </div>
    <p>Following protests against the re-election of President Azali Assoumani, authorities in <a href="https://radar.cloudflare.com/km">Comoros</a> <a href="https://www.bbc.com/news/world-africa-68027892">reportedly</a> shut down Internet connectivity on January 17. While some disruption was visible to traffic at a country level between 12:00 local time on January 17 (09:00 UTC) and 17:30 local time on January 19 (14:30 UTC), it was significantly more noticeable in the traffic from <a href="https://radar.cloudflare.com/as36939">AS36939 (Comores Telecom)</a>, which saw several periods of near-complete outage across the two-day span. Although Comores Telecom announces a limited amount of IPv4 address space, it saw significant volatility on January 17 &amp; 18, dropping to zero several times.</p>
    <div>
      <h3>Sudatel Senegal/Expresso Telecom and Tigo/Free (Senegal)</h3>
      <a href="#sudatel-senegal-expresso-telecom-and-tigo-free-senegal">
        
      </a>
    </div>
    <p>On February 4, the Minister of Communication, Telecommunications, and Digital Affairs in <a href="https://radar.cloudflare.com/sn">Senegal</a> <a href="https://twitter.com/samirasawlani/status/1754453336894415340">ordered</a> the suspension of mobile Internet connectivity starting at 22:00 local time (22:00 UTC). The suspension followed protests that erupted in the wake of the postponement of the presidential election. Traffic from <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal/Expresso Telecom)</a> fell sharply at the time the suspension went into effect, recovering around 07:30 local time (07:30 UTC) on February 7. Traffic from <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a> fell at around 09:30 local time (09:30 UTC) on February 5, with the provider <a href="https://twitter.com/free_senegal/status/1754521065894633896">notifying subscribers of the suspension via social media</a>. Traffic on Tigo/Free recovered around midnight local time (00:00 UTC) on February 7, and the provider again <a href="https://twitter.com/free_senegal/status/1755188473781211523">used social media to inform subscribers of service availability</a>. No changes were observed to announced IP address space for either provider, indicating that the suspension of mobile Internet connectivity was not done at a routing level.</p><p>A little more than a week later, on February 13, the government in Senegal <a href="https://intlmonitor.com/africa/internet-shutdown-in-senegal-ahead-of-protests-over-vote-delay/">again ordered</a> the suspension of mobile Internet connectivity in an effort to prevent "the spread of hateful and subversive messages online." ahead of a march planned by activist groups which aimed to express dissent against the postponement of the presidential election. The mobile Internet shutdown was most visible on Tigo/Free, which saw a significant disruption between 10:15 and 19:45 local time (10:15 - 19:45 UTC).</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>According to a <a href="https://www.business-standard.com/world-news/no-govt-instructions-to-block-internet-during-polls-pakistan-telecom-body-124020800226_1.html">published report</a>, The Pakistan Telecommunication Authority (PTA) said that Internet services would remain available as citizens went to the polls on February 8 to elect a new government. However, on that day, <a href="https://therecord.media/pakistan-cuts-internet-as-voters-head-to-polls">Pakistani authorities cut mobile Internet access</a> across the country as the nation’s voters went to cast their ballots, with the authorities <a href="https://therecord.media/pakistan-cuts-internet-as-voters-head-to-polls">attributing the move</a> "to maintain law and order" in the wake of the violence that occurred the previous day. The impact of the ordered shutdown was visible across multiple Internet providers in <a href="https://radar.cloudflare.com/pk">Pakistan</a>, including <a href="https://radar.cloudflare.com/traffic/as59257?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS59257 (Zong/CMPak)</a>, <a href="https://radar.cloudflare.com/traffic/as24499?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS24499 (Telenor Pakistan)</a>, and <a href="https://radar.cloudflare.com/traffic/as45669?dateStart=2024-02-08&amp;dateEnd=2024-02-09">AS45669 (Jazz/Mobilink)</a>, lasting from 07:00 until 20:00 (02:00 - 15:00 UTC), with traffic returning to expected levels approximately nine hours later. A <a href="https://pulse.internetsociety.org/blog/pakistan-elections-2024-the-unexpected-cost-of-mobile-service-disruptions">post on the Internet Society’s Pulse blog</a> estimated that the shutdown cost Pakistan nearly USD $18.5M in lost Gross Domestic Product.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>Several Internet disruptions were observed in <a href="https://radar.cloudflare.com/td">Chad</a> between February 28 and March 7. The first one started at 10:45 local time on February 28 and lasted until 18:00 local time on March 1 (09:45 on February 28 - 17:00 on March 1). Shorter disruptions lasting just a few hours each were also observed on March 3, 4, and 7. The apparent shutdowns came in the <a href="https://www.aljazeera.com/news/2024/2/28/chad-announces-several-deaths-after-foiled-intelligence-office-attack">wake of political violence</a> in the country. Notable drops in announced IPv4 address space aggregated across networks in the country were observed coincident with the February 28, March 3, and March 4 shutdowns, although it isn’t clear why a similar drop did not occur on March 7.</p><h2>Power outages</h2>
    <div>
      <h3>Tajikistan</h3>
      <a href="#tajikistan">
        
      </a>
    </div>
    <p>According to a <a href="https://eurasianet.org/swathes-of-tajikistan-crippled-by-unexplained-power-outage">published report</a>, a widespread multi-hour power outage occurred in <a href="https://radar.cloudflare.com/tj">Tajikistan</a> on March 1, possibly related to increased electricity usage by electric heaters as temperatures across the country neared freezing. The outage began around 11:00 local time (06:00 UTC), and lasted for approximately three hours. The impact on Internet traffic from the country is visible in the graph below. Although power was restored around 14:00 local time (09:00 UTC), Internet traffic did not return to expected levels until around 05:00 local time the next day (midnight UTC on March 2).</p><p>Although power outages most often have the biggest impact on Internet traffic, as computers and home/office routers shut down, this outage also appeared to impact network infrastructure within the country, as the aggregate volume of announced IPv4 address space across the country dipped slightly when the power was out.</p>
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p>On March 4, the <a href="https://www.tanesco.co.tz">Tanzania Electricity Corporation (TANESCO)</a> <a href="https://twitter.com/tanescoyetutz/status/1764632209409949938">posted a notice on social media</a> regarding an ongoing power outage. It stated (translated) “<i>The Tanzania Electricity Corporation (TANESCO) has notified the public that there has been an error in the National Grid system, resulting in a lack of electricity service in some areas of the country including Zanzibar. Our experts are continuing their efforts to ensure that the electricity service returns to its normal state. The organization apologizes for any inconvenience caused.</i>” The power outage disrupted Internet connectivity in <a href="https://radar.cloudflare.com/tz">Tanzania</a>, causing an observed drop in traffic between 13:30 and 23:00 local time (10:30 - 20:00 UTC).</p><h3>Orange España<p>Network <a href="https://www.cloudflare.com/learning/network-layer/what-is-routing/">routing</a> is the process of selecting a path across one or more networks, and on the Internet, routing relies on the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">Border Gateway Protocol (BGP)</a>. Historically, the exchange of BGP routing information was based on trust between providers, but over time, security mechanisms such as <a href="/rpki/">Resource Public Key Infrastructure (RPKI)</a> have been developed to prevent abuse of the system by bad actors. RPKI is a cryptographic method of signing records that associate a BGP route announcement with the correct originating AS number. ROA (Route Origin Authorization) records provide a means of verifying that an IP address block holder has authorized an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">AS (Autonomous System)</a> to originate routes to that one or more prefixes within the address block. Cloudflare has <a href="/tag/rpki">published a number of blog posts</a> over the years about the importance of, and our support for, RPKI. Properly implemented and configured, RPKI and ROAs help support routing security, effectively preventing behavior like <a href="https://www.cloudflare.com/learning/security/glossary/bgp-hijacking/">BGP hijacking</a>.</p><p>The <a href="https://www.ripe.net/">RIPE NCC</a> (“RIPE”) is one of five <a href="https://en.wikipedia.org/wiki/Regional_Internet_registry">Regional Internet Registries (RIRs)</a> that provides Internet resource allocation and registration, and coordination activities. RIPE’s region covers Europe, the Middle East, and Central Asia. On January 3, a malicious actor took advantage of lax account security on the part of RIPE and <a href="https://radar.cloudflare.com/as12479">AS12479 (Orange España)</a> and <a href="https://blog.benjojo.co.uk/post/rpki-signed-but-not-secure">used credentials found on the public Internet</a> to log into Orange España’s RIPE account. Once in control of the account, the attacker published multiple ROAs with “bogus” origins, rendering thousands of routes originated by AS12479 “RPKI-invalid”, which <a href="https://www.kentik.com/blog/digging-into-the-orange-espana-hack/">resulted in carriers that reject RPKI-invalid routes to stop carrying a large amount of Orange España’s IP space</a>.</p><p>Because Cloudflare enforces RPKI validation, we also rejected the RPKI-invalid routes. We would have started trying to reach Orange España over our default route toward some of our transit providers, but because they also perform RPKI validation, traffic would have been dropped within those provider networks as well. Because of this, from Cloudflare’s perspective, this incident caused a drop in traffic from Orange España between 16:45 and 19:45 local time (14:45 - 17:45 UTC) as well as a <a href="https://radar.cloudflare.com/routing/as12479?dateStart=2024-01-03&amp;dateEnd=2024-01-03">notable drop in announced IPv4 address space from AS12479</a>.</p><p>Orange España <a href="https://twitter.com/orange_es/status/1742616775647265035">confirmed on social media</a> that its RIPE account had been improperly accessed, and as a result of the incident, <a href="https://www.ripe.net/publications/news/mandatory-2fa-on-ripe-ncc-access-accounts/">RIPE has made two-factor authentication (2FA) mandatory</a> for logins. For additional insights into the incident, <a href="https://www.kentik.com/blog/digging-into-the-orange-espana-hack/">Doug Madory at Kentik</a> and <a href="https://blog.benjojo.co.uk/post/rpki-signed-but-not-secure">Ben Cartwright-Cox at bgp.tools</a> have both published detailed analyses and timelines.</p>
    <div>
      <h3>MaxNet (Ukraine)</h3>
      <a href="#maxnet-ukraine">
        
      </a>
    </div>
    <p>On January 11, subscribers of <a href="https://radar.cloudflare.com/as34700">AS34700 (MaxNet)</a> in <a href="https://radar.cloudflare.com/ua">Ukraine</a> experienced a nine-hour Internet outage. Initial traffic loss occurred around 16:00 local time (14:00 UTC), and recovered around 01:00 local time on January 12 (23:00 UTC on January 11). An initial <a href="https://www.facebook.com/maxnetua/posts/pfbid0Y3chUrPemhcBgEhFERwEWi6muqzUeoSkas4M8EgiFpwT3Jkgy5M3jUh6wknHJan2l">social media post</a> from the provider explained the reason for the outage, noting (translated) “<i>Dear subscribers! Due to the flooding of one of the hub sites due to a utility malfunction, some areas of the city may be without services, partially or completely. We are doing our best to restore services, but it takes time. Further information regarding the opening times will be published as soon as the emergency works have been completed.</i>” A <a href="https://www.facebook.com/maxnetua/posts/pfbid012Nymu8ft9NPFi9fkQHrd9zGHb8un69ceECVXw72irJbBAkB3TXBRju1YqRSzSbLl">subsequent post</a> informed subscribers that Internet connectivity had been restored. The flooding apparently impacted core routing infrastructure as well, as the <a href="https://radar.cloudflare.com/routing/as34700?dateStart=2024-01-11&amp;dateEnd=2024-01-12">volume of IPv4 address space announced by MaxNet</a> also fell to zero between 16:00 and 22:00 local time (14:00 - 20:00 UTC).</p><h3>Plusnet (United Kingdom)</h3><p>A traffic disruption observed on <a href="https://radar.cloudflare.com/as6871">AS6871 (Plusnet)</a> in the <a href="https://radar.cloudflare.com/gb">United Kingdom</a> on January 15 was initially <a href="https://twitter.com/Plusnet/status/1746939378428006549">characterized as a “mass outage”</a> by the provider in replies to customer complaints on social media. However, the underlying cause of the disruption turned out to be significantly less sensational – it was apparently <a href="https://www.ispreview.co.uk/index.php/2024/01/broadband-isp-plusnet-recovers-from-dns-linked-mass-outage.html">linked to problems with their DNS servers</a>. Because subscribers were unable to successfully resolve hostnames using Plusnet’s default DNS resolvers, this ultimately manifested itself as a drop in traffic from the network for approximately two hours, between 16:00 and 18:00 local time (and UTC). Users that had configured their systems to use a third-party DNS resolver, such as <a href="https://one.one.one.one/dns/">Cloudflare’s 1.1.1.1 service</a>, did not experience a service disruption.</p><h3>Russia</h3><p><a href="https://www.cloudflare.com/learning/dns/common-dns-issues/">DNS issues</a> also impacted users in Russia during January, though in a different way than Plusnet subscribers in the UK experienced. A <a href="https://circleid.com/posts/20240130-dnssec-failure-causes-massive-website-outages-on-russian-internet">reported</a> <a href="https://www.cloudflare.com/dns/dnssec/how-dnssec-works/">DNSSEC</a> failure on January 30 resulted in .ru domains becoming inaccessible for several hours. (DNSSEC creates a secure domain name system by adding cryptographic signatures to existing DNS records. By checking its associated signature, you can verify that a requested DNS record comes from its authoritative name server and wasn’t altered en-route, as opposed to a fake record injected in a man-in-the-middle attack.)</p><p>The <a href="https://datatracker.ietf.org/doc/html/rfc8914#name-extended-dns-error-code-6-d">DNSSEC validation failure</a> resulted in <a href="/unwrap-the-servfail">SERVFAIL</a> responses to DNS lookups against Cloudflare’s 1.1.1.1 resolver for hostnames in the .ru country code top level domain (ccTLD). At peak, 68.4% of requests received SERVFAIL responses. The Coordination Center for the .ru ccTLD <a href="https://t.me/fontankaspb/51445">confirmed</a> that it was working on the “technical problem affecting the .ru zone associated with the global DNSSEC infrastructure” but didn’t provide any additional details around the root cause of the problem, such as a potential issue with a DNSSEC key rollover. The .ru ccTLD experienced a <a href="https://ianix.com/pub/dnssec-outages/20190816-ru/">similar DNSSEC-related outage</a> for several hours on August 16, 2019, as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4o14ywdQmVwPQqLccSR9ov/8181788b95cf51f492820977417be76a/Jan-30---Russia---ru-DNSSEC.png" />
            
            </figure>
    <div>
      <h3>AT&amp;T (United States)</h3>
      <a href="#at-t-united-states">
        
      </a>
    </div>
    <p>Starting just before 04:00 Eastern / 03:00 Central (09:00 UTC) on February 22, AT&amp;T subscribers in several cities across the United States <a href="https://abcnews.go.com/US/att-outage-impacting-us-customers-company/story?id=107440297">experienced mobile service interruptions</a>. Impacted cities included Atlanta, Houston, and Chicago, with connectivity disrupted for approximately eight hours. Cloudflare data showed that as the problem began, <a href="https://radar.cloudflare.com/as7018">AT&amp;T (AS7018)</a> traffic <a href="https://twitter.com/CloudflareRadar/status/1760694610689442114">dropped as much as 45% in Chicago and 18% in Dallas</a>, as compared with the previous week.</p><p>According to a <a href="https://web.archive.org/web/20240223235440/https://about.att.com/pages/network-update">“network update” published by AT&amp;T</a>, “<i>Based on our initial review, we believe that today’s outage was caused by the application and execution of an incorrect process used as we were expanding our network, not a cyber attack.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kg2gdTuPBJ1MPirymlvfG/bd816a37733a151f434d33354b9fd81b/pasted-image-0-4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3drORCJTXNtO7IrJMUrjog/4dbc2cc56bdf6581205d03c7475dee16/pasted-image-0--1--2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tTYc2dO4kHkZR4wvUlIzy/466bf1559696466e91072e4f00faa603/pasted-image-0--2--2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7BwYMWXW6hGIzZTUIVmBht/6ea7e5bd4093a3b9171b159ff19c7f47/pasted-image-0--3--1.png" />
            
            </figure><h2>Maintenance</h2>
    <div>
      <h3>Vodafone Egypt</h3>
      <a href="#vodafone-egypt">
        
      </a>
    </div>
    <p>Between 05:15 and 11:30 local time (03:15 - 09:30 UTC) on March 5, customers of <a href="https://radar.cloudflare.com/as36935">AS36935 (Vodafone Egypt)</a> experienced disruptions to their mobile Internet connectivity, with observed traffic from the network <a href="https://twitter.com/CloudflareRadar/status/1764951344954122467">dropping as much as 70% below expected levels</a>. A (translated) <a href="https://twitter.com/VodafoneEgypt/status/1764947072376074428">social media post</a> from the provider noted in part “<i>We apologize that some areas are currently affected by difficulties in operating the 4G service due to updates that took place this morning.</i>” <a href="https://www.africanwirelesscomms.com/news-details?itemid=7392&amp;post=vodafone-egypt-sees-205-million-egp-fine-509046">As a result of the 4G network outage</a>, Vodafone was required to compensate affected customers, and was also fined by <a href="https://www.tra.gov.eg/en/">Egypt's National Telecommunications Regulatory Authority</a> (NTRA).</p>
    <div>
      <h3>Ocean Wave Communication (Myanmar)</h3>
      <a href="#ocean-wave-communication-myanmar">
        
      </a>
    </div>
    <p>Just before noon local time (05:15 UTC) on March 12, a significant drop in traffic was observed on <a href="https://radar.cloudflare.com/as136442">AS136442 (Ocean Wave)</a>, a consumer fiber and business Internet service provider in <a href="https://radar.cloudflare.com/mm">Myanmar</a>. A (translated) social media post from the provider noted “<i>Ocean Wave customers, please be informed that there will be no internet/ slow connection due to network maintenance.</i>” The connectivity disruption lasted approximately seven hours, with traffic returning to typical levels just before 19:00 local time (12:15 UTC).</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Two notable submarine cable damage events during the first quarter again highlighted the importance of protecting submarine cables, and the risks associated with them passing through/near geopolitically sensitive areas. Given the <a href="https://blog.telegeography.com/2023-mythbusting-part-3">reliance on submarine cables for carrying Internet traffic</a>, this will continue to be an issue for many years to come.</p><p>The Orange España incident also shed light on the importance of securing operationally important resources with <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication</a>, a topic that Cloudflare has <a href="/how-cloudflare-implemented-fido2-and-zero-trust">written about in the past</a>. Organizations like RIPE play a critically important behind-the-scenes role in functioning of the Internet, arguably obligating them to take all practical precautions when it comes to securing their systems in order to prevent malicious actors from taking actions that could broadly disrupt Internet connectivity.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a>, via social media, and in posts on <a href="/tag/cloudflare-radar/">blog.cloudflare.com</a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via <a>email</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p></h3> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">48Rzo73JqvkA5I3YzT2Coi</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q4 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q4-2023-internet-disruption-summary/</link>
            <pubDate>Mon, 22 Jan 2024 14:00:27 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the fourth quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/46eFEiFp8AtgmQcdps6Inx/29327b0a230c82cce34efc2118a2d974/image48-1.png" />
            
            </figure><p>Cloudflare’s network spans more than 310 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>During previous quarters, we tracked a number of government directed Internet shutdowns in Iraq, intended to prevent cheating on academic exams. We expected to do so again during the fourth quarter, but there turned out to be no need to, as <a href="#governmentdirected">discussed below</a>. While we didn’t see that set of expected shutdowns, we did observe a number of other Internet outages and disruptions due to a number of commonly seen causes, including <a href="#fibercabletrouble">fiber/cable issues</a>, <a href="#poweroutages">power outages</a>, extreme <a href="#weather">weather</a>, infrastructure <a href="#maintenance">maintenance</a>, general <a href="#technicalproblems">technical problems</a>, <a href="#cyberattacks">cyberattacks</a>, and unfortunately, <a href="#militaryaction">military action</a>. As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2>Government directed</h2>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In a slight departure from the usual subject of this blog post, this time we lead off with coverage of government directed Internet shutdowns that didn’t happen. <a href="https://radar.cloudflare.com/iq">Iraq</a> has been a frequent subject of this series of posts, as they have historically implemented daily multi-hour Internet shutdowns during exam periods, intended to prevent cheating. Earlier this year, there was some hope that this practice might be ending, and in our <a href="/q2-2023-internet-disruption-summary/">Q2 2023 Internet disruption summary</a> post, we noted “<i>In the weeks prior to the start of this year’s shutdowns, it was </i><a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams"><i>reported</i></a><i> that the Iraqi Ministry of Communications had announced it had refused a request from the Ministry of Education to impose an Internet shutdown during the exams as part of efforts to prevent cheating. Unfortunately, this refusal was short-lived, with shutdowns ultimately starting two weeks later.</i>” In addition to these second quarter shutdowns, they also occurred during the third quarter across multiple weeks in July, August, and September.</p><p>During the fourth quarter, the third round of 12th grade high school final exams was scheduled to begin on November 13 and end on November 21, taking place at 13:00 local time, as shown in the schedule below, which was <a href="https://www.facebook.com/photo.php?fbid=661695112830032&amp;set=pb.100069686486016.-2207520000&amp;type=3">published</a> on the Iraqi Ministry of Education’s Facebook page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EU7icSaMHzAeCVQs5Bitq/c0ad971a6ceeadb81a4d5a94900ab133/image53.png" />
            
            </figure><p>November 2023 exam schedule in Iraq</p><p>However, in looking at Internet traffic for Iraq during that period, it appears that the nationwide Internet shutdowns that would have normally taken place did not occur, as the graph shows a very consistent diurnal pattern with no evidence of disruptions to Internet connectivity like we have seen in the past. Additionally, other <a href="https://twitter.com/accessnow">civil society groups</a>, <a href="https://twitter.com/IODA_live">academic researchers</a>, and <a href="https://twitter.com/dougmadory">Internet analysts</a> that also monitor these shutdowns did not report seeing any related drops in traffic. It is unclear whether a request for shutdowns was submitted by the Ministry of Education and again refused by the Ministry of Communications, or if no request was ever submitted for this round of exams. Regardless, we hope that Iraq continues to keep the Internet connected during future rounds of exams.</p><h2>Military action</h2>
    <div>
      <h3>Palestine</h3>
      <a href="#palestine">
        
      </a>
    </div>
    <p>On Saturday, October 7, 2023, attacks from the Palestinian group Hamas launched from the Gaza Strip against the south of Israel started a new <a href="https://en.wikipedia.org/wiki/October_2023_Gaza%E2%88%92Israel_conflict">conflict</a> in the region, with Israel <a href="https://apnews.com/live/israel-hamas-war-live-updates#0000018b-0f83-d2a1-a1df-8fcb0a320000">officially declaring</a> the next day that it was at war. This had an almost immediate impact on Internet traffic in both <a href="https://radar.cloudflare.com/il">Israel</a> and <a href="https://radar.cloudflare.com/ps">Palestine</a>, with traffic in the former showing ~170% growth as compared to the prior week, and ~100% growth in the latter as compared to the previous week. These trends are discussed in our October 9 blog post, <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><i>Internet traffic patterns in Israel and Palestine following the October 2023 attacks</i></a>.</p><p>However, in the hours and days following the initial attacks, a number of Palestinian Internet providers saw traffic fall significantly, with many winding up largely or totally offline, potentially as a result of power outages caused by <a href="https://apnews.com/article/israel-palestinians-gaza-hamas-rockets-airstrikes-tel-aviv-11fb98655c256d54ecb5329284fc37d2">retaliatory Israeli airstrikes</a>. Impacted networks included <a href="https://radar.cloudflare.com/as42314">AS42314 (fusion)</a>, <a href="https://radar.cloudflare.com/as203905">AS203905 (DCC_North_ASN)</a>, <a href="https://radar.cloudflare.com/as210974">AS210974 (AjyalFI)</a>, <a href="https://radar.cloudflare.com/as60268">AS60268 (DIGITAL-COMMUNICATION-PALESTINE-ASN)</a>, <a href="https://radar.cloudflare.com/as60353">AS60353 (DCC_RAFAH_ASN)</a>, <a href="https://radar.cloudflare.com/as62027">AS62027 (DCC_Khanyouns_ASN)</a>, <a href="https://radar.cloudflare.com/as57704">AS57704 (SPEED-CLICK-LTD)</a>, <a href="https://radar.cloudflare.com/as199046">AS199046 (JETNET)</a>, and <a href="https://radar.cloudflare.com/as213207">AS213207 (TechHub-HiNet)</a>, as shown in the graphs below.</p><p>In addition to the outages illustrated above, throughout October, November, and December, <a href="https://www.paltel.ps/en/home">Paltel (Palestine Telecommunications Company)</a> posted a number of times on <a href="https://twitter.com/Paltelco">its official X account</a> about disruptions to its landline, mobile, and Internet services, citing causes including <a href="https://twitter.com/Paltelco/status/1718007432494911717">fiber damage due to bombardment</a> and <a href="https://twitter.com/Paltelco/status/1724727009673101574">fuel depletion</a>. Posts were made on <a href="https://twitter.com/Paltelco/status/1718007432494911717">October 27</a>, <a href="https://twitter.com/Paltelco/status/1719529153471320550">October 31</a>, <a href="https://twitter.com/Paltelco/status/1725159705796821048">November 16</a>, <a href="https://twitter.com/Paltelco/status/1731740390691066263">December 4</a>, <a href="https://twitter.com/Paltelco/status/1735324896677216391">December 14</a>, <a href="https://twitter.com/Paltelco/status/1737380988064272472">December 20</a>, and <a href="https://twitter.com/Paltelco/status/1739668361837936669">December 26</a>. The associated outages varied in length, some lasting for hours, while others lasted for multiple days — each outage is shaded in the graphs below, which show Paltel traffic within four Palestinian governorates in the Gaza Strip region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GIWlojCibbJx9f1t7GKxe/67ca726673664f4da6f3386ef857770a/Dec---Oct---Palestine---Gaza.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LgG6g0LuUPd6eV7OjXRvz/7de10b9e30e86312b6e9df9a122c1dd0/Dec---Oct---Palestine---Rafah.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LPxqCpcM3KKwRdBICyTFu/57ef31df6cdbb2cc16de4443629ec8c0/Dec---Oct---Palestine---Khan-Yunis.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7o0kLqhbSeHw2XEtJJiBUv/375182eeb397c52cf94ce3217bcdd260/Dec---Oct---Palestine---Deir-al-Balah.png" />
            
            </figure><h2>Fiber/cable trouble</h2>
    <div>
      <h3>Namibia</h3>
      <a href="#namibia">
        
      </a>
    </div>
    <p>On November 13, <a href="https://radar.cloudflare.com/as36996">Telecom Namibia (AS36996)</a> <a href="https://twitter.com/TelecomNamibia/status/1723311216850796563">reported</a> that it was experiencing interruptions to its fixed voice and data services in several areas, resulting from cable theft. The impact of these interruptions is shown in the figure below, with Internet traffic disrupted between 13:45 local time (11:45 UTC) on November 13 and 08:30 local time (06:30 UTC) on November 14. The disruption to connectivity due to cable theft was not an isolated incident, as the provider posted several additional notices on its <a href="https://twitter.com/TelecomNamibia">social media accounts</a> in November and December about similar occurrences.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>A day later, on November 14, <a href="https://radar.cloudflare.com/as27725">ETECSA (AS27725)</a> <a href="https://twitter.com/ETECSA_Cuba/status/1724442186282909760">posted</a> a notice about a terrestrial fiber cut that disrupted Internet services. As the state-owned telecommunications provider in <a href="https://radar.cloudflare.com/cu">Cuba</a>, the cut impacted Internet traffic nationwide, as well as at a network level, as seen in the graphs below. The disruption was relatively short-lived, occurring between 06:30 - 08:15 local time (11:30 - 13:15 UTC), with a <a href="https://twitter.com/ETECSA_Cuba/status/1724499677041594801">follow-up post</a> announcing the re-establishment of Internet service.</p>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>On December 7 &amp; 8, a near-complete outage observed in <a href="https://radar.cloudflare.com/td">Chad</a> was <a href="https://www.msn.com/fr-xl/actualite/other/tchad-connexion-internet-r%C3%A9tablie-apr%C3%A8s-des-heures-de-coupure/ar-AA1lcaMM">reportedly</a> due to fiber optic cable cuts in neighboring countries. A published article cited <a href="https://radar.cloudflare.com/as328594">SudaChad</a> as claiming that the outage seen in the graphs below was due to an issue with CAMTEL, a <a href="https://www.camertoday.com/camtel-and-sudachad-assess-relationship-pledge-further-commitment-for-better-results/">Cameroonian partner</a>. It also cites <a href="https://moovafrica.td/">Moov Africa’s (formerly known as Millicom Chad)</a> <a href="https://www.facebook.com/moovafrica.td/posts/pfbid0V63Pse2WEMqB5FsdkzAwwJppZLjwJry9MeYV8jUZZUNJZqu9WFG6fQfAURbMKop2l">apology</a> to customers, which points at “<i>the fiber-optic cut in Cameroon and Sudan</i>'' as the root cause. Since simultaneous cuts in fiber optic cables in Chad’s two neighboring countries would certainly be an unusual occurrence, it isn’t clear if such an event happened, though <a href="https://radar.cloudflare.com/routing/as328594">routing data for SudaChad</a> shows that the network’s two upstream providers are <a href="https://radar.cloudflare.com/routing/as15706">AS15706 (Sudatel)</a> in <a href="https://radar.cloudflare.com/sd">Sudan</a> and <a href="https://radar.cloudflare.com/routing/as15964">AS15964 (CAMNET)</a> in <a href="https://radar.cloudflare.com/cm">Cameroon</a>. The three providers are also partners on the <a href="https://www.capacitymedia.com/article/29ysrmpai1ti3q95wj474/news/african-three-partner-on-cameroon-chad-sudan-terrestrial-upgrade">WE-AFRICA-NA terrestrial cable</a>, which stretches from Port-Sudan on the Red Sea in Sudan to Kribi on the Atlantic Ocean in Cameroon via Chad, but it isn’t known whether that cable system was involved in this outage.</p><p>The disruption lasted approximately fourteen hours, from 20:00 local time on December 7 until 10:15 local time on December 8 (19:00 UTC on December 7 until 09:15 UTC on December 8), with the impact visible country-wide, as well as at SudaChad and several downstream network providers.</p><h2>Cyberattacks</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Ukrainian Internet provider Kyivstar <a href="https://twitter.com/TwiyKyivstar/status/1734527519972298888">announced</a> on the morning of December 12 that they were the “target of a powerful hacker attack”. They noted that the attack caused a “technical failure” that resulted in mobile communication and Internet access becoming temporarily unavailable. Although <a href="https://radar.cloudflare.com/as15895">Kyivstar</a> has been targeted by around <a href="https://www.barrons.com/news/ukraine-s-main-phone-operator-recovering-two-days-after-cyberattack-41ba9ee3">500 cyberattacks</a> since Russia launched its invasion of Ukraine in February 2022, this was <a href="https://www.reuters.com/technology/cybersecurity/ukraines-kyivstar-restores-services-after-cyberattack-parent-veon-says-2023-12-19/">reportedly</a> the largest attack to date. A <a href="https://therecord.media/russians-infiltrated-kyivstar-months-before">subsequent report</a> referenced an interview with Illia Vitiuk, the head of the cybersecurity department at Ukraine’s security service (SBU), in which he claimed that “<i>the hackers attempted to penetrate Kyivstar in March 2023 or earlier, managed to get into the system at least as early as May, and likely gained full access to the network in November.</i>”</p><p>Recovery took several days, with Kyivstar <a href="https://twitter.com/TwiyKyivstar/status/1735732558783033831">posting</a> on December 15 that “the Internet is everywhere” but warning that connection speeds might be slightly reduced. These posts align with the traffic disruption shown in the figure below, which lasted from 06:30 local time (04:30 UTC) on December 12 until 14:00 local time (12:00 UTC) on December 15.</p><h2>Power outages</h2>
    <div>
      <h3>Brunei</h3>
      <a href="#brunei">
        
      </a>
    </div>
    <p>A major <a href="https://borneobulletin.com.bn/key-services-affected-by-power-outage/">power outage</a> in <a href="https://radar.cloudflare.com/bn">Brunei</a> on October 17 disrupted key services including mobile and fixed Internet connectivity. Starting around 11:30 local time (03:30 UTC), traffic was disrupted for approximately 13 hours, recovering to expected levels around just after midnight local time on October 18 (16:45 UTC). Two <a href="http://www.unn.com.bn/">Unified National Networks</a> <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous systems</a> (<a href="https://radar.cloudflare.com/as10094">AS10094</a> and <a href="https://radar.cloudflare.com/as131467">AS131467</a>) saw lower traffic volumes during the power outage.</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>A widespread power outage in <a href="https://radar.cloudflare.com/ke">Kenya</a> on November 11 disrupted Internet connectivity across the county for approximately seven hours. An X <a href="https://twitter.com/KenyaPower_Care/status/1723395753173750170">post from Kenya Power</a> at 20:30 local time (17:30 UTC) reported a partial power outage, stating “<i>We have lost power supply to parts of the country. Our engineers are working to restore supply to the affected areas.</i>” Kenya Power kept customers informed of progress, posting updates at <a href="https://twitter.com/KenyaPower_Care/status/1723419016805392777">22:00</a>, <a href="https://twitter.com/KenyaPower_Care/status/1723447354869596441">23:57</a>, and the <a href="https://twitter.com/KenyaPower_Care/status/1723499883921826270">morning of November 12</a>, with the final update reporting “<i>We have successfully restored normal power supply in all the areas that were affected by the partial outage.</i>”</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>On November 14, a <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02zDjsA6PNXrJbvNRnbPsCqmYp1ZkyeQ76T8Wm5ppW6Nw34uWnHgPjFD4H7F1Lp2Cdl?comment_id=653239830306646&amp;__cft__[0]=AZWpmwt39YsibkYuAxOzfgXMMpqxQJmoMRw7wP4MoF1xoeyjXm7zTBb7a5qZDlQVSdPRy3aRUqWXPtlZXp3ixvLhXibRz0e5Q-hUCyOh7OEaWxAUQIRXC66H0Vu4UoyAk-ovL89HVTjCLy9PxQ_TebGFwR3i8z5LuynvWizmPlFajA&amp;__tn__=R]-R">Facebook post from Aqualectra</a>, the water and power company in <a href="https://radar.cloudflare.com/cw">Curaçao</a>, stated in part, “<i>Around 14:00 this afternoon, a blackout occurred. Preliminary investigation indicates that one of the main cables responsible for transporting electricity between the substations at Nijlweg and Weis experienced a short circuit. It is important to emphasize that this is not due to a lack of production capacity.</i>” The power outage resulted in a near complete loss of traffic at <a href="https://radar.cloudflare.com/traffic/as52233">Flow Curaçao (AS52233)</a>, with significant disruptions also visible at <a href="https://radar.cloudflare.com/traffic/as11081">United Telecommunication Services (AS11081)</a> and at a country level, as seen in the graphs below. The disruption lasted eight hours, from 14:00 until 22:00 local time (18:00 UTC on November 14 until 02:00 UTC on November 15).</p>
    <div>
      <h3>Sri Lanka</h3>
      <a href="#sri-lanka">
        
      </a>
    </div>
    <p>After stabilizing its electrical infrastructure in the wake of 2022’s problems with its electrical power grid, <a href="https://apnews.com/article/sri-lanka-crisis-power-outage-imf-ff6c24554d5dcf74160f11740148e3ee">the failure of a main transmission line</a> caused an island-wide power outage in <a href="https://radar.cloudflare.com/lk">Sri Lanka</a> on December 9, in turn disrupting Internet connectivity. Traffic from the island nation initially dropped by around 50% starting around 16:45 local time (11:15 UTC). <a href="https://www.adaderana.lk/news.php?nid=95513">Repairs took several hours</a>, with the country’s Internet traffic returning to expected levels around 01:00 local time on December 10 (19:30 UTC).</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>On the morning of December 24, Panamanian electric distribution company <a href="https://www.ensa.com.pa/">ENSA</a> <a href="https://twitter.com/ENSApanama/status/1738947871146123372">initially reported</a> an event that affected electrical services to their customers. A <a href="https://twitter.com/ENSApanama/status/1738954995179848162">subsequent report</a> posted just 30 minutes later provided additional details, pointing to an incident in the “National Interconnected System” that affected the electrical supply in a number of areas, but <a href="https://twitter.com/ENSApanama/status/1738987254234640746">within an hour</a>, it had spread nationally. Although the initial regional power issues did not have a noticeable impact on <a href="https://radar.cloudflare.com/pa">Panama’s</a> Internet traffic, the loss of traffic in the graph below aligns with the national growth of the power outage, occurring at 11:45 local time (16:45 UTC). Traffic returned to expected levels at around 15:00 local time (20:00 UTC), aligning with an <a href="https://twitter.com/ENSApanama/status/1739027796733681703">X post from ENSA</a> stating that “<i>At 3:12pm the supply of electrical energy to all our clients has been normalized after an event at the Transmission level originating in the Panama 1 Substation of ETESA.</i>”</p><h2>Weather</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Internet disruptions in <a href="https://radar.cloudflare.com/ua">Ukraine</a> due to the conflict there have been covered in <a href="/searchresults#q=%22internet%20disruption%22%20ukraine&amp;sort=date%20descending">multiple quarterly Internet disruption summary blog posts</a> over the last two years. However, in November, connectivity in multiple areas of the country was disrupted by power outages caused by a major winter storm. Snow and high winds <a href="https://www.reuters.com/world/europe/winter-storm-causes-power-outages-road-closures-ukraine-2023-11-27/">knocked out power</a> to hundreds of towns and villages, damaging electrical power infrastructure. The impact is visible in the graphs below as a drop in traffic occurring around 01:00 local time on November 27 (23:00 UTC on November 26), observed in regions including Donetsk, Kherson Oblast, and Luhansk. Traffic appeared to return to expected levels early in the morning local time on November 28.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vH3c3G46L4nD6EEOVklAi/87fc0dcba92a7fa097628c30eb34b881/pasted-image-0-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vblMILsQHpP7QejIiK4We/ddf24b10384fe004ccbbfa3ecd9a0ab7/pasted-image-0--1--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Uwzflw7gJFzYm1mxJ6zIL/2d20c3b393a74618da8ef1c5589bd314/pasted-image-0--2--1.png" />
            
            </figure>
    <div>
      <h3>Mexico</h3>
      <a href="#mexico">
        
      </a>
    </div>
    <p>On October 25, <a href="https://en.wikipedia.org/wiki/Hurricane_Otis">Hurricane Otis</a> made landfall near Acapulco, a popular tourist destination in <a href="https://radar.cloudflare.com/mx">Mexico</a>. In addition to catastrophic structural damage, it was <a href="https://www.nesdis.noaa.gov/news/hurricane-otis-causes-catastrophic-damage-acapulco-mexico">reported</a> that “<i>more than 10,000 utility poles were destroyed, knocking out power and internet/communications across the region, while numerous transmission lines, electrical substations, and a power plant were also heavily damaged.</i>” This damage to electrical and communications infrastructure in the area resulted in significant disruption to Internet connectivity. As shown in the graph below, Internet traffic from Acapulco dropped by around 80% as Otis made landfall. Traffic started to show some growth in early November, but peak volumes remained relatively consistent, and well below pre-hurricane levels, through the end of the year. (Several large spikes are visible on December 26 &amp; 30, but it isn’t clear what those are associated with.) Although Acapulco’s tourism industry <a href="https://bnnbreaking.com/world/mexico/acapulcos-resilience-from-hurricane-devastation-to-holiday-destination/">experienced a notable recovery</a> heading into the end of the year, it appears that infrastructure recovery has not been quite as swift.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RqwYAx8KEBBCRS5ehEYxE/181a383c698b18180088758f09ed3228/pasted-image-0--3--1.png" />
            
            </figure>
    <div>
      <h2>Fire</h2>
      <a href="#fire">
        
      </a>
    </div>
    
    <div>
      <h3>Hawaii</h3>
      <a href="#hawaii">
        
      </a>
    </div>
    <p>Last quarter, we <a href="/q3-2023-internet-disruption-summary/#fire">reported</a> on the impact of wildfires that started on August 7 in Hawaii, including killing nearly 100 people, as well as destroying homes, businesses, and infrastructure, causing power outages and disrupting Internet connectivity. One of the most impacted areas was the town of Lahaina, where Internet connectivity remained sparse for weeks after the fires began. Repair and restoration efforts continued throughout the fourth quarter, with traffic clearly growing throughout October, with peak levels in November and December approaching pre-fire levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1n3qqN1BbwojGibaAVCslA/1a8d15204ed25e23706dc080578fed86/Dec-31---United-States---Hawaii---Lahaina.png" />
            
            </figure><h2>Maintenance</h2>
    <div>
      <h3>Yemen</h3>
      <a href="#yemen">
        
      </a>
    </div>
    <p>Two maintenance-related Internet disruptions impacted Internet connectivity in <a href="https://radar.cloudflare.com/ye">Yemen</a> in the fourth quarter. The first lasted over four hours during the morning of November 10, from 03:10 - 07:45 local time (00:10 - 04:45 UTC), and followed two other disruptions the prior day. The impact was visible at a country level, as well as at a network level on <a href="https://radar.cloudflare.com/as30873">PTC-YemenNet (AS30873)</a>.</p><p>An Associated Press <a href="https://apnews.com/article/yemen-internet-outage-israel-hamas-war-houthis-4255eccf371e558b7912ddcd94d706d7">article</a> noted that in a statement to the state news agency, Yemen’s Public Telecom Corp. (PTC-YemenNet) blamed the outage on maintenance, apparently of the <a href="https://www.submarinecablemap.com/submarine-cable/falcon">FALCON submarine cable</a>. The article also cited a <a href="https://subsea.gcxworld.com/clarification-yemen-internet-outage/">statement</a> from <a href="https://subsea.gcxworld.com/">GCX</a>, the operator of the FALCON cable, regarding scheduled maintenance to the cable system that had been in planning for the previous three months.</p><p>The second maintenance-related disruption occurred on December 15 just before 23:00 local time (20:00 UTC). An X <a href="https://twitter.com/AlnomeirMosfer/status/1735770808545423518">post from Mosfer Alnomeir</a>, the Minister of Telecommunication and Information Technology in Yemen, explained what happened: “<i>We note that half an hour ago there was an interruption in the Internet service that lasted approximately 30 minutes. This is while engineers carry out emergency replacement and upgrade work on some service equipment. Service was restored immediately. On behalf of the team, I say thank you for your understanding.</i>” Once again, the impact was visible at both a country and network level.</p><h2>Technical problems</h2>
    <div>
      <h3>Australia</h3>
      <a href="#australia">
        
      </a>
    </div>
    <p>"Changes to routing information" after a "routine software upgrade" were <a href="https://www.reuters.com/business/media-telecom/singtel-owned-optus-says-massive-australia-outage-was-after-software-upgrade-2023-11-13/">reportedly</a> responsible for a multi-hour Internet outage at Australian telecommunications provider <a href="https://radar.cloudflare.com/as4804">Optus (AS4804)</a> on November 8 local time. Connectivity began to drop just after 04:00 Sydney time, with the outage lasting from 04:30 - 10:00 Sydney time (17:30 - 23:00 UTC on November 7). Traffic didn’t fully recover to expected levels until around 23:00 Sydney time (12:00 UTC).</p><p>The network issue <a href="https://www.reuters.com/business/media-telecom/australia-investigate-optus-internet-phone-outage-2023-11-08/">impacted</a> more than 10 million customers, as well as hospitals and payment and transport systems, and drew comparisons to <a href="/cloudflares-view-of-the-rogers-communications-outage-in-canada">July 2023’s outage at Canadian provider Rogers Communications</a>. Optus <a href="https://www.aph.gov.au/DocumentStore.ashx?id=2ed95079-023d-49d5-87fd-d9029740629b&amp;subId=750333">submitted a report</a> to the Australian Senate Standing Committee on Environment and Communications that detailed the cause of the outage, noting “<i>It is now understood that the outage occurred due to approximately 90 PE routers automatically self-isolating in order to protect themselves from an overload of IP routing information. … This unexpected overload of IP routing information occurred after a software upgrade at one of the Singtel internet exchanges (known as STiX) in North America, one of Optus’ international networks. During the upgrade, the Optus network received changes in routing information from an alternate Singtel peering router. These routing changes were propagated through multiple layers of our IP Core network. As a result, at around 4:05am (AEDT), the pre-set safety limits on a significant number of Optus network routers were exceeded.</i>” The report also detailed the recovery efforts and timelines for consumer Internet, DNS, and mobile services.</p>
    <div>
      <h3>Armenia</h3>
      <a href="#armenia">
        
      </a>
    </div>
    <p><a href="https://www.facebook.com/telecomarmenia.am/posts/pfbid0KaB276aGQeDpsb2Q5fi9J3ybVdzPzqZ49aw1GyiHpAWCszXGEMntYLaitYBPPN8bl">Failure of international links</a> caused a brief Internet disruption at <a href="https://radar.cloudflare.com/as12297">Telecom Armenia (AS12297)</a> on November 11, similar to a <a href="https://tech.news.am/eng/news/317/internet-failures-in-armenia-due-to-outage-of-main-and-backup-communication-nodes-on-territory-of-georgia.html">disruption that occurred almost exactly a year earlier</a>. As shown in the graph below, the disruption began just around 15:15 local time (11:15 UTC), with short periods where traffic dropped to zero. Traffic recovered to expected levels by 21:00 local time (17:00 UTC). As one of the largest telecommunications providers in the country, the service disruption was visible at a country level as well.</p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>A sizable drop in traffic was observed between 15:00 and 21:30 local time (15:00 - 21:30 UTC) on mobile and broadband Internet provider <a href="https://radar.cloudflare.com/as206067">Three UK (AS206067)</a> on December 1, as seen in the graph below. Although the provider <a href="https://twitter.com/ThreeUK/status/1730600392029802858">acknowledged</a> that customers were experiencing issues and provided several updates (<a href="https://twitter.com/ThreeUK/status/1730698310611058926">1</a>, <a href="https://twitter.com/ThreeUK/status/1730891263837159762">2</a>, <a href="https://twitter.com/ThreeUK/status/1730909430449873229">3</a>, <a href="https://twitter.com/ThreeUK/status/1730983680196178156">4</a>) on service restoration over the next day, it never disclosed any additional information on the cause of the disruption. However, a <a href="https://www.datacenterdynamics.com/en/news/three-blames-network-outage-on-technical-issue-at-one-of-its-data-centers/">published report</a> stated that Three UK blamed technical issues at one of its data centers as the cause of the problem, which impacted more than 20,000 users.</p>
    <div>
      <h3>Egypt</h3>
      <a href="#egypt">
        
      </a>
    </div>
    <p>On December 5, <a href="https://radar.cloudflare.com/as8452">Telecom Egypt (AS8452)</a> <a href="https://twitter.com/telecomegypt/status/1732073702605410364">posted</a> on X that a technical malfunction affecting one of their main network devices was responsible for an Internet disruption that occurred on their network, which also impacted connectivity on several other network providers, including <a href="https://radar.cloudflare.com/as24863">LINKdotNET (AS24863)</a>, <a href="https://radar.cloudflare.com/as24835">Vodafone Egypt (AS24835)</a>, and <a href="https://radar.cloudflare.com/as36992">Etisalat (AS36992)</a>, as well as traffic at a national level, as seen in the graphs below. Although <a href="https://pub468.ayam.news/115707">one news report claimed</a> that the disruption, which occurred between 14:15 - 00:00 local time (12:15 - 22:00 UTC), was due to damage to the <a href="https://www.submarinecablemap.com/submarine-cable/flag-europe-asia-fea">FLAG</a> and <a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4">SeaMeWe-4</a> submarine cables, a <a href="https://twitter.com/telecomegypt/status/1732300454711755192">subsequent post from Telecom Egypt</a> about service restoration dispelled that claim, noting “<i>The company also confirms that there is no truth to what has been circulated on some social media sites about the presence of a break in one of the submarine cables.</i>”</p>
    <div>
      <h3>Tunisia</h3>
      <a href="#tunisia">
        
      </a>
    </div>
    <p>A <a href="https://twitter.com/Lechatquirit/status/1736366153855811657">reported DNS server outage</a> (albeit unconfirmed) at <a href="https://radar.cloudflare.com/tn">Tunisian</a> Internet provider <a href="https://radar.cloudflare.com/as37705">Topnet (AS37705)</a> caused a brief Internet disruption for the provider’s customers on December 17, also impacting traffic volumes at a national level. The incident lasted less than two hours, from 13:00 - 14:45 local time (12:00 - 13:45 UTC).</p>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p>An <a href="https://twitter.com/orangeguinee_gn/status/1738145903515517298">unspecified incident</a> on the <a href="https://radar.cloudflare.com/as37461">Orange Guinée (AS37461)</a> network impacted Internet connectivity, as well as telephone calls and text messages during the morning of December 22. The graph below shows a near-complete outage on the network between 09:15 - 11:30 local time (09:15 - 11:30 UTC). The provider <a href="https://twitter.com/orangeguinee_gn/status/1738181857324253552">posted a subsequent update</a> regarding the restoration of calls, text messages, and Internet connectivity.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Within the <a href="https://radar.cloudflare.com/year-in-review/2023#internet-outages">Cloudflare Radar 2023 Year in Review</a>, we highlighted over 180 major Internet disruptions that were observed year-to-date through the end of November, though the actual number was likely closer to 200 by the end of the year. While that may seem like a lot, it is worth nothing that the actual number is even higher, as these posts are not exhaustive in their coverage of such events. For example, while we covered the Internet shutdown in Manipur, India that took place across multiple months in 2023, <a href="https://internetshutdowns.in/">internetshutdowns.in</a> shows that over 90 more smaller localized shutdowns were put into place across the country.</p><p>In addition, 2024 is shaping up to be an important year for elections, with voting taking place in more than <a href="https://www.weforum.org/agenda/2023/12/2024-elections-around-world/">50 countries around the world</a>. Unfortunately, some countries have taken to implementing Internet shutdowns or otherwise disrupting Internet connectivity during elections. The <a href="https://freedomonlinecoalition.com/joint-statement-internet-shutdowns-and-elections/">Freedom Online Coalition’s Joint Statement on Internet Shutdowns and Elections</a> details the detrimental effects of such actions. The Cloudflare Radar team will be monitoring for election-related Internet shutdowns, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a>, via social media, and in posts on <a href="/tag/cloudflare-radar/">blog.cloudflare.com</a>.</p><p>Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via email.</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">3jPeETqqS2lSPcVevWFbub</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare 2023 Year in Review]]></title>
            <link>https://blog.cloudflare.com/radar-2023-year-in-review/</link>
            <pubDate>Tue, 12 Dec 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ The 2023 Cloudflare Radar Year in Review is our fourth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level... ]]></description>
            <content:encoded><![CDATA[ 
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ILhbBcWp2RUulssndzHyo/dd8ea2db68195931d087abc619ce2807/Hero.png" />
          </figure><p>The 2023 Cloudflare Radar Year in Review is our fourth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    
    <div>
      <h3><a href="https://blog.cloudflare.com/radar-2023-year-in-review#trafficinsights">Traffic Insights &amp; Trends</a></h3>
      <a href="#">
        
      </a>
    </div>
    <ul><li><p>Global Internet traffic grew 25%, in line with peak 2022 growth. Major holidays, severe weather, and intentional shutdowns clearly impacted Internet traffic. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#globaltraffic">🔗</a></p></li><li><p>Google was again the most popular general Internet service, with 2021 leader TikTok falling to fourth place. OpenAI was the most popular service in the emerging Generative AI category, and Binance remained the most popular Cryptocurrency service. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#googlepopular">🔗</a></p></li><li><p>Globally, over two-thirds of mobile device traffic was from Android devices. Android had a &gt;90% share of mobile device traffic in over 25 countries/regions; peak iOS mobile device traffic share was 66%. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#globalandroid">🔗</a></p></li><li><p>Global traffic from Starlink nearly tripled in 2023. After initiating service in Brazil in mid-2022, Starlink traffic from that country was up over 17x in 2023. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#globalstarlink">🔗</a></p></li><li><p>Google Analytics, React, and HubSpot were among the most popular technologies found on top websites. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#populartechnologies">🔗</a></p></li><li><p>Globally, nearly half of web requests used HTTP/2, with 20% using HTTP/3. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#http23">🔗</a></p></li><li><p>NodeJS was the most popular language used for making automated API requests. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#nodejs">🔗</a></p></li><li><p>Googlebot was responsible for the highest volume of request traffic to Cloudflare in 2023. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#googlebot">🔗</a></p></li></ul>
    <div>
      <h3><a href="https://blog.cloudflare.com/radar-2023-year-in-review#connectivityspeed">Connectivity &amp; Speed</a></h3>
      <a href="#">
        
      </a>
    </div>
    <ul><li><p>Over 180 Internet outages were observed around the world in 2023, with many due to government-directed regional and national shutdowns of Internet connectivity. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#outages">🔗</a></p></li><li><p>Aggregated across 2023, only a third of IPv6-capable requests worldwide were made over IPv6. In India, however, that share reached 70%. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#ipv6">🔗</a></p></li><li><p>The top 10 countries all had measured average download speeds above 200 Mbps, with Iceland showing the best results across all four measured Internet quality metrics. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#downloadspeed">🔗</a></p></li><li><p>Over 40% of global traffic comes from mobile devices. In more than 80 countries/regions, the majority of traffic comes from mobile devices. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#devices">🔗</a></p></li></ul>
    <div>
      <h3><a href="https://blog.cloudflare.com/radar-2023-year-in-review#security">Security</a></h3>
      <a href="#">
        
      </a>
    </div>
    <ul><li><p>Just under 6% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons. In the United States, 3.65% of traffic was mitigated, while in South Korea, it was 8.36%. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#mitigated">🔗</a></p></li><li><p>A third of global bot traffic comes from the United States, and over 11% of global bot traffic comes from Amazon Web Services. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#bottraffic">🔗</a></p></li><li><p>Globally, Finance was the most attacked industry, but the timing of spikes in mitigated traffic and the target industries varied widely throughout the year and around the world. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#industry">🔗</a></p></li><li><p>Even as an older vulnerability, Log4j remained a top target for attacks during 2023. However, HTTP/2 Rapid Reset emerged as a significant new vulnerability, beginning with a flurry of record-breaking attacks. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#vulnerability">🔗</a></p></li><li><p>1.7% of TLS 1.3 traffic is using post-quantum encryption. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#encryption">🔗</a></p></li><li><p>Deceptive links and extortion attempts were two of the most common types of threats found in malicious email messages. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#email">🔗</a></p></li><li><p>Routing security, measured as the share of RPKI valid routes, improved globally during 2023. Significant growth was observed in countries including Saudi Arabia, the United Arab Emirates, and Vietnam. <a href="https://blog.cloudflare.com/radar-2023-year-in-review#rpki">🔗</a></p></li></ul>
    <div>
      <h2>Introduction</h2>
      <a href="#introduction">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/">Cloudflare Radar</a> launched in September 2020, and in the <a href="https://blog.cloudflare.com/introducing-cloudflare-radar/">blog post that announced its availability</a>, we talked about how its intent was to “shine a light on the Internet’s patterns”. Cloudflare’s network currently spans more than 310 cities in over 120 countries/regions, serving an average of over 50 million HTTP(S) requests per second for millions of Internet properties, in addition to handling over 70 million DNS requests per second on average. The data generated by this massive global footprint and scale, combined with data from complementary Cloudflare tools, enables Radar to provide unique near-real time perspectives on the patterns and trends we observe across the Internet. For the last several years (<a href="https://blog.cloudflare.com/cloudflare-radar-2020-year-in-review/">2020</a>, <a href="https://blog.cloudflare.com/cloudflare-radar-2021-year-in-review/">2021</a>, <a href="https://blog.cloudflare.com/radar-2022-year-in-review/">2022</a>), we’ve been aggregating these insights into an annual Year In Review, shining a light on the Internet’s patterns over the course of that year. The new <a href="https://radar.cloudflare.com/year-in-review/2023">Cloudflare Radar 2023 Year In Review</a> continues that tradition, featuring interactive charts, graphs, and maps you can use to explore notable Internet trends observed throughout this past year.</p><p>The 2023 Year In Review is organized into three sections: <a href="https://radar.cloudflare.com/year-in-review/2023/#traffic-insights-trends">Traffic Insights &amp; Trends</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/#connectivity-speed">Connectivity &amp; Speed</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/#security">Security</a>. We have incorporated several new metrics this year, and have endeavored to keep underlying methodologies consistent with last year wherever possible. Website visualizations shown at a weekly granularity cover the period from January 2 through November 26, 2023. Trends for over 180 countries/regions are available on the website, with some smaller or less populated locations excluded due to insufficient data. Note that some of the metrics are presented only as a worldwide view, and will not be shown if a country/region is selected. Because of the<a href="https://blog.cloudflare.com/post-mortem-on-cloudflare-control-plane-and-analytics-outage/"> control plane and analytics outage</a> that occurred November 2-4, traffic data for relevant metrics has been interpolated for that three-day period.</p><p>Below, we provide an overview of the content contained within the major Year In Review sections (<a href="https://blog.cloudflare.com/radar-2023-year-in-review#trafficinsights">Traffic Insights &amp; Trends</a>, <a href="https://blog.cloudflare.com/radar-2023-year-in-review#connectivityspeed">Connectivity &amp; Speed</a>, and <a href="https://blog.cloudflare.com/radar-2023-year-in-review#security">Security</a>), along with notable observations and key findings. In addition, we have also published a companion blog post that specifically explores trends seen across <a href="https://blog.cloudflare.com/radar-2023-year-in-review-internet-services/">Top Internet Services</a>.</p><p>However, the notable observations and key findings contained within this post only skim the surface of the unique insights that can be found in the <a href="https://radar.cloudflare.com/year-in-review/2023">Year in Review website</a>, which we strongly encourage you to visit to explore the data in more detail and look at trends for your country/region. As you do so, we encourage you to consider how the trends presented within these blog posts and the website’s various sections impact your business or organization, and to think about how these insights can inform actions that you can take to improve user experience or enhance your security posture in the future.</p>
    <div>
      <h2>Traffic Insights &amp; Trends</h2>
      <a href="#traffic-insights-trends">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6si0bF8AYxaHUiin90NVup/4391aa8057562ba74754271c8959545b/1.png" />
          </figure>
    <div>
      <h3>Global Internet traffic grew 25%, in line with peak 2022 growth. Major holidays, severe weather, and intentional shutdowns clearly impacted Internet traffic.</h3>
      <a href="#global-internet-traffic-grew-25-in-line-with-peak-2022-growth-major-holidays-severe-weather-and-intentional-shutdowns-clearly-impacted-internet-traffic">
        
      </a>
    </div>
    <p>Twenty-five years ago, Worldcom executives claimed that <a href="https://www.lightreading.com/business-management/did-worldcom-puff-up-the-internet-too-">Internet traffic was doubling</a> every 100 days (3.5 months). A quarter-century later, we know that these claims were unrealistically aggressive, but it is clear that the Internet is growing quickly as more and more devices are connected, consuming content from a growing universe of websites, applications, and services.</p><p>To determine the traffic trends over time, we first established a baseline, calculated as the average daily traffic volume (excluding bot traffic) over the second full calendar week (January 8-14) of 2023. We chose the second calendar week to allow time for people to get back into their “normal” routines (school, work, etc.) after the winter holidays and New Year’s Day. The percent change shown in our traffic trends chart is calculated relative to the baseline value, and represents a seven-day trailing average — it does not represent absolute traffic volume for a country/region. The seven-day averaging is done to smooth the sharp changes seen with a daily granularity. A trend line for 2022 is shown for comparison purposes.</p><p>Our data shows that <a href="https://radar.cloudflare.com/year-in-review/2023#internet-traffic-growth">globally</a>, Internet traffic grew 25% in 2023, with nominal initial growth accelerating during the second half of the year. Overall, the pattern is similar to that observed in 2022 (excepting last year’s late February spike), and peak growth for the year is just slightly above the peak growth level seen in 2022. Traffic patterns in <a href="https://radar.cloudflare.com/year-in-review/2023/ca#internet-traffic-growth">Canada</a> were also rather consistent year-over-year, exhibiting similar seasonality, and peak growth above 30% in both 2022 and 2023. In many countries, the 2022 trend line shows a clear drop in traffic heading into the Christmas holiday, with a slight rebound ahead of New Year’s Day. It will be interesting to see if traffic follows this pattern in 2023 as well.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22Bwlc7Vpahg5MjX92aRpl/1f75918689c2c9baba8922e2ec131af7/2.png" />
          </figure><p><sub>Global Internet traffic growth in 2023, compared with 2022</sub></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Rl8Om7sRovHnaYbyjFfrO/8ca4c867c5e91e22e3db4aabea5a0be0/3.png" />
          </figure><p><sub>Internet traffic growth in Canada in 2023, compared with 2022 </sub></p><p>Comparisons with 2022 traffic trends helps make the <a href="https://blog.cloudflare.com/easter-passover-ramadan-internet-trends-2023/">impact of major holidays on Internet traffic</a> more visible. For example, in Muslim countries including <a href="https://radar.cloudflare.com/year-in-review/2023/id#internet-traffic-growth">Indonesia</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/tr#internet-traffic-growth">Turkey</a>, and the <a href="https://radar.cloudflare.com/year-in-review/2023/ae#internet-traffic-growth">United Arab Emirates</a>, the celebration of Eid-Ul-Fitr, the festival marking the end of the fast of Ramadan, is visible as a noticeable drop in traffic around April 21-23, 2023, just before a similar drop visible in the 2022 trend line during last year’s celebration on May 2-3. In <a href="https://radar.cloudflare.com/year-in-review/2023/it#internet-traffic-growth">Italy</a>, a drop in traffic is clearly visible around Pasqua di Resurrezione and Lunedì dell'Angelo (Easter Sunday and Monday) on April 9-10, one week ahead of a similar drop in traffic in 2022.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BDi7I0ByzASQORcsBeyaV/d4d32a28f30787672debf7f737fdf3fb/4.png" />
          </figure><p><sub>Internet traffic growth in Indonesia in 2023, compared with 2022 </sub></p><p>In addition, extended disruptions to Internet connectivity are also clearly visible within the traffic trend charts. Examples include <a href="https://radar.cloudflare.com/year-in-review/2023/mr#internet-traffic-growth">Mauritania</a>, where government-directed shutdowns occurred from <a href="https://twitter.com/CloudflareRadar/status/1632747652608581633">March 6-12</a> and <a href="https://twitter.com/CloudflareRadar/status/1664274102750937092">May 30 - June 6</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/ga#internet-traffic-growth">Gabon</a>, where a <a href="https://twitter.com/CloudflareRadar/status/1695521998640652687">shutdown</a> was in place from August 26-30, as well as <a href="https://radar.cloudflare.com/year-in-review/2023/gu#internet-traffic-growth">Guam</a>, where <a href="https://twitter.com/CloudflareRadar/status/1661351243694891008">Super Typhoon Mawar</a> caused a multi-week drop in traffic starting on May 24.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AmQ6VUA7jhYlnqQOG63Tq/ec6a591c516ac52f9bec700db70cfda2/5.png" />
          </figure><p><sub>Internet traffic growth in Mauritania in 2023, compared with 2022 Internet traffic growth in Guam in 2023, compared with 2022 </sub></p>
    <div>
      <h3>Google was again the most popular general Internet service, with 2021 leader TikTok falling to fourth place. OpenAI was the most popular service in the emerging Generative AI category, and Binance remained the most popular Cryptocurrency service.</h3>
      <a href="#google-was-again-the-most-popular-general-internet-service-with-2021-leader-tiktok-falling-to-fourth-place-openai-was-the-most-popular-service-in-the-emerging-generative-ai-category-and-binance-remained-the-most-popular-cryptocurrency-service">
        
      </a>
    </div>
    <p>One of the most popular sections of the Year In Review over the last several years has been the exploration of the most popular Internet services, both generally and across a number of categories. These rankings of service popularity are based on analysis of anonymized query data of traffic to our <a href="https://1.1.1.1/">1.1.1.1 public DNS resolver</a> from millions of users around the world. Although DNS resolution operates at a domain level, domains that belong to a single Internet service are grouped together for the purposes of these rankings.</p><p>In the overall category, <a href="https://google.com/">Google</a> once again held the top spot, owing in part to its broad portfolio of services as well as the popularity of the Android mobile operating system. In addition to perennial categories like e-commerce, video streaming, and messaging, this year we also looked at <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/">Generative AI</a>, which has been on a meteoric rise in 2023. In this category, <a href="https://openai.com/">OpenAI</a> held the top spot, building on the success and popularity of <a href="https://chat.openai.com/">ChatGPT</a>, which it launched only a year ago. And despite the turmoil seen in the cryptocurrency space this year, <a href="https://www.binance.com/">Binance</a> remained the most popular service in that category.</p><p>We explore these categorical rankings, as well as trends seen by specific services, in more detail in a <a href="https://blog.cloudflare.com/radar-2023-year-in-review-internet-services/">separate blog post</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2d5siw6r5xINfqm5Itrnrz/3f8b8ab6af0c0a5387ce2abe16a28cbe/7.png" />
          </figure>
    <div>
      <h3>Globally, over two-thirds of mobile device traffic was from Android devices. Android had a &gt;90% share of mobile device traffic in over 25 countries/regions; peak iOS mobile device traffic share was 66%.</h3>
      <a href="#globally-over-two-thirds-of-mobile-device-traffic-was-from-android-devices-android-had-a-90-share-of-mobile-device-traffic-in-over-25-countries-regions-peak-ios-mobile-device-traffic-share-was-66">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/IOS">Apple’s iOS</a> and <a href="https://en.wikipedia.org/wiki/Android_(operating_system)">Google’s Android</a> are the two leading operating systems used on mobile devices, and analysis of information in the user agent reported with each request allows us to gain insight into the distribution of traffic by client operating system throughout the year. Given the wide range of both devices and price points for Android devices, it is not surprising that Android is responsible for the majority of mobile device traffic when aggregated globally.</p><p><a href="https://radar.cloudflare.com/year-in-review/2023#ios-vs-android">Globally</a>, over two-thirds of mobile device traffic was from Android devices. The split is in line with Android/iOS usage observed in 2022. When looking at the countries/regions with the highest levels of Android usage, we find <a href="https://radar.cloudflare.com/year-in-review/2023/bd#ios-vs-android">Bangladesh</a> and <a href="https://radar.cloudflare.com/year-in-review/2023/pg#ios-vs-android">Papua New Guinea</a> at the top of the list, both with over 95% of mobile device traffic coming from Android devices. Looking more closely at other countries that see particularly high levels of Android usage, it is interesting to note that they are largely in Africa, Oceania/Asia, and South America, and that many have lower levels of <a href="https://www.nationsonline.org/oneworld/countries-classification.htm">gross national income per capita</a>. This is presumably where the availability of lower priced “budget” phones plays to Android’s advantage from an adoption perspective.</p><p>In contrast, while the share of mobile device traffic from iOS at a country/region level never tops 70%, many of the countries with an iOS share over 50%, including <a href="https://radar.cloudflare.com/year-in-review/2023/dk#ios-vs-android">Denmark</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/au#ios-vs-android">Australia</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/jp#ios-vs-android">Japan</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/ca#ios-vs-android">Canada</a>, have comparatively higher gross national income per capita, which likely speaks to a greater ability to afford higher priced devices.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vGKbw2s7WsD1UNWS2vrNo/f78c96b089de0937dbae7852a282a4b7/8.png" />
          </figure><p><sub>Mobile device traffic operating system distribution across selected countries</sub></p>
    <div>
      <h3>Global traffic from Starlink nearly tripled in 2023. After initiating service in Brazil in mid-2022, Starlink traffic from that country was up over 17x in 2023.</h3>
      <a href="#global-traffic-from-starlink-nearly-tripled-in-2023-after-initiating-service-in-brazil-in-mid-2022-starlink-traffic-from-that-country-was-up-over-17x-in-2023">
        
      </a>
    </div>
    <p>SpaceX’s <a href="https://www.starlink.com/">Starlink</a> high-speed satellite Internet service has continued to rapidly grow its footprint since launching in 2019, making high performance Internet connections available in many countries/regions that were previously unserved or underserved by traditional wired or wireless broadband. The current leader in the space, in the future it will be joined by Amazon’s <a href="https://www.aboutamazon.com/what-we-do/devices-services/project-kuiper">Project Kuiper</a> service, which <a href="https://www.reuters.com/technology/amazon-launches-first-test-satellites-internet-network-2023-10-06/">launched its first two test satellites this year</a>, as well as <a href="https://oneweb.net/">Eutelsat OneWeb</a>, which <a href="https://oneweb.net/taxonomy/term/2090">grew its satellite constellation</a> in 2023 as well.</p><p>To track the growth in usage and availability of Starlink's service, we analyzed aggregate Cloudflare traffic volumes associated with the service's autonomous system (<a href="https://radar.cloudflare.com/as/14593">AS14593</a>) throughout 2023. Although Starlink is not yet available globally, we did see traffic growth across a number of countries/regions. The request volume shown on the trend line in the chart represents a seven-day trailing average. A trend line for 2022 is shown for comparison purposes, and is scaled to the maximum value across 2022 and 2023.</p><p><a href="https://radar.cloudflare.com/year-in-review/2023#starlink-traffic-trends">Globally</a>, we saw Starlink traffic more than triple this year. In the <a href="https://radar.cloudflare.com/year-in-review/2023/us#starlink-traffic-trends">United States</a>, traffic from Starlink was up over 2.5x, and grew over 17x in <a href="https://radar.cloudflare.com/year-in-review/2023/br#starlink-traffic-trends">Brazil</a>. In countries where Starlink turned up service in 2023, including <a href="https://radar.cloudflare.com/year-in-review/2023/ke#starlink-traffic-trends">Kenya</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/ph#starlink-traffic-trends">the Philippines</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/zm#starlink-traffic-trends">Zambia</a>, we saw traffic grow rapidly once the service became available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WncRMUHSXwgkWM0KvxlFy/9b6fd261f10313444b6ee91c50d3e80a/9.png" />
          </figure><p><sub>Starlink traffic growth in Brazil, compared with 2022</sub></p>
    <div>
      <h3>Google Analytics, React, and HubSpot were among the most popular technologies found on top websites.</h3>
      <a href="#google-analytics-react-and-hubspot-were-among-the-most-popular-technologies-found-on-top-websites">
        
      </a>
    </div>
    <p>Modern websites are complex productions, relying on a mix of frameworks, platforms, services, and tools, and the developer community is responsible for making them coexist with one another to deliver a seamless experience. Using the <a href="https://radar.cloudflare.com/scan">Cloudflare Radar URL Scanner</a>, which we <a href="https://blog.cloudflare.com/radar-url-scanner-early-access/">launched in March 2023</a>, we scanned websites associated with the <a href="https://radar.cloudflare.com/domains">top 5000 domains</a> to identify the <a href="https://radar.cloudflare.com/year-in-review/2023#website-technologies">most popular technologies and services</a> used across a dozen different categories, including (but not limited to) Analytics, where <a href="https://marketingplatform.google.com/about/analytics/">Google Analytics</a> was by far the most widely used; JavaScript Frameworks, where <a href="https://react.dev/">React</a> had a commanding lead; and Marketing Automation providers, where leader <a href="https://www.hubspot.com/">HubSpot</a> was closely followed by several competitors.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/529TsSBU7hfiyRzyhtkYPJ/af31d524c7aaf923169b235a04609f10/10.png" />
          </figure><p><sub>Top website technologies, JavaScript frameworks category</sub></p>
    <div>
      <h3>Globally, nearly half of web requests used HTTP/2, with 20% using HTTP/3.</h3>
      <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-using-http-3">
        
      </a>
    </div>
    <p>HTTP (HyperText Transfer Protocol) is the core protocol that the web relies upon. <a href="https://datatracker.ietf.org/doc/html/rfc1945">HTTP/1.0</a> was first standardized in 1996, <a href="https://www.rfc-editor.org/rfc/rfc2616.html">HTTP/1.1</a> in 1999, and <a href="https://www.rfc-editor.org/rfc/rfc7540.html">HTTP/2</a> in 2015. The most recent version, <a href="https://www.rfc-editor.org/rfc/rfc9114.html">HTTP/3</a>, was completed in 2022, and runs on top of QUIC, a new transport protocol. On the client side, HTTP/3 support is <a href="https://caniuse.com/?search=http%2F3">enabled</a> by default in the latest versions of desktop and mobile Google Chrome and Mozilla Firefox, and for a portion of Apple Safari users. HTTP/3 is <a href="https://developers.cloudflare.com/support/network/understanding-cloudflare-http2-and-http3-support/">available for free</a> for all Cloudflare customers, though not every customer chooses to enable it.</p><p><a href="https://www.cloudflare.com/learning/performance/what-is-http3/">Using QUIC</a> allows HTTP/3 to deliver improved performance by mitigating the effects of packet loss and network changes, as well as establishing connections more quickly. It also provides encryption by default, mitigating the risk of attacks. Websites and applications that remain on older versions of HTTP miss out on these benefits.</p><p>Analysis of the HTTP version negotiated for each request allows us to gain insight into the distribution of traffic by the various versions of the protocol aggregated throughout the year. (“HTTP/1.x” aggregates requests made over HTTP/1.0 and HTTP/1.1.) At a <a href="https://radar.cloudflare.com/year-in-review/2023#http-versions">global</a> level, 20% of requests were made over the latest version, HTTP/3. Another third of requests were made over the comparatively ancient HTTP/1.x versions, while HTTP/2 remained dominant, and accounted for the 47% balance.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gBiHishdLuX27bhmjV27J/a4c0af967c14c1765f464dfe8dcaecc5/11.png" />
          </figure><p><sub>Global HTTP version traffic distribution</sub></p><p>Looking at the version distribution geographically, we found a number of Asian countries, including <a href="https://radar.cloudflare.com/year-in-review/2023/np#http-versions">Nepal</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/th#http-versions">Thailand</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/my#http-versions">Malaysia</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/lk#http-versions">Sri Lanka</a> among those with highest rates of HTTP/3 usage, although these rates did not exceed 35%. In contrast, more than half of the requests from ten countries, including <a href="https://radar.cloudflare.com/year-in-review/2023/ie#http-versions">Ireland</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/al#http-versions">Albania</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/fi#http-versions">Finland</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/cn#http-versions">China</a>, were made over HTTP/1.x during 2023.</p>
    <div>
      <h3>NodeJS was the most popular language used for making automated API requests.</h3>
      <a href="#nodejs-was-the-most-popular-language-used-for-making-automated-api-requests">
        
      </a>
    </div>
    <p>In addition, as developers increasingly use <a href="https://blog.cloudflare.com/application-security-report-q2-2023/">automated API calls</a> to power dynamic websites and applications, we can use our unique visibility into Web traffic to identify the top languages these API clients are written in. Looking at API-related requests determined to not be coming from a person using a browser or native mobile application, we applied heuristics to help identify the language used to build the client.</p><p><a href="https://radar.cloudflare.com/year-in-review/2023#api-client-language-popularity">Our analysis</a> found that almost 15% of automated API requests are made by <a href="https://nodejs.org/en/">NodeJS</a> clients, with <a href="https://go.dev/">Go</a>, <a href="https://www.java.com/">Java</a>, <a href="https://www.python.org/">Python</a>, and <a href="https://dotnet.microsoft.com/">.NET</a> holding smaller shares.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GGRldiqIT0Z6A38Qcg5Qr/e7a74f3312ef4fc68cca859e536876db/12.png" />
          </figure><p><sub>Top languages used to make automated API calls</sub></p>
    <div>
      <h3>Googlebot was responsible for the highest volume of request traffic to Cloudflare in 2023.</h3>
      <a href="#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2023">
        
      </a>
    </div>
    <p>Cloudflare Radar enables users to see Internet traffic trends at a country/region or network level over a selected period of time. However, we wanted to zoom out a bit, and look at the traffic Cloudflare saw from the entire IPv4 Internet over the course of the entire year. <a href="https://en.wikipedia.org/wiki/Hilbert_curve">Hilbert curves</a>, as “continuous space-filling curves”, have properties that are useful for <a href="https://xkcd.com/195/">visualizing the Internet's IPv4 address space</a>.</p><p>Using a Hilbert curve visualization, we can visualize aggregated request traffic (over IPv4) to Cloudflare from January 1st through November 26th, 2023. In order to make the amount of data used for the visualization manageable, IP addresses are aggregated at a <a href="https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf">/20</a> level, meaning that at the highest zoom level, each cell represents traffic from 4096 IPv4 addresses. (The sheer size of the IPv6 address space would make associated traffic very <a href="https://observablehq.com/@vasturiano/hilbert-map-of-ipv6-address-space">hard to see</a> in such a visualization, especially as such a small amount has been <a href="https://www.iana.org/numbers/allocations/">allocated for assignment by the Regional Internet Registries</a>.)</p><p>Within the visualization, IP addresses are grouped by ownership, and for much of the IP address space shown there, a mouseover at the default zoom level will show the <a href="https://www.nro.net/about/rirs/">Regional Internet Registry (RIR)</a> that the address block belongs to. However, there are also a number of blocks that were assigned prior to the existence of the RIR system, and for these, they are labeled with the name of the organization that owns them. Progressive zooming ultimately shows the autonomous system and country/region that the IP address block is associated with, as well as its share of traffic relative to the maximum. (If a country/region is selected, only the IP address blocks associated with that location are visible.) Overall traffic shares are indicated by shading based on a color scale, and although a number of large unshaded blocks are visible, this does not necessarily mean that the associated address space is unused, but rather that it may be used in a way that does not generate traffic to Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GzENc3bSTEAwo12YqzAz2/588f3c8ddf2361a1365e973a28eedb19/13.png" />
          </figure><p><sub>Hilbert curve showing aggregated 2023 traffic to Cloudflare across the IPv4 Internet</sub></p><p>Areas of higher request volume, indicated by warmer orange/red shading, are visibly scattered throughout the plot, but the IP address block that had the maximum request volume to Cloudflare during 2023 was 66.249.64.0/20, which belongs to Google. This IP address block is <a href="https://developers.google.com/static/search/apis/ipranges/googlebot.json">one of several</a> used by the <a href="https://developers.google.com/search/docs/crawling-indexing/googlebot">Googlebot</a> web crawler, which is a likely explanation for the high request volume, given the number of web properties on Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gHqXlmp2kBochO9Vo7cbd/e007def715d574a895a5d5f6f1609c0c/14.png" />
          </figure><p><sub>Zoomed view of the Hilbert curve showing the IPv4 address block that generated the highest volume of requests</sub></p><p>It is hard to do this visualization justice with a short summary and static screenshot. To explore it in more detail, we encourage you to go to <a href="https://radar.cloudflare.com/year-in-review/2023/#ipv4-traffic-distribution">the Year in Review website</a> and explore it by dragging and zooming to move around the IPv4 Internet.</p>
    <div>
      <h2>Connectivity &amp; Speed</h2>
      <a href="#connectivity-speed">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iyZu99O3URdU6D9DsfmAP/6e170cbd7e39b4155ece0134d144871d/15.png" />
          </figure>
    <div>
      <h3>Over 180 Internet outages were observed around the world in 2023, with many due to government-directed regional and national shutdowns of Internet connectivity.</h3>
      <a href="#over-180-internet-outages-were-observed-around-the-world-in-2023-with-many-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity">
        
      </a>
    </div>
    <p>During 2023, we have written frequently about Internet outages, whether due to <a href="https://blog.cloudflare.com/virgin-media-outage-april-4-2023/">technical issues</a>, <a href="https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/">government-directed shutdowns</a>, or <a href="https://blog.cloudflare.com/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/">geopolitical conflict</a>, as well as infrastructure resilience issues (including fiber cuts, power outages, and severe weather) highlighted in our <a href="https://blog.cloudflare.com/q3-2023-internet-disruption-summary/">quarterly summaries</a>. The impacts of these outages can be significant, including significant economic losses and severely limited communications. The <a href="https://radar.cloudflare.com/outage-center">Cloudflare Radar Outage Center</a> tracks these Internet outages, and uses Cloudflare traffic data for insights into their scope and duration.</p><p>Some of these outages seen through the year were short-lived, lasting just a couple of hours, while others have stretched on for multiple months. In the latter category, localized government-directed shutdowns in Manipur, <a href="https://radar.cloudflare.com/in">India</a> and Amhara, <a href="https://radar.cloudflare.com/et">Ethiopia</a> have lasted over seven and four months respectively (as of early December). In the former category, <a href="https://radar.cloudflare.com/iq">Iraq</a> frequently experienced multi-hour nationwide Internet shutdowns intended to prevent cheating on academic exams — these contribute to the clustering visible in the timeline during June, July, and August.</p><p>Within the <a href="https://radar.cloudflare.com/year-in-review/2023#internet-outages">timeline</a> on the Year in Review website, mousing over a dot will display metadata about that outage, and clicking on it will open a page with additional information. If a country/region is selected, only outages for that country will be displayed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16nJoRBougUppyGy8C4cBk/4f5c9166bc64f7123d2d47dd8c730815/16.png" />
          </figure><p><sub>Internet outages were observed around the world during 2023</sub></p>
    <div>
      <h3>Aggregated across 2023, only a third of IPv6-capable requests worldwide were made over IPv6. In India, however, that share reached 70%.</h3>
      <a href="#aggregated-across-2023-only-a-third-of-ipv6-capable-requests-worldwide-were-made-over-ipv6-in-india-however-that-share-reached-70">
        
      </a>
    </div>
    <p>IPv6 has been around in some fashion since 1998, with an expanded address space that better supports the universe of Internet-connected devices that has grown exponentially over the last quarter-century. And over that time, available IPv4 space has been <a href="https://ipv4.potaroo.net/">exhausted</a>, leading connectivity providers to resort to solutions like <a href="https://en.wikipedia.org/wiki/Network_address_translation">Network Address Translation</a>, and cloud and hosting providers to acquire blocks of IPv4 address space for <a href="https://blog.cloudflare.com/amazon-2bn-ipv4-tax-how-avoid-paying">as much as $50 per address</a>. IPv6 also brings a number of other <a href="https://www.catchpoint.com/benefits-of-ipv6">benefits</a> to network providers, and if implemented correctly, adoption should be transparent from an end user perspective.</p><p>Cloudflare has been a vocal and active advocate for IPv6 stretching all the way back to our first birthday in 2011, when we announced our <a href="https://blog.cloudflare.com/introducing-cloudflares-automatic-ipv6-gatewa/">Automatic IPv6 Gateway</a>, which enabled free IPv6 support for all of our customers. Just a few years later, we enabled <a href="https://blog.cloudflare.com/i-joined-cloudflare-on-monday-along-with-5-000-others">IPv6 support by default for all of our customers</a>. (Although it is enabled by default, not all customers choose to keep it enabled for a variety of reasons.) However, this support is only half of the equation for driving IPv6 adoption, as end user connections need to support it as well. (Technically, it is a bit more complex than that, but those are the two foundational requirements.) Analysis of the IP version used for each request made to Cloudflare allows us to gain insight into the distribution of traffic by the various versions of the protocol, aggregated throughout the year.</p><p>Thanks to <a href="https://radar.cloudflare.com/adoption-and-usage/as55836">near-complete IPv6 adoption by Indian telecommunications provider Reliance Jio</a>, 70% of <a href="https://www.techopedia.com/definition/19025/dual-stack-network">dual-stacked</a> requests from Indian users were made via IPv6. <a href="https://radar.cloudflare.com/year-in-review/2023/in#ipv6-adoption">India</a> was followed closely by <a href="https://radar.cloudflare.com/year-in-review/2023/my#ipv6-adoption">Malaysia</a>, where 66% of dual-stacked requests were made over IPv6 during 2023, thanks to strong IPv6 adoption rates across <a href="https://radar.cloudflare.com/my">leading Internet providers</a> within the country. Other countries that saw more than half of dual-stacked requests, on average, made over IPv6 include <a href="https://radar.cloudflare.com/year-in-review/2023/sa#ipv6-adoption">Saudi Arabia</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/vn#ipv6-adoption">Vietnam</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/gr#ipv6-adoption">Greece</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/fr#ipv6-adoption">France</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/uy#ipv6-adoption">Uruguay</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/th#ipv6-adoption">Thailand</a>. In contrast, there were on the order of 40 countries/regions where less than 1% of dual-stacked requests were made over IPv6 during 2023. Lagging adoption across such a large cohort of countries/regions 25 years after IPv6 was first published as a <a href="https://datatracker.ietf.org/doc/html/rfc2460">draft standard</a> is quite surprising.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XqZoWaym1aoDS1VG55ePg/c5f881860bb5ae000056bfaa648f060c/17.png" />
          </figure><p><sub>IPv4/IPv6 traffic distribution in India</sub></p>
    <div>
      <h3>The top 10 countries all had measured average download speeds above 200 Mbps, with Iceland showing the best results across all four measured Internet quality metrics.</h3>
      <a href="#the-top-10-countries-all-had-measured-average-download-speeds-above-200-mbps-with-iceland-showing-the-best-results-across-all-four-measured-internet-quality-metrics">
        
      </a>
    </div>
    <p>Even when they are not facing Internet outages, users around the world are often contending with poor performance on their Internet connections, whether due to low speeds, high latency, or a combination of these factors. Although Internet providers continue to evolve their service portfolios to offer increased connection speeds and reduced latency in order to support growth in use cases like online gaming and videoconferencing, consumer adoption is often mixed due to cost, availability, or other issues. By aggregating the results of <a href="https://speed.cloudflare.com/">speed.cloudflare.com</a> tests taken during 2023, we can get a geographic perspective on <a href="https://developers.cloudflare.com/radar/glossary/#connection-quality">connection quality</a> metrics including average download and upload speeds, and average idle and loaded latencies, as well as the distribution of the measurements.</p><p>In <a href="https://radar.cloudflare.com/year-in-review/2023/is#internet-quality">Iceland</a>, <a href="https://www.fjarskiptastofa.is/fjarskiptastofa/tolfraedi-og-gagnasafn/frettasafn/frett/fr%C3%A9ttir/islenskur-fjarskiptamarkadur-i-tolum-tolfraediskyrsla-fjarskiptastofu-fyrir-fyrri-hluta-arsins-2023-komin-ut">over 85% of all Internet connections are over fiber</a>, and this is reflected in its ranking as the country with the best overall Internet quality metrics, as speed test results show that providers there deliver the highest average speeds (282.5 Mbps download, 179.9 Mbps upload) and lowest average latencies (9.6 ms idle, 77.1 ms loaded). The histogram below shows that while there is a large cluster of download speeds between 0–100 Mbps, there were also a significant number of tests that measured even higher speeds, including some in excess of 1 Gbps.</p><p>Western European countries including <a href="https://radar.cloudflare.com/year-in-review/2023/es#internet-quality">Spain</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/pt#internet-quality">Portugal</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/dk#internet-quality">Denmark</a> also ranked among the top 10 across multiple Internet quality metrics.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HI55cWJrBt7OQvmU6OwIr/18e9d2ae3a24ef2981b1b864f9324c82/18.png" />
          </figure><p><sub>Download and upload speed test result distribution in Iceland</sub></p>
    <div>
      <h3>Over 40% of global traffic comes from mobile devices. In more than 80 countries/regions, the majority of traffic comes from mobile devices.</h3>
      <a href="#over-40-of-global-traffic-comes-from-mobile-devices-in-more-than-80-countries-regions-the-majority-of-traffic-comes-from-mobile-devices">
        
      </a>
    </div>
    <p>Over the last 15 years or so, mobile devices have become increasingly ubiquitous, becoming indispensable in both our personal and professional lives, thanks in large part to their ability to enable us to access the Internet from nearly anywhere at any time. In some countries/regions, mobile devices primarily connect to the Internet via Wi-Fi, while others are “mobile first”, where Internet access is primarily through 4G/5G services.</p><p>Analysis of information contained with the user agent reported with each request to Cloudflare enables us to categorize it as coming from a mobile, desktop, or other type of device. Aggregating this categorization throughout the year at a global level, we found that 42% of traffic came from mobile devices, with 58% coming from desktop devices such as laptops and “classic” PCs. These traffic shares were in line with those measured in 2022. 79% of traffic came from mobile devices in <a href="https://radar.cloudflare.com/year-in-review/2023/zm#mobile-vs-desktop">Zambia</a>, making it the country with the largest mobile device traffic share in 2023. Other countries/regions that had more than 50% of traffic come from mobile devices were concentrated in the Middle East/Africa, the Asia Pacific Region, and South/Central America. In contrast, <a href="https://radar.cloudflare.com/year-in-review/2023/fi#mobile-vs-desktop">Finland</a> had one of the highest shares of desktop device traffic, at 80%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/23rR8ZC12OxfrmQoIMa6wu/8a907e78e9d1f6bd7b23ef9ad9f4be58/19.png" />
          </figure><p><sub>Desktop and mobile device traffic distribution across selected countries</sub></p>
    <div>
      <h2>Security</h2>
      <a href="#security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hcPA3MxWv4YTudGGFAL0H/0f18e316519c388d88672b05682b4852/20.png" />
          </figure>
    <div>
      <h3>Just under 6% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons. In the United States, 3.65% of traffic was mitigated, while in South Korea, it was 8.36%.</h3>
      <a href="#just-under-6-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons-in-the-united-states-3-65-of-traffic-was-mitigated-while-in-south-korea-it-was-8-36">
        
      </a>
    </div>
    <p>Malicious bots are often used to attack websites and applications. To <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect customers from these threats</a>, Cloudflare mitigates (blocks) this attack traffic using <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a> mitigation techniques or <a href="https://developers.cloudflare.com/waf/managed-rules/">Web Application Firewall (WAF) Managed Rules</a>. However, customers may also choose to have Cloudflare mitigate traffic using other techniques for a variety of other reasons, such as <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/">rate-limiting</a> requests, or <a href="https://developers.cloudflare.com/waf/tools/ip-access-rules/">blocking all traffic from a given location</a>, even if it isn’t malicious. Analyzing traffic to Cloudflare’s network seen throughout 2023, we looked at the overall share that was mitigated (for any reason), as well as the share that was mitigated as a DDoS attack or by WAF Managed Rules.</p><p><a href="https://radar.cloudflare.com/year-in-review/2023/#mitigated-traffic">Overall</a>, just under 6% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons, while only around 2% of it saw DDoS/Managed WAF mitigations. Some countries, such as <a href="https://radar.cloudflare.com/year-in-review/2023/bm#mitigated-traffic">Bermuda</a>, saw the percentages for the two metrics track very closely, while other countries, like <a href="https://radar.cloudflare.com/year-in-review/2023/pk#mitigated-traffic">Pakistan</a> and <a href="https://radar.cloudflare.com/year-in-review/2023/za#mitigated-traffic">South Africa</a> showed much larger gaps between their trend lines.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26nflLGhSqYTUM59K8CsGL/d7943bb770dfec33a3c1c6139a1ff519/21.png" />
          </figure><p><sub>Mitigated traffic trends in Pakistan</sub></p>
    <div>
      <h3>A third of global bot traffic comes from the United States, and over 11% of global bot traffic comes from Amazon Web Services.</h3>
      <a href="#a-third-of-global-bot-traffic-comes-from-the-united-states-and-over-11-of-global-bot-traffic-comes-from-amazon-web-services">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/">Bot</a> traffic describes any non-human Internet traffic, and monitoring bot traffic levels can help site and application owners spot potentially malicious activity. Of course, bots can be helpful too, and Cloudflare maintains a list of <a href="https://radar.cloudflare.com/traffic/verified-bots">verified bots</a> to help keep the Internet healthy. Verified bots include those used for things like search engine indexing, performance testing, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">availability monitoring</a>. Regardless of intent, we wanted to look at where bot traffic was coming from, and we can use the IP address of a request to identify the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a>) and country/region associated with the bot making the request. Perhaps unsurprisingly, we found that cloud platforms were among the leading sources of bot traffic. This is likely due to the ease of automating the provisioning/teardown of compute resources and the relatively low cost of doing so, the distributed geographic footprint of cloud platforms, and the availability of high-bandwidth connections.</p><p><a href="https://radar.cloudflare.com/year-in-review/2023/#bot-traffic-sources">Globally</a>, nearly 12% of bot traffic comes from Amazon Web Services, and over 7% from Google. Some of it comes from consumer ISPs as well, with U.S. broadband provider Comcast originating over 1.5% of global bot traffic. A disproportionate amount of bot traffic originates from the United States, responsible for nearly a third of global bot traffic, four times that of Germany, which originates just 8%. Within the <a href="https://radar.cloudflare.com/year-in-review/2023/us#bot-traffic-sources">United States</a>, Amazon’s total share of bot traffic just edges out Google’s.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vB4F6cv2hoJ0RutHujMa/6ab96e843ff7a0dda8e30a7bfb2607b8/22.png" />
          </figure><p><sub>Global bot traffic distribution by source network</sub></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3T8VVVIISQrVqa6BwD9XdO/e84fabfd89f9f7bd07c6d5a5ec79c426/23.png" />
          </figure><p><sub>Global bot traffic distribution by source country</sub></p>
    <div>
      <h3>Globally, Finance was the most attacked industry, but the timing of spikes in mitigated traffic and the target industries varied widely throughout the year and around the world.</h3>
      <a href="#globally-finance-was-the-most-attacked-industry-but-the-timing-of-spikes-in-mitigated-traffic-and-the-target-industries-varied-widely-throughout-the-year-and-around-the-world">
        
      </a>
    </div>
    <p>The industries targeted by attacks often shift over time, depending on the intent of the attackers. They may be trying to cause financial harm by attacking ecommerce sites during a busy shopping period, or they may be trying to make a political statement by attacking government-related sites. To identify industry-targeted attack activity during 2023, we analyzed mitigated traffic for customers that had an associated industry and vertical within their customer record. Mitigated traffic was aggregated weekly by source country/region across 18 target industries.</p><p>At a <a href="https://radar.cloudflare.com/year-in-review/2023/#most-attacked-industries">global level</a>, Finance organizations were the most attacked over the course of the year, though we saw a significant amount of volatility from week-to-week. Interestingly, some clustering was evident, as Finance, which includes organizations that provide websites and applications for mobile payments, investments/trading, and cryptocurrency, was also a top target for a number of European countries, including <a href="https://radar.cloudflare.com/year-in-review/2023/at#most-attacked-industries">Austria</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/ch#most-attacked-industries">Switzerland</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/fr#most-attacked-industries">France</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/gb#most-attacked-industries">the United Kingdom</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/ie#most-attacked-industries">Ireland</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/it#most-attacked-industries">Italy</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/nl#most-attacked-industries">the Netherlands</a>, as well as in North America, for <a href="https://radar.cloudflare.com/year-in-review/2023/ca#most-attacked-industries">Canada</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/us#most-attacked-industries">the United States</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/mx#most-attacked-industries">Mexico</a>. The Health industry, which includes companies that make exercise equipment, as well medical testing device manufacturers, was a top target across multiple African countries, including <a href="https://radar.cloudflare.com/year-in-review/2023/bj#most-attacked-industries">Benin</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/ci#most-attacked-industries">Côte d'Ivoire</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/cm#most-attacked-industries">Cameroon</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/et#most-attacked-industries">Ethiopia</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/sn#most-attacked-industries">Senegal</a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/so#most-attacked-industries">Somalia</a>.</p><p>Overall, however, the year started slowly, with no industry seeing more than 8% of traffic being mitigated. As the first quarter progressed, Professional Services and News/Media/Publications organizations saw spikes in the share of mitigated traffic later in January, with Health jumping in mid-February and Law &amp; Government organizations seeing a sharp increase in mitigated traffic in early March. Customers in the Arts/Entertainment/Recreation industry classification were apparently targeted by a multi-week attack campaign, with more than 20% of traffic mitigated during the weeks of March 26, April 2, and April 9. The overall peak during the year was experienced by the Professional Services industry, which saw a mitigated traffic share of 38.4% for the week of August 6, nearly twice its January spike. The timing of spikes and the industries experiencing those spikes varied widely across countries/regions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RZIkCW04d50n9RNASyljJ/3b0b4e83fdd4627ec061a9f038270098/24.png" />
          </figure><p><sub><i>Global mitigated traffic share by industry, week of August 6, 2023</i></sub></p>
    <div>
      <h3>Even as an older vulnerability, Log4j remained a top target for attacks during 2023. However, HTTP/2 Rapid Reset emerged as a significant new vulnerability, beginning with a flurry of record-breaking attacks.</h3>
      <a href="#even-as-an-older-vulnerability-log4j-remained-a-top-target-for-attacks-during-2023-however-http-2-rapid-reset-emerged-as-a-significant-new-vulnerability-beginning-with-a-flurry-of-record-breaking-attacks">
        
      </a>
    </div>
    <p>In August 2023, we published a <a href="https://blog.cloudflare.com/unmasking-the-top-exploited-vulnerabilities-of-2022/">blog post</a> that explored traffic seen by Cloudflare for the most commonly exploited vulnerabilities of 2022, as listed in a <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a">joint Cybersecurity Advisory</a>. These included vulnerabilities in the Log4j Java-based logging utility, Microsoft Exchange, Atlassian’s Confluence platform, VMWare, and F5’s BIG-IP traffic management system. Although these are older vulnerabilities, attackers continued to actively target and exploit them throughout 2023, in part because organizations are frequently slow to follow the recommendations outlined in the Cybersecurity Advisory. We updated the analysis done for our blog post to include just the attack activity seen in 2023.</p><p>Attack activity by vulnerability varied by location, and in some, attacks targeted only a subset of the vulnerabilities. <a href="https://radar.cloudflare.com/year-in-review/2023/#commonly-exploited-vulnerabilities">Aggregated worldwide</a>, attack volume targeting Log4j consistently dwarfed that seen for the other vulnerabilities, and saw spikes during the last week of October and mid-late November; attack activity targeting Atlassian vulnerabilities increased in late July and trended slowly higher through the rest of the year. At a country/region level, Log4j was generally the most targeted vulnerability. In countries including <a href="https://radar.cloudflare.com/year-in-review/2023/fr#commonly-exploited-vulnerabilities">France</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/de#commonly-exploited-vulnerabilities">Germany</a>, <a href="https://radar.cloudflare.com/year-in-review/2023/in#commonly-exploited-vulnerabilities">India</a>, and the <a href="https://radar.cloudflare.com/year-in-review/2023/us#commonly-exploited-vulnerabilities">United States</a>, associated attack volume remained at a significant level throughout the year, while in other countries/regions, these attacks are most visible as infrequent, short-lived spikes within a country/region’s graphs, punctuating otherwise low levels of attack volume.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5N40qJ2jHi8wZLqRgBYosE/fc6406d66dc9abb1365bce92841fe970/25.png" />
          </figure><p><sub>Global attack activity trends for commonly exploited vulnerabilities</sub></p><p>We also expect that through 2024, attackers will continue to target the <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/">HTTP/2 Rapid Reset</a> vulnerability disclosed in October. The vulnerability (see <a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a> for details) abuses an underlying weakness in the request cancellation feature of the HTTP/2 protocol, leading to resource exhaustion on the target web/proxy server. Between the end of August and the beginning of October, we saw a number of attacks targeting this vulnerability. Across this set of attacks, the average attack rate was 30M requests per second (rps), with nearly 90 peaking above 100M rps, and the largest one hitting 201M rps. This largest attack was nearly 3x bigger than our <a href="https://blog.cloudflare.com/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">previous biggest attack on record</a>.</p><p>One notable concern about this vulnerability is that the attacker was able to generate such a large attack with a botnet consisting of just 20,000 compromised systems. This is much smaller than some of the largest botnets today, which comprise hundreds of thousands or millions of hosts. With average web traffic estimated to be between 1–3 billion requests per second, attacks using this method could conceivably focus an entire web’s worth of requests on a few unsuspecting targets.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2luQtFRyV3yEaFgsLT5IPa/3f4411d940c002f1c8a0b4b79cb6a00c/26.png" />
          </figure><p><sub>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks</sub></p>
    <div>
      <h3>1.7% of TLS 1.3 traffic is using post-quantum encryption</h3>
      <a href="#1-7-of-tls-1-3-traffic-is-using-post-quantum-encryption">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/">Post-quantum</a> refers to a new set of cryptographic techniques that can protect data from adversaries with the ability to capture and store today's data for decryption by sufficiently powerful quantum computers in the future. The Cloudflare Research team has been <a href="https://blog.cloudflare.com/sidh-go/">exploring post-quantum cryptography since 2017</a>.</p><p>In October 2022, we enabled <a href="https://blog.cloudflare.com/post-quantum-for-all/">post-quantum key agreement</a> at our edge by default, but use of it requires that the browser support it as well. Google's Chrome browser started to slowly enable support in August 2023, and we expect its support will continue to grow in 2024, and that other browsers will add support over time as well. In September 2023, we announced <a href="https://blog.cloudflare.com/post-quantum-cryptography-ga/">general availability of post-quantum cryptography</a> for both inbound and outbound connections and for many internal services, and expect to finish upgrading all internal services by the end of 2024.</p><p>After first enabling support in August, Chrome began ramping the number of browsers (version 116 and later) that use post-quantum cryptography, resulting in gradual growth leading to the significant increase seen on November 8. These actions helped <a href="https://radar.cloudflare.com/year-in-review/2023#post-quantum-encryption">push the share</a> of TLS 1.3 traffic using post-quantum encryption to 1.7% at the end of November. As this ramp continues with future Chrome updates, and as other browsers add support for post-quantum encryption, we expect this share to continue to grow rapidly in 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NYxptRfJ89sfyulszrDer/0b606ac3c5609d5d60965bc29c7170b5/27.png" />
          </figure><p><sub>Growth trends in post-quantum encrypted TLS 1.3 traffic</sub></p>
    <div>
      <h3>Deceptive links and extortion attempts were two of the most common types of threats found in malicious email messages.</h3>
      <a href="#deceptive-links-and-extortion-attempts-were-two-of-the-most-common-types-of-threats-found-in-malicious-email-messages">
        
      </a>
    </div>
    <p>As the #1 business application, email represents a very attractive entry point into enterprise networks for attackers. Targeted malicious emails may attempt to impersonate an otherwise legitimate sender, try to get the user to click on a deceptive link, or contain a dangerous attachment, among other types of threats. <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Area 1 Email Security</a> protects customers from email-based attacks, including those carried out through targeted malicious email messages. <a href="https://radar.cloudflare.com/year-in-review/2023/#malicious-emails">Over the course of 2023</a>, an average of 2.65% of emails analyzed by Cloudflare Area 1 were found to be malicious. Aggregated at a weekly level, spikes to over 3.5%, 4.5%, and over 5% were seen in early February, early September, and late October respectively.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qh5iAHQvgko5BbzgcAEvq/8b9810b46e572c282cafa1b17387a544/28.png" />
          </figure><p><sub>Global malicious email share trends</sub></p><p>When carrying out attacks using malicious email messages, attackers use a variety of techniques, which we refer to as threat categories. These categories are defined and explored in detail in Cloudflare's <a href="https://blog.cloudflare.com/2023-phishing-report/">2023 phishing threats report</a>. Analysis of malicious emails shows that messages may contain multiple types of threats, highlighting the need for a comprehensive email security <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a>. <a href="https://radar.cloudflare.com/year-in-review/2023/#top-email-threats">Exploring threat activity trends for these categories</a>, aggregated weekly across the year, we found that as much as 80% of them contained deceptive links.</p><p>However, it appears that attackers may have started to shift strategies in August, as the percentage of emails containing deceptive links began to fall while the share proposing to extort the recipient began to increase. By the end of October, and into November, the two threat categories had traded places, with nearly 80% of analyzed malicious emails containing an extortion threat, while only 20% contained deceptive links, as seen towards the right side of the graph below. However, this extortion campaign may have been short-lived, as its percentage fell almost as quickly as it rose. Identity deception and credential harvesting were also commonly identified threats, though the share of emails they were found in gradually declined over the course of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WR0CjCcVoccc3pM4RzIk/c91d7640e745cd0cbc88b8c2e14ac64d/29.png" />
          </figure><p><sub>Global threat category trends for malicious emails</sub></p>
    <div>
      <h3>Routing security, measured as the share of RPKI valid routes, improved globally during 2023. Significant growth was observed in countries including Saudi Arabia, the United Arab Emirates, and Vietnam.</h3>
      <a href="#routing-security-measured-as-the-share-of-rpki-valid-routes-improved-globally-during-2023-significant-growth-was-observed-in-countries-including-saudi-arabia-the-united-arab-emirates-and-vietnam">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">Border Gateway Protocol (BGP)</a> is the routing protocol for the Internet, communicating routes between networks, enabling traffic to flow between source and destination. However, because it relies on trust between networks, incorrect information shared between peers, whether done so intentionally or not, can send traffic to the wrong place, potentially with <a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/">malicious results</a>. <a href="https://blog.cloudflare.com/rpki/">Resource Public Key Infrastructure (RPKI)</a> is a cryptographic method of signing records that associate a BGP route announcement with the correct originating AS number. In simple terms, it provides a way of ensuring that the information being shared originally came from a network that is allowed to do so. (Note that this is only half of the challenge of implementing routing security, as network providers also need to validate these signatures and filter out invalid announcements.) In the United States, the federal government recognizes the importance of routing security, with the Federal Communications Commission holding a <a href="https://www.fcc.gov/news-events/events/2023/07/bgp-security-workshop">“Border Gateway Protocol Security Workshop”</a> on July 31.</p><p>Cloudflare has been a strong proponent of routing security, from being a founding participant in the <a href="https://www.manrs.org/2020/03/new-category-of-cdns-and-cloud-providers-join-manrs-to-improve-routing-security/">MANRS CDN and Cloud Programme</a>, to releasing an <a href="https://blog.cloudflare.com/cloudflares-rpki-toolkit/">RPKI toolkit</a> for network operators, to providing a <a href="https://isbgpsafeyet.com/">public tool</a> that enables users to test whether their Internet provider has implemented BGP safely, to presenting at this summer’s FCC workshop.</p><p>Building on the <a href="https://blog.cloudflare.com/radar-routing/">July release</a> of the new <a href="https://radar.cloudflare.com/routing">Routing page</a> on Cloudflare Radar, we analyzed data from <a href="https://ftp.ripe.net/rpki/">RIPE NCC's RPKI daily archive</a> to determine the share of RPKI valid routes (as opposed to those route announcements that are invalid or whose status is unknown) and how that share has changed over the course of 2023. Since the start of the year, the <a href="https://radar.cloudflare.com/year-in-review/2023/#routing-security">global share of RPKI valid routes</a> grew to nearly 45%, up six percentage points from the end of 2022. At a country/region level, we are looking at routes announced by autonomous systems associated with the given country/region. In the <a href="https://radar.cloudflare.com/year-in-review/2023/us#routing-security">United States</a>, the increased FCC attention on routing security is arguably warranted, as less than a third of the routes are RPKI valid. Although this is significantly better than <a href="https://radar.cloudflare.com/year-in-review/2023/kr#routing-security">South Korea</a>, where less than 1% of announced routes are RPKI valid, it trails <a href="https://radar.cloudflare.com/year-in-review/2023/vn#routing-security">Vietnam</a> significantly, where the share increased 35 percentage points during the first half of the year to 90%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6h1rRaCe7tLAXIvEJh6328/cbb39b480c8f9df5dd792f1fc67e67e3/30.png" />
          </figure><p><sub>RPKI valid route growth in Vietnam</sub></p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>In the <a href="https://radar.cloudflare.com/year-in-review/2023">Cloudflare Radar 2023 Year In Review</a>, we have attempted to provide a snapshot of the Internet, as dynamic as it is, through trend graphs and summary statistics, providing unique perspectives on Internet traffic, Internet quality, and Internet security, and how key metrics across these areas vary around the world.</p><p>As we said in the introduction, we strongly encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2023">Cloudflare Radar 2023 Year In Review website</a> and explore the trends relevant to metrics, countries/regions, and industries of interest, and to consider how they impact your organization so that you are appropriately prepared for 2024.</p><p>If you have any questions, you can contact the Cloudflare Radar team at <a>radar@cloudflare.com</a> or on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X/Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky).</p>
    <div>
      <h3>Acknowledgements</h3>
      <a href="#acknowledgements">
        
      </a>
    </div>
    <p>As we noted last year, it truly is a team effort to produce the data, website, and content for our annual Year in Review, and I’d like to acknowledge those team members that contributed to this year’s effort. Thank you to: Sabina Zejnilovic, Jorge Pacheco, Carlos Azevedo (Data Science); Arun Chintalapati, Reza Mohammady (Design); Vasco Asturiano, Nuno Pereira, Tiago Dias (Front End Development); João Tomé (Most popular Internet services); and Davide Marquês, Paula Tavares, Celso Martinho (Project/Engineering Management) as well as countless other colleagues for their answers, edits, and ideas.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">3X7NsusCtWDwjP7Pl4eU8w</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q3 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2023-internet-disruption-summary/</link>
            <pubDate>Wed, 25 Oct 2023 13:05:00 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the third quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dk6TMORhkty538Rk55VxX/625b390a1bbc25ad1bd67e4f8a3cf813/image12-1.png" />
            
            </figure><p>Cloudflare operates in more than 300 cities in over 100 countries, where we interconnect with over 12,500 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>We have been publishing these summaries since the first quarter of 2022, and over that time, the charts on Cloudflare Radar have evolved. Many of the traffic graphs in early editions of this summary were screenshots from the relevant traffic pages on Radar. Late last year, we launched the ability to download graphs, and earlier this year, to embed dynamic graphs, and these summaries have taken advantage of those capabilities where possible. Sharp-eyed readers may notice an additional evolution in some of the graphs below: yellow highlighting indicating an observed “traffic anomaly”. Identification of such anomalies, along with the ability to be notified about them, as well as a timeline enhancement (embedded below) to the <a href="https://radar.cloudflare.com/outage-center/">Cloudflare Radar Outage Center</a>, were launched as part of Birthday Week at the end of September. More information on these new features can be found in our <a href="/traffic-anomalies-notifications-radar/">announcement blog post</a>.</p><p>As we have seen in previous quarters, Iraq pursued an aggressive plan of <a href="#governmentdirected">government-directed</a> Internet shutdowns intended to prevent cheating on exams, and several other African countries implemented politically motivated shutdowns. <a href="#cablecuts">Damage</a> to several submarine cables, as well as <a href="#maintenance">planned maintenance</a> to others, caused Internet disruptions across a number of countries during the third quarter. Natural disasters, including <a href="#fire">wildfires</a> and an <a href="#earthquake">earthquake</a>, caused issues with connectivity, as did <a href="#poweroutages">power outages</a> in multiple countries. An acknowledged <a href="#cyberattack">cyberattack</a> resulted in a major US university intentionally disconnecting from the Internet, while a number of other major Internet providers <a href="#unspecifiedissues">acknowledged problems</a> on their networks without ever disclosing the root cause of those problems.</p><p><i>(Note that the Internet disruptions related to the Israel/Palestine conflict are not covered in this post, as they began on October 7 in Q4 of 2023. Disruptions related to this conflict are being tracked, with additional insights found on the </i><a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/"><i>Cloudflare blog</i></a><i> and </i><a href="https://twitter.com/CloudflareRadar"><i>@CloudflareRadar</i></a><i> on X/Twitter.)</i></p><h2> Government directed</h2><p>Because the Internet has become a critical communications tool, Internet shutdowns are often used by governments as a means of controlling communication both within a country and with the outside world. These government-directed shutdowns are imposed for a variety of reasons, including during periods of civil unrest and protests around elections, and as a deterrent against cheating during exams.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>As we have discussed in past summaries, Internet shutdowns are used by some governments in an attempt to prevent cheating on national high school or baccalaureate exams. These shutdowns have a nationwide impact, and it isn’t clear whether they are ultimately successful at mitigating cheating. As we have also discussed in the past, such shutdowns frequently occur in <a href="https://radar.cloudflare.com/iq">Iraq</a>, and that was certainly the case during the third quarter, with rounds of shutdowns occurring during all three months.</p><p>The first round of exam-related Internet shutdowns during the quarter in Iraq was a continuation of a set that started in June, and continued on into July, targeting cheating on 9th and 12th grade exams. On ten days between July 4 and July 17, Internet connectivity was shut down on <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele)</a>, <a href="https://radar.cloudflare.com/as59588">AS59588 (ZAINAS-IQ)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203735">AS203735 (Capacities-LTD)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (ASIACELL)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a> in Iraq (except for the Kurdistan Region) between 04:00 - 08:00 local time (01:00 - 05:00 UTC).</p><p>During the second week of August, several networks in the Kurdistan region of Iraq again implemented daily exam-related Internet shutdowns due to a <a href="https://twitter.com/964English/status/1688157983170322432">second round of exams for 12th grade students</a>. These shutdowns took place between 06:00 - 08:00 local time (03:00 - 05:00 UTC), and impacted <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ-Online)</a>, and <a href="https://radar.cloudflare.com/as59625">AS59625 (KorekTel)</a> from August 6-13. These two hour shutdowns were <a href="/q2-2023-internet-disruption-summary/">similar to those seen in the region</a> in June.</p><p>A second round of 9th grade exams in August drove a week of Internet shutdowns across Iraq (except the Kurdistan region) between August 21 and August 29. Connectivity was shut down between 04:00 - 08:00 local time (01:00 - 05:00 UTC) across the same networks impacted by the shutdowns implemented in July.</p><p>Following the second round of 9th grade exams in August, the second round of 12th grade exams in Iraq (except the Kurdistan region) occurred in September, and with these exams, came yet another round of Internet shutdowns. Impacting the same set of network providers as the previous two months, these shutdowns occurred between September 17-30. However, while they started at the same time (04:00 local time, 01:00 UTC), they were shorter than previous rounds, ending an hour earlier (07:00 local time, 04:00 UTC).</p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p>On July 31, following the arrest of the Senegalese opposition leader, the Senegalese Ministry of Communication, Telecommunications and the Digital Economy <a href="/q2-2023-internet-disruption-summary/">once again</a> <a href="https://pulse.internetsociety.org/shutdowns/senegal-government-imposes-mobile-internet-shutdown">ordered the disconnection of mobile Internet connectivity</a> in <a href="https://radar.cloudflare.com/sn">Senegal</a> as shown in the communiqué below. These disruptions to mobile Internet access were visible on two of the four network providers within the country: <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal)</a> and <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1JxpkeVNrHblQw8c1MCQYP/a7b634889eef67ea5152dfab56df93e9/Screenshot-2023-10-23-at-17.14.06.png" />
            
            </figure><p>As shown in the graphs below, the shutdowns began mid-morning local time, generally between 08:00 and 10:00, from July 31 through August 5, and ended early the next morning, generally between midnight and 02:00. The final shutdown on August 5 was an exception, ending at 22:00 local time on both networks. (Senegal is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Ethiopia</h3>
      <a href="#ethiopia">
        
      </a>
    </div>
    <p>Following days of clashes between the federal military and local militia, <a href="https://www.nasdaq.com/articles/mobile-internet-outages-in-ethiopias-amhara-amid-fighting-residents-say">mobile Internet connectivity was shut down</a> in Amhara, <a href="https://radar.cloudflare.com/et">Ethiopia</a>. Cloudflare saw traffic to the region drop around 21:00 local time (18:00 UTC) on August 2. This is the second time that authorities have shut down mobile Internet connectivity in Amhara in 2023 — the first time was on April 6 after protests broke out following the federal government’s move to disband regional security forces. (Note that the country is no stranger to Internet shutdowns, as they have taken such action <a href="https://docs.google.com/spreadsheets/d/1DvPAuHNLp5BXGb0nnZDGNoiIwEeu2ogdXEIDvT4Hyfk/edit?usp=sharing">multiple times over the last several years</a>.) Despite <a href="https://www.accessnow.org/press-release/amhara-internet-shutdown/">calls to restore connectivity</a>, mobile Internet remained unavailable through the end of the third quarter, as seen in the figure below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PWWbRPqM5CfHRsG2wQUoT/336ca24a21f24153a7a60263a59a73f8/Sep-30---Ethiopia---Amhara.png" />
            
            </figure>
    <div>
      <h3>Gabon</h3>
      <a href="#gabon">
        
      </a>
    </div>
    <p>On August 26, following contentious presidential elections in <a href="https://radar.cloudflare.com/ga">Gabon</a>, Internet connectivity was shut down in order to <a href="https://www.france24.com/fr/afrique/20230826-pr%C3%A9sidentielle-au-gabon-couvre-feu-instaur%C3%A9-et-internet-coup%C3%A9">"prevent the spread of calls for violence"</a>. As shown in the figure below, traffic began to fall just before 17:00 local time (16:00 UTC), and remained at zero through approximately 07:30 local time (06:30 UTC) on August 30. <a href="https://www.reuters.com/world/africa/gabonese-military-officers-announce-they-have-seized-power-2023-08-30/">Connectivity was restored</a> hours after military officers seized power in the country, placing President Ali Bongo under house arrest and naming a new leader after the country’s election body announced Bongo had won a third term.</p><h2> Cable cuts</h2>
    <div>
      <h3>Cameroon</h3>
      <a href="#cameroon">
        
      </a>
    </div>
    <p>On July 7, an X/Twitter <a href="https://twitter.com/Camtelonline/status/1677298034852483075">post</a> from <a href="https://camtel.cm/">Cameroon Telecommunications</a> alerted subscribers to disruptions to voice and data services, with a subsequent <a href="https://twitter.com/Camtelonline/status/1677384867238252545">post</a> nearly six hours later noting that services had been re-established. Although these posts did not provide details on the cause of the disruption, a <a href="https://www.facebook.com/camtelonline/posts/pfbid02VFYsyC5tKEPr2TLcEXRd9ShE8gq8pWHYA253reirbGHjb9tb3UCptjc3CogYLJ1il">Facebook post</a> from the operator included an attached communiqué explaining that “<i>The optical fibre has been severed by road maintenance operations, causing major disruptions in the delivery of our services.</i>” The figure below shows the impact of this fiber damage, with traffic from <a href="https://radar.cloudflare.com/as15964">AS15964 (CAMNET-AS)</a> dropping sharply around 11:30 local time (10:30 UTC), and returning to expected levels by 18:00 local time (17:00 UTC).</p>
    <div>
      <h3>Liberia</h3>
      <a href="#liberia">
        
      </a>
    </div>
    <p>Damage to the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a> submarine cable disrupted Internet connectivity in <a href="https://radar.cloudflare.com/lr">Liberia</a> on July 28. A <a href="https://www.facebook.com/TelecommunicationsAuthorityLIBERA/posts/pfbid0ZHbnyKHtkUPycRke7dspbQQ1GdKpfTdc2fQm1HmSLaip1ds28kwm7gRYLoBeoVUnl">Facebook post</a> from the <a href="http://lta.gov.lr">Liberia Telecommunications Authority (LTA)</a> noted “The Liberia Telecommunications Authority(LTA) announces the temporary interruption of all nationwide Internet services due to the breakdown of the Africa Coast to Europe Cable in Ivory Coast.” and also highlighted that the ACE cable serves as the “sole source of internet connectivity between Europe and Liberia”. The figure below shows a near complete loss of traffic starting at 13:00 local time (13:00 UTC) and gradually recovering over the next several hours, returning to expected levels by 17:00 local time (17:00 UTC).</p>
    <div>
      <h3>Togo, Benin, Namibia, and the Republic of Congo (Brazzaville)</h3>
      <a href="#togo-benin-namibia-and-the-republic-of-congo-brazzaville">
        
      </a>
    </div>
    <p>On August 6, the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West African Cable System (WACS)</a> and the <a href="https://www.submarinecablemap.com/submarine-cable/sat-3wasc">South Atlantic 3 (SAT–3)</a> undersea cables were <a href="https://www.kentik.com/blog/dual-subsea-cable-cuts-disrupt-african-internet/">damaged by an undersea landslide</a> in the Congo Canyon, located at the mouth of the Congo River. The damage to the cables impacted Internet connectivity in <a href="https://radar.cloudflare.com/tg">Togo</a>, <a href="https://radar.cloudflare.com/bj">Benin</a>, <a href="https://radar.cloudflare.com/na">Namibia</a>, and the <a href="https://radar.cloudflare.com/cg">Republic of Congo (Brazzaville)</a>. Social media posts from <a href="https://twitter.com/TelecomNamibia/status/1688867775601844224">Telecom Namibia</a> and <a href="https://twitter.com/canalboxcongo/status/1688856878988623872">Canalbox Congo</a> alerted subscribers that connectivity would be impacted as a result of the damage to the cables.</p><p>Cable repair ship <a href="https://www.marinetraffic.com/en/ais/home/shipid:761048/zoom:10">CS Leon Thevenin</a> was called upon to perform repairs, but it took <a href="https://twitter.com/philBE2/status/1696246908954542552">several weeks for it to arrive</a> at the site of the damage, and then <a href="https://twitter.com/philBE2/status/1699071287807955020">additional time to perform the repairs</a>, which were <a href="https://www.news24.com/news24/tech-and-trends/news/internet-speed-relief-a-snapped-undersea-cable-is-now-fixed-20230907">reportedly completed on September 6</a>. Network operators in impacted countries were able to <a href="https://www.kentik.com/blog/dual-subsea-cable-cuts-disrupt-african-internet/">shift some traffic to alternate cables</a>, such as Google’s <a href="https://www.submarinecablemap.com/submarine-cable/equiano">Equiano</a> cable, which went live in February 2023.</p><p>As such, the graphs below illustrate that there was not a complete loss of traffic for impacted countries. To that end, traffic in Togo appeared to recover several weeks before the cable repairs were completed. The full impact is harder to see in the graphs for Benin, Namibia, and the Republic of Congo (Brazzaville) because the selected timeframe is long enough to force data aggregation at a daily level, but it is clearly visible in graphs covering shorter periods of time (with data aggregation at an hourly level) during the weeks after the cable cut occurred.</p>
    <div>
      <h3>South Sudan</h3>
      <a href="#south-sudan">
        
      </a>
    </div>
    <p>Highlighting the interconnected nature of the Internet, fiber cuts in <a href="https://radar.cloudflare.com/ug">Uganda</a> caused a brief Internet disruption for customers on <a href="https://radar.cloudflare.com/as37594">MTN South Sudan (AS37594)</a> on August 14, occurring between 13:00 - 15:00 local time (11:00 - 13:00 UTC), and <a href="https://stats.labs.apnic.net/cgi-bin/aspop?c=ss">impacting an estimated 438,000 users</a>. An X/Twitter <a href="https://twitter.com/MTNSSD/status/1691086728457531392">post</a> from the provider that afternoon told subscribers “<i>We sincerely apologize for the network issues experienced over the last couple of hours. It was due to multiple fiber cuts in Uganda.</i>”</p><h2> Cyberattack</h2>
    <div>
      <h3>University of Michigan</h3>
      <a href="#university-of-michigan">
        
      </a>
    </div>
    <p>On August 27, a “significant security concern” led the <a href="https://umich.edu/">University of Michigan</a> to <a href="https://www.mlive.com/news/ann-arbor/2023/08/significant-security-concern-prompted-internet-outage-at-university-of-michigan.html">shut down the Internet</a> on the Ann Arbor, Flint and Dearborn campuses. Although the shutdown occurred at the start of the new school year, classes continued as scheduled, but an <a href="https://web.archive.org/web/20230829122845/https://www.umich.edu/announcements/">announcement</a> posted by the University detailed the impact of disconnecting from the Internet, including potential delays in financial aid refunds and the unavailability of certain campus systems. The impact of the disconnection can be seen in the figure below, appearing as a significant drop in traffic starting just before 14:00 local time (18:00 UTC) on August 27, and lasting until just after 08:00 local time (12:00 UTC) on August 30 on <a href="https://radar.cloudflare.com/as36375">AS36375 (UMICH-AS-5)</a>, the primary autonomous system used by the University of Michigan.</p><h2> Fire</h2>
    <div>
      <h3>Lahaina, Hawaii</h3>
      <a href="#lahaina-hawaii">
        
      </a>
    </div>
    <p>In early August, a <a href="https://en.wikipedia.org/wiki/2023_Hawaii_wildfires">series of wildfires</a> broke out in the state of Hawaii, predominantly on the island of Maui. The town of <a href="https://en.wikipedia.org/wiki/Lahaina,_Hawaii">Lahaina</a> was one of the hardest hit, with the fires <a href="https://mauinow.com/2023/10/05/one-more-lahaina-fire-victim-identified-by-police-death-toll-is-98-unaccounted-for-is-12/">killing nearly 100 people</a>, as well as destroying homes, businesses, and infrastructure, causing power outages and disrupting Internet connectivity. The graph below shows traffic to Cloudflare from Lahaina dropping to near zero around 21:00 local time on August 7 (07:00 UTC on August 8), and remaining at minimal levels through August 30. Some recovery of Internet traffic can be seen through the end of September as cleanup and repairs progressed, and as wireless operators <a href="https://www.fiercewireless.com/wireless/wireless-operators-scramble-restore-service-after-maui-wildfires">deployed temporary network assets</a> in an effort to restore some service capacity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QPriwnFS9bqWubV8OofZu/ac93e1a4c38141cdcc9d8d43cc2ccb25/Sep-30---US---Hawaii---Lahaina.png" />
            
            </figure><h2> Earthquake</h2>
    <div>
      <h3>Morocco</h3>
      <a href="#morocco">
        
      </a>
    </div>
    <p>At 23:11 local time on September 8 (22:11 UTC), a <a href="https://twitter.com/LastQuake/status/1700271514925297843?s=20">magnitude 6.8 earthquake</a> occurred in <a href="https://radar.cloudflare.com/ma">Morocco</a>, centered 79 kilometers (49 miles) southwest of Marrakesh. Nearly 3,000 deaths were reported as a result of the quake, and <a href="https://en.wikipedia.org/wiki/2023_Marrakesh%E2%80%93Safi_earthquake#Impact">significant damage was reported</a>, including the collapse of schools, houses, and historic buildings. Power outages and infrastructure damage also impacted Internet connectivity in the region, leading to largely localized disruptions.</p><p>The country-level graph below shows a nominal loss of traffic in Morocco after the earthquake, remaining slightly lower than expected for approximately four days. However, the impacts are more evident at a regional level, with the earthquake causing an immediate 64% drop in traffic in Marrkesh-Safi, a 64% loss in Souss-Massa, and a 49% decline in Casablanca-Settat. Peak traffic levels in these regions remained slightly lower than those seen in previous weeks for several days after the earthquake occurred.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Qn9u4J8L1g6m8FGnk5s99/1530fc7ceb43330b5b2a0d15a48c8e4d/Sep-8-13-Morocco---regional.jpeg.jpeg" />
            
            </figure><h2> Power outages</h2>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>On July 27, a <a href="https://twitter.com/CloudflareRadar/status/1684688380200718336">malfunction at a major Aqualectra Utility power distribution center</a> resulted in 70% of neighborhoods in <a href="https://radar.cloudflare.com/cw">Curaçao</a> losing power. The power outage resulted in an island-wide Internet disruption. As seen in the graph below, Internet traffic fell sharply at around 12:30 local time (16:30 UTC), remaining largely flat for approximately five hours before starting to recover around 17:30 local time (21:30 UTC). The start of the recovery aligns with the timing of a <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02pAwrM5qat5vsRpxpGeDz9AfJyqzeyXYT4AVecxjCJWN93QyKsGRCktzWnCLWsHX5l">Facebook post made at 18:00 local time</a> by Aqualectra Utility noting that “<i>55% of Curaçao’s power supply has been restored.</i>” The ongoing traffic increase is in line with additional neighborhoods having power restored, with traffic returning to expected levels by around 22:00 local time (2:00 UTC on July 28).</p>
    <div>
      <h3>Brazil</h3>
      <a href="#brazil">
        
      </a>
    </div>
    <p>A <a href="https://abcnews.go.com/Business/wireStory/widespread-blackout-leaves-parts-brazil-electricity-102282449">widespread power outage in Brazil</a> starting at 08:30 local time (11:30 UTC) on August 15 resulted in a nominal disruption to Internet traffic within the country. Although the power outage represented a loss of approximately <a href="https://www.linkedin.com/pulse/bazil-blackout-15th-august-2023-member-ieee-cigre-eei">27% of the total electric load</a> at the time it occurred, the impact to the country’s Internet traffic was much lower, as seen in the graph below. Traffic returned to expected levels by around 11:30 local time (14:30 UTC).</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>A “system disturbance” at 21:45 local time (18:45 UTC) on August 25 led to “loss of bulk power supply to various parts of the country” in <a href="https://radar.cloudflare.com/ke">Kenya</a>, according to an <a href="https://twitter.com/CloudflareRadar/status/1695235744258838585">X/Twitter post</a> from <a href="https://www.kplc.co.ke/">Kenya Power</a>. The impact of the power outage is visible in the graph below, with traffic dropping as power is lost. Subsequent updates from Kenya Power on August 26 (<a href="https://twitter.com/KenyaPower_Care/status/1695195264670183754">1</a>, <a href="https://twitter.com/KenyaPower_Care/status/1695229820823556483">2</a>, <a href="https://twitter.com/KenyaPower/status/1695353129368277431">3</a>) highlighted the progress made in restoring electricity across the country. Internet traffic from the country returned to expected levels by 03:00 on August 27 (00:00 UTC).</p>
    <div>
      <h3>French Guiana</h3>
      <a href="#french-guiana">
        
      </a>
    </div>
    <p>An 11-hour Internet disruption in <a href="https://radar.cloudflare.com/gf">French Guiana</a> on August 27 was the result of a <a href="https://www-franceguyane-fr.translate.goog/actualite/faitsdivers/coupure-delectricite-saint-laurent-du-maroni-et-ses-environs-retrouvent-le-courant-950591.php?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">power outage</a> caused by “<i>a problem that occurred at the energy evacuation station which connects Petit-Saut to the Kourou-Saint-Laurent line</i>”. The power outage caused a nationwide drop in Internet traffic between 11:00 local time (14:00 UTC) and 22:00 local time (01:00 UTC on August 28), visible in the graph below.</p>
    <div>
      <h3>Tunisia</h3>
      <a href="#tunisia">
        
      </a>
    </div>
    <p>A fire at the <a href="https://www.steg.com.tn/fr/index.html">Tunisian Company of Electricity and Gas</a> power station in Rades, Ben Arous Governorate caused a <a href="https://crisis24.garda.com/alerts/2023/09/tunisia-power-outages-ongoing-nationwide-early-sept-20">widespread power outage</a> in <a href="https://radar.cloudflare.com/tn">Tunisia</a>, resulting in an Internet disruption starting at 01:00 local time (00:00 UTC) on September 20. Traffic remained lower than expected for approximately five hours, as shown in the graph below, in line with a <a href="https://africannugget.com/new-tunisia-suffers-widespread-power-outage/">published report</a> that noted “<i>The unexpected outage lasted for over four hours in some areas of the country.</i>”</p>
    <div>
      <h3>Barbados</h3>
      <a href="#barbados">
        
      </a>
    </div>
    <p>A September 21 <a href="https://www.facebook.com/blpconline/posts/pfbid024uwgnaqzD57ca5sJ21mZcnffdHeMkPzthekwaUNWaio7PuyWJNvEVBpPquY2KAqWl">Facebook post</a> from <a href="https://www.blpc.com.bb/">The Barbados Light &amp; Power Company Limited</a> noted that the company was aware of an outage affecting customers, and that they were “<i>working to promptly and safely restore power in the shortest time possible.</i>” This outage resulted in a significant drop in Internet traffic from the country starting at 11:30 local time (15:30 UTC). A subsequent <a href="https://www.facebook.com/blpconline/posts/pfbid02dG4fzDSJfjS7Q2NnacvLjU6rSp52UyjPMerX9xjnJQNcEwr2KVq27twKRLaufwLEl">Facebook post</a> from the utility company at 20:00 local time (00:00 UTC on September 22) noted that power had been restored to all customers. Ahead of full power restoration, Internet traffic had returned to expected levels around 17:00 local time (21:00 UTC).</p><h2> Maintenance</h2>
    <div>
      <h3>Guinea</h3>
      <a href="#guinea">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Guin%C3%A9enne_de_Large_Bande">La Guinéenne de la Large Bande</a>, also known as GUILAB, is the company responsible for managing the capacity allocated to the country of <a href="https://radar.cloudflare.com/gn">Guinea</a> on the <a href="https://www.submarinecablemap.com/submarine-cable/africa-coast-to-europe-ace">Africa Coast to Europe (ACE)</a> submarine cable. According to a (translation of the) <a href="https://www.facebook.com/photo?fbid=1096640891463744&amp;set=a.787672269027276">communiqué posted by the company</a> on Facebook, planned maintenance on the cable would be taking place between 22:00 on July 14 and 06:18 "sharp" on July 15 (22:00 on July 14 and 06:18 on July 15 UTC). This maintenance resulted in a complete Internet outage in Guinea, as seen in the graph below. It appears that the ACE submarine cable is Guinea’s sole international Internet connection, with no other backup submarine or terrestrial connectivity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/cRXHlT0Q2qbtZvWVvZ9hW/0386fa98651ca3acc25ab9451b41f664/Screenshot-2023-10-23-at-18.02.31.png" />
            
            </figure>
    <div>
      <h3>Palau</h3>
      <a href="#palau">
        
      </a>
    </div>
    <p>Just a few days later, planned maintenance to another submarine cable took <a href="https://radar.cloudflare.com/pw">Palau</a>, an island country in the western Pacific, completely offline for several days. According to a <a href="https://www.facebook.com/connectingpalau/posts/pfbid0213hUTxWFruhe3K211F6VRNL9iLZzV5Y3vMvJoscDgQyQeVdZ1a5ip81dkFnp5egsl">press release from the Palau National Communications Corporation (PNCC)</a> posted to their Facebook page, “<a href="https://belaucable.com/"><i>BSCC (Belau Submarine Cable Corporation)</i></a><i> has been notified that an emergency repair will be undertaken on the </i><a href="https://www.submarinecablemap.com/submarine-cable/sea-us"><i>SEA – US cable network</i></a><i> in Guam from Tuesday, July 18th 7:00 a.m. Palau time, and expected to be completed 5:00 p.m. Saturday, July 22nd. … For safety reasons, repairs can only be undertaken when the cable is not powered. Since BSCC’s Palau Cable Network No 1 connects to SEA – US for onward transport to Guam, BSCC will be unable to provide service for the duration of the repair. BSCC will be unable to provide any international connectivity for Palau. The only available international connection will be via PNCC satellite connection, which will provide limited capacity compared to normal cable service.</i>”</p><p>The graph below shows that Cloudflare did not see any appreciable traffic from Palau’s backup satellite connection during the duration of the repairs, as traffic dropped to zero at 07:00 local time on July 18 (22:00 UTC on July 17), and remained there until around 18:00 local time on July 21 (09:00 UTC), as the repairs were completed earlier than expected. A <a href="https://www.pnccpalau.com/img/pages/news/2023/2023072118/palaus-internet-service-restored-effective-july-21-2023.jpg">PNCC press release</a> confirmed this early completion, noting “<i>PNCC is pleased to inform the public that Internet and Mobile Data services for our customers have been restored, due to the early completion today of the emergency repairs on the SEA-US Submarine Cable System, our main off-island internet connection.</i>”</p><h2> Unspecified issues</h2>
    <div>
      <h3>Spectrum (Charter Communications)</h3>
      <a href="#spectrum-charter-communications">
        
      </a>
    </div>
    <p>At 14:03 Eastern Time (18:03 UTC) on August 17, the X/Twitter support account for <a href="https://www.spectrum.com/">Spectrum</a>, a brand of US-based Internet service provider <a href="https://corporate.charter.com/about-charter">Charter Communications</a>, posted a statement that noted “<i>We are aware of an outage affecting customers in Alabama, Georgia and Tennessee. We apologize for the inconvenience and are working to resolve as quickly as possible. Thank you.</i>” The graphs below show the varied impacts to traffic seen from <a href="https://radar.cloudflare.com/as20115">Spectrum (AS20115)</a> across the listed states, as well as Texas, which wasn’t initially cited by Spectrum as having an issue, though customers quickly called it out.</p><p>A near complete outage was observed in Tennessee between 12:30 - 14:00 local time (17:30 - 19:00 UTC), while a brief drop in traffic at 12:00 local time (17:00 UTC) and quick recovery ahead of another drop at 13:30 local time (18:30 UTC) was seen in Alabama. Georgia also saw an initial drop in traffic at 13:00 local time (17:00 UTC) ahead of a larger fall at 14:30 local time (18:30 UTC), while traffic from Texas only experienced a decline at 13:30 local time (18:30 UTC). Traffic volumes from all four impacted states recovered within several hours — approximately three hours after the initial post, Spectrum’s support account <a href="https://twitter.com/Ask_Spectrum/status/1692283651088892075">stated</a> “<i>We have received confirmation repairs have been completed and services have been restored to affected customers in the Alabama, Georgia and Tennessee area.</i>”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gHHA0gEAJVro9BP4x7YhZ/879f681f5b97abca6fa60fadb27004f2/Aug-17---US---Tennessee.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xMtXNg9V20ofyqAAXyM8Q/313e0cf80407978b6d34c4d40e4e4788/Aug-17---US---Alabama.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Q3MwtERj1XuSy1vixSRNw/d28188b5e18cd0db2b2a152617a9ced1/Aug-17---US---Georgia.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w9apq0T1yH238tYxAS7xX/1da7e64febf5deca94405f50f68a88f8/Aug-17---US---Texas.png" />
            
            </figure>
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>On September 12, satellite Internet service provider <a href="https://www.starlink.com/">SpaceX Starlink</a> experienced a brief but complete outage. The graph below shows traffic from <a href="https://radar.cloudflare.com/AS14593">AS14593 (SPACEX-STARLINK)</a> dropping at 23:15 UTC, but quickly recovering, returning to normal within 90 minutes. At 00:33 UTC on September 13, <a href="https://twitter.com/Starlink/status/1701756057171951888">Starlink shared an X/Twitter post</a> stating “<i>Starlink is currently in a network outage, and we are actively implementing a solution. We appreciate your patience, we'll share an update once this issue is resolved</i>” and just over an hour later, posted “<i>The network issue has been fully resolved</i>”.</p>
    <div>
      <h3>Sky UK</h3>
      <a href="#sky-uk">
        
      </a>
    </div>
    <p>During the evening (UTC) of September 19, <a href="https://twitter.com/search?f=live&amp;q=outage%20(%40skyuk)%20until%3A2023-09-20%20since%3A2023-09-19&amp;src=typed_query">numerous complaints could be found on social media</a> about a nationwide outage across the <a href="https://radar.cloudflare.com/gb">United Kingdom</a> on <a href="https://radar.cloudflare.com/as5607">Sky Broadband (AS5607)</a>. A sharp drop in traffic from Sky Broadband can be seen in the graph below starting at 21:00 UTC, but a full outage did not appear to have taken place. Traffic volumes below expected levels lasted until approximately 01:00 UTC on September 20. While the issue was <a href="https://twitter.com/SkyHelpTeam/status/1704416323717980310">acknowledged by Sky’s support account</a> on X/Twitter, no root cause for the disruption was ever provided.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>As we’ve noted in past quarterly summaries, this report is intended as a summary overview of observed disruptions, and not an exhaustive or complete list of issues that have occurred during the quarter. Some disruptions not covered here were visible in our data, but never acknowledged by the impacted provider, while others were reported by industry colleagues based on their measurement methodologies, but not clearly obvious in our traffic graphs.</p><p>As we indicated above, the Cloudflare Radar Outage Center now includes information on observed traffic anomalies as well as verified outages. Interested users can subscribe to notifications for both anomalies and outages — our <a href="/traffic-anomalies-notifications-radar/">blog post</a> includes more information on how to do so.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">4bmuTknUrxJ8DUOH11OzR2</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Q2 2023 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2023-internet-disruption-summary/</link>
            <pubDate>Thu, 27 Jul 2023 13:05:00 GMT</pubDate>
            <description><![CDATA[ In this post, we review selected Internet disruptions observed by Cloudflare during the second quarter of 2023, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EsAmtsLnCpLq5r9OakjdR/51939154d1cff6dedc9ab5b84587111a/Global-Latency_new-colours-1.png" />
            
            </figure><p>Cloudflare operates in more than 300 cities in over 100 countries, where we interconnect with over 12,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions.</p><p>The second quarter of 2023 was a particularly busy one for Internet disruptions, and especially for government-directed Internet shutdowns. During the quarter, we observed many brief disruptions, but also quite a few long-lived ones. In addition to the <a href="#government-directed">government-directed Internet shutdowns</a>, we also observed partial or complete outages due to <a href="#severe-weather">severe weather</a>, <a href="#cable-damage">cable damage</a>, <a href="#power-outages">power outages</a>, general or unspecified <a href="#technical-problems">technical problems</a>, <a href="#cyberattacks">cyberattacks</a>, <a href="#military-action">military action</a>, and <a href="#infrastructure-maintenance">infrastructure maintenance</a>.</p><p>As we have noted in the past, this post is intended as a summary overview of observed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter.</p><h2> Government directed</h2><p>Late spring often marks the start of a so-called “exam season” in several Middle Eastern and African countries, where students sit for a series of secondary school exams. In an attempt to prevent cheating on these exams, governments in the countries have taken to implementing wide-scale Internet shutdowns covering time periods just before and during the exams. We have covered these shutdowns in the past, including <a href="/sudans-exam-related-internet-shutdowns/">Sudan</a> and <a href="/syria-exam-related-internet-shutdowns/">Syria</a> in 2021 and <a href="/syria-sudan-algeria-exam-internet-shutdown/">Syria, Sudan, and Algeria</a> in 2022. This year, we saw governments in <a href="/exam-internet-shutdowns-iraq-algeria/">Iraq, Algeria</a>, and Syria taking such actions.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>In the weeks prior to the start of this year’s shutdowns, it was <a href="https://www.kurdistan24.net/en/story/31453-Iraq%E2%80%99s-communication-ministry-refuses-to-enforce-internet-blackout-for-final-exams">reported</a> that the Iraqi Ministry of Communications had announced it had refused a request from the Ministry of Education to impose an Internet shutdown during the exams as part of efforts to prevent cheating. Unfortunately, this refusal was short-lived, with shutdowns ultimately starting two weeks later.</p><p>In Iraq, two sets of shutdowns were observed: one impacted networks nationwide, except for the Kurdistan Region, while the other impacted networks within the Kurdistan Region. The former set of shutdowns were related to 9th and 12th grade exams, and were scheduled to occur from June 1 through July 15, between 04:00 and 08:00 local time (01:00 - 05:00 UTC). The graphs below show that during June, shutdowns took place on June 1, 4, 6, 8, 11, 13, 15, 17, 21, 22, 24, 25, and 26, resulting in significant disruptions to Internet connectivity. The shutdowns were implemented across a number of network providers, including <a href="https://radar.cloudflare.com/as203214">AS203214 (HulumTele</a>), <a href="https://radar.cloudflare.com/as59588">AS59588 (Zain)</a>, <a href="https://radar.cloudflare.com/as199739">AS199739 (Earthlink)</a>, <a href="https://radar.cloudflare.com/as203735">AS203735 (Net Tech)</a>, <a href="https://radar.cloudflare.com/as51684">AS51684 (Asiacell)</a>, and <a href="https://radar.cloudflare.com/as58322">AS58322 (Halasat)</a>. The orange-highlighted areas in the graphs below show traffic on each network provider dropping to zero during the shutdowns.</p><p>As noted above, exam-related Internet shutdowns were also implemented in the Kurdistan region of Iraq. One <a href="https://www.basnews.com/en/babat/809911">report</a> quoted the Minister of Education of the Kurdistan Regional Government as stating "<i>The Internet will be turned off as needed during exams, but just like in previous years, the period of the Internet shutdown will not be lengthy, but rather short.</i>” To that end, the observed shutdowns generally lasted about two hours, occurring between 06:30 and 08:30 local time (03:30 - 05:30 UTC) on June 3, 6, 10, 13, 17, and 24. The graphs below show the impact across three network providers in the region: <a href="https://radar.cloudflare.com/as21277">AS21277 (Newroz Telecom)</a>, <a href="https://radar.cloudflare.com/as48492">AS48492 (IQ Online)</a>, and <a href="https://radar.cloudflare.com/as59625">AS59625 (KorekTel)</a>.</p><p>Additional details about both sets of Internet shutdowns in Iraq can be found in our June 13 blog post: <a href="/exam-internet-shutdowns-iraq-algeria/"><i>Exam-related Internet shutdowns in Iraq and Algeria put connectivity to the test</i></a>.</p>
    <div>
      <h3>Algeria</h3>
      <a href="#algeria">
        
      </a>
    </div>
    <p>2023 marks the <a href="https://www.newarab.com/news/algeria-blocks-internet-stop-cheating-during-final-exams">sixth year</a> that Algeria has disrupted Internet connectivity to prevent cheating during nationwide exams. In <a href="/syria-sudan-algeria-exam-internet-shutdown/">2022</a>, we noted that “<i>it appears that the Algerian government has shifted to a content blocking-based approach, instead of a wide-scale Internet shutdown.</i>” It appears that the same approach was taken this year, as we again observed two nominal drops in traffic during each of the exam days, rather than a complete loss of traffic. These traffic shifts were observed on mobile network providers <a href="https://radar.cloudflare.com/as33779">AS33779 (Ooredoo/Wataniya)</a>, <a href="https://radar.cloudflare.com/as327931">AS327931 (Djezzy/Optimum)</a>, and <a href="https://radar.cloudflare.com/as327712">AS327712 (Mobilis/Telecom Algeria)</a>. The first disruption takes place between 08:00 - 12:00 local time (07:00 - 11:00 UTC), with the second occurring between 14:00 - 17:00 local time (13:00 - 16:00 UTC).</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>After implementing four exam-related Internet shutdowns in 2022, this year saw just two. On June 25 and 26, Internet shutdowns took place between 05:00 - 08:30 local time (02:00 - 05:30 UTC). <a href="https://radar.cloudflare.com/as29256">Syrian Telecom (AS29256)</a>, the government-affiliated telecommunications company, informed subscribers in a <a href="https://www.facebook.com/syriantelecomcompany/posts/pfbid02vPpu2tTyEtxsaqupSF3MvqxrsMLTvJGpzYVvwzoQ3CFX3xuZJ23euJFkXxdZbtubl">Facebook post</a> that the Internet would be cut off at the request of the <a href="http://www.syrianeducation.org.sy/">Ministry of Education</a>.</p>
    <div>
      <h3>Senegal</h3>
      <a href="#senegal">
        
      </a>
    </div>
    <p>In Senegal, <a href="https://www.reuters.com/world/africa/senegals-protest-hit-capital-left-with-looted-shops-debris-2023-06-03/">violent protests</a> over the sentencing of opposition leader Ousmane Sonko to jail led the government to <a href="https://pulse.internetsociety.org/shutdowns/senegal-blocks-social-media-and-instant-messaging-amidst-protests">restrict access to platforms</a> including WhatsApp, Facebook, Twitter, Instagram, TikTok, Telegram, Signal, and YouTube. On June 4, the Senegal Ministry of Communication issued a statement temporarily suspending mobile Internet access, with a followup statement on June 6 ending the suspension. These disruptions to mobile Internet access were visible on two network providers within the country: <a href="https://radar.cloudflare.com/as37196">AS37196 (Sudatel Senegal)</a> and <a href="https://radar.cloudflare.com/as37649">AS37649 (Tigo/Free)</a>.</p><p>As shown in the graphs below, the shutdowns on Sudatel Senegal occurred from 15:00 local time on June 3 through 01:00 local time on June 5, and then again from 13:00 local time on June 5 until 01:00 local time on June 6. The three shutdowns seen on Tigo/Free took place between 15:30 - 19:00 local time on June 3, from 13:45 local time on June 4 until 02:05 local time on June 5, and from 13:05 local time on June 5 through 01:00 local time on June 6. (Senegal is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Mauritania</h3>
      <a href="#mauritania">
        
      </a>
    </div>
    <p>In Mauritania, <a href="https://www.barrons.com/news/mauritania-cuts-mobile-internet-after-violent-protests-d92e7204">authorities cut off mobile Internet services</a> after protests over the death of a young man in police custody. The shutdown began at 23:00 local time on May 30, and lasted six days, with connectivity returning at 23:00 local time on June 6. (Mauritania is UTC+0, so the local times are the same as UTC.) The graphs below show a near complete loss of Internet traffic during that period from <a href="https://radar.cloudflare.com/as37541">AS37541 (Chinguitel)</a> and <a href="https://radar.cloudflare.com/as37508">AS37508 (Mattel)</a>, two mobile network providers within the country.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>On May 9, Imran Khan, former Prime Minister of Pakistan was <a href="https://www.bbc.com/news/world-asia-65541518">arrested on corruption charges</a>. Following the arrest, <a href="https://www.aljazeera.com/news/2023/5/9/pakistan-blocks-social-media-platforms-restricts-internet">violent protests</a> erupted in several cities, leading the government of Pakistan to order the <a href="https://www.theguardian.com/world/2023/may/09/pakistan-former-pm-imran-khan-arrested-in-islamabad">shutdown of mobile Internet services</a>, as well as the <a href="https://www.aljazeera.com/news/2023/5/9/pakistan-blocks-social-media-platforms-restricts-internet">blocking of several social media platforms</a>. The figures below show the impact of the ordered shutdown to traffic on four mobile network providers within the country: <a href="https://radar.cloudflare.com/as24499">AS24499 (Telenor Pakistan)</a>, <a href="https://radar.cloudflare.com/as59257">AS59257 (China Mobile Pak)</a>, <a href="https://radar.cloudflare.com/as45669">AS45669 (Mobilink/Jazz)</a>, and <a href="https://radar.cloudflare.com/as56167">AS56167 (Ufone/PTML)</a>. The ordered shutdown caused a complete loss of Internet traffic from these networks that started at 22:00 local time (17:00 UTC) on May 9 at Telenor and China Mobile Pakistan, 18:00 local time (13:00 UTC) on Mobilink/Jazz, and 01:00 local time on May 10 (20:00 UTC on May 9) at Ufone/PTML. Traffic was restored at 22:00 local time (17:00 UTC) on May 12.</p><p>Looking at Cloudflare Radar’s <a href="/introducing-radar-internet-quality-page/">recently launched</a> <a href="https://radar.cloudflare.com/quality/pk">Internet Quality page for Pakistan</a> during the duration of the shutdown, we observed that median latency within Pakistan dropped slightly after mobile networks were shut down, shown in the graph below. Prior to the shutdown, median latency (as observed to Cloudflare and a set of other providers) was in the 90-100ms range, while afterward, it averaged closer to 75ms. This may be a result of users shifting to lower latency fixed broadband connections – several fixed broadband providers in the country experienced increased traffic volumes while the mobile networks were unavailable.</p><p>Additional details about the mobile network shutdowns, content blocking, and the impact at an administrative unit and city level can be found in our May 12 blog post <a href="/cloudflares-view-of-internet-disruptions-in-pakistan/"><i>Cloudflare’s view of Internet disruptions in Pakistan</i></a>.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>Internet shutdowns are unfortunately frequent in India, with digital rights organization Access Now <a href="https://www.accessnow.org/press-release/keepiton-internet-shutdowns-2022-india/">reporting</a> at least 84 shutdowns within the country in 2022. The shutdowns are generally implemented at a more local level, and often last for a significant amount of time. One such shutdown took place in the northeastern Indian state of Manipur <a href="https://www.thehindu.com/news/national/other-states/curfew-in-eight-districts-of-manipur-mobile-internet-services-suspended-over-tribal-stir/article66809376.ece">starting on May 3</a> after the escalation of ethnic conflict, and was <a href="https://internetfreedom.in/the-duration-of-internet-shutdowns-in-manipur-crosses-10-days-iff-wrote-to-manipur-chief-secretary-urging-scrutiny-of-orders-keepiton/">reportedly</a> intended to <i>“thwart the design and activities of anti-national and anti-social elements… by stopping the spread of disinformation and false rumours''</i> and the likelihood of <i>“serious disturbances to the entire peaceful coexistence of the communities and maintenance of public order”</i>. Mobile data services were <a href="https://internetfreedom.in/manipur-letter-50-days-internet-shutdown/">initially suspended for a five-day period</a>, with the suspension continually extended through additional templated orders issued every five days.</p><p>The graphs below show the impact of the ordered shutdown to traffic from two major network providers in Manipur. Traffic from both <a href="https://radar.cloudflare.com/as45609">AS45609 (Airtel)</a> and <a href="https://radar.cloudflare.com/as9829">AS9829 (BSNL)</a> fell significantly around 18:00 local time (12:30 UTC) on May 4. Traffic on Airtel has remained low, and continued to drop further through the end of June. Traffic on BSNL showed slight signs of recovery starting in early June, but remains extremely low.</p><p>The shutdown order remains in place as of the time of this writing (late July).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HwP1642cnLTIhbn0dXbq4/204f5a2b4ea57b219b19b73636ab38e8/May-June---India---Manipur---45609.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GEtoALCbrzva79cbSFBJU/2abbc7a0abf1d3be0d29625920f557e8/May-June---India---Manipur---9829.png" />
            
            </figure><h2>Severe weather</h2>
    <div>
      <h3>Guam</h3>
      <a href="#guam">
        
      </a>
    </div>
    <p>On May 24, <a href="https://apnews.com/article/super-typhoon-mawar-guam-pacific-fd49b810f85f69d1e86f9ee6b0cc3583">“Super Typhoon” Mawar</a> wreaked havoc on the US territory of Guam, causing widespread physical damage after it made landfall, taking down trees, buildings, power lines, and communications infrastructure across the island. One result of this damage was a significant disruption to Internet connectivity, as shown in the country-level graph below. Restoration efforts started almost immediately, with <a href="https://guampowerauthority.com/bulletin/">Guam Power Authority</a>, <a href="https://bettertogether.pr.co/">Docomo Pacific</a>, and <a href="https://www.facebook.com/gtateleguam/">GTA Teleguam</a> all posting regular status updates on their websites and/or social media accounts.</p><p>Among the two Internet providers, <a href="https://radar.cloudflare.com/as9246">GTA Teleguam (AS9246)</a> was largely able to complete service restoration in June, with traffic returning to pre-storm levels around June 17, as seen in the graph below. In fact, in a <a href="https://www.facebook.com/gtateleguam/posts/pfbid02yRSxmMzPZoy4q7chjwZ9YugUoGuf3Y1rd8dx479xC23AsaDHbdVC2v8PcRcWNYAjl">June 20 Facebook post</a> they noted that “<i>As of today, a majority of our wireless network cell sites are operational.</i>” However, recovery at <a href="https://radar.cloudflare.com/as3605">Docomo Pacific (AS3605)</a> is taking significantly longer. The graph below shows that as of the end of June, traffic remained significantly below pre-storm levels.</p><h2>Cable damage</h2>
    <div>
      <h3>Bolivia</h3>
      <a href="#bolivia">
        
      </a>
    </div>
    <p>On June 19, COTAS, a Bolivian telecommunications company, posted an <a href="https://t.co/q4yobPwM8i">update on their Facebook page</a> that alerted users that a fiber optic cable had been cut in the town of Pongo. As seen in the graphs below, this cut significantly disrupted Internet connectivity across COTAS and two other network providers in the country: <a href="https://radar.cloudflare.com/as25620">AS25620 (COTAS)</a>, <a href="https://radar.cloudflare.com/as27839">AS27839 (Comteco)</a>, and <a href="https://radar.cloudflare.com/as52495">AS52495 (Cotel)</a> between 13:00 - 18:00 local time (17:00 -  22:00 UTC).</p>
    <div>
      <h3>The Gambia</h3>
      <a href="#the-gambia">
        
      </a>
    </div>
    <p>Gamtel, the state telecommunications company in The Gambia, notified subscribers via a <a href="https://twitter.com/Gamtel/status/1666466756909584386">Twitter post on June 7</a> of a localized fiber cut, and then of <a href="https://twitter.com/Gamtel/status/1666763123502505985">additional cable cuts on June 8</a>. These fiber cuts disrupted Internet connectivity on <a href="https://radar.cloudflare.com/as25250">AS25250 (Gamtel)</a> between 14:00 local time on June 7 and 00:00 local time on June 9, with traffic volumes down as much as 80% as compared to the previous period. (The Gambia is UTC+0, so the local times are the same as UTC.)</p>
    <div>
      <h3>Philippines</h3>
      <a href="#philippines">
        
      </a>
    </div>
    <p><a href="https://twitter.com/pldt/status/1665670783388254208">An advisory posted on Twitter</a> by Philippines telecommunications provider PLDT at 18:43 local time (10:43 UTC) on June 5 stated “<i>One of our submarine cable partners confirms a loss in some of its internet bandwidth capacity, and thus causing slower Internet browsing. We are working with our partners to provide alternate capacity that would restore the browsing experience in the next few hours.</i>” The traffic graph below shows a minor disruption to Internet traffic for <a href="https://radar.cloudflare.com/as9299">AS9299 (PLDT)</a> starting around 14:00 local time (06:00 UTC), and the “slower Internet browsing” noted by PLDT is evident in the Internet quality graphs below, with increased latency and decreased bandwidth evident around that same time. PLDT stated in a <a href="https://twitter.com/pldt/status/1665851245096218624">subsequent tweet</a> that as of 06:22 local time on June 6 (22:22 UTC on June 5), “<i>Our submarine cable partner confirms supplementing additional capacity, restoring browser experience.</i>”</p><h2>Power outages</h2>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p><a href="https://www.aqualectra.com/">Aqualectra</a> is the primary utility company in Curaçao, providing water and power services. On June 8, they posted a series of alerts to their Facebook page (<a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02P57AWLNqLjpGBYgS2sKmmMkNJw2hYGk5mBgBJAAHnoEzSXnB8e2ssssnZEWfXdSdl">1</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid0ZKYCagJHtZBP9fo2M63ZuCYXGh35xL7rv8priq27is58oK8QpffTQhvuNr8J8xwJl">2</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid0nwEgCw9X68rqdTjJWTM9N1g9icKhWBAyYHV3vjMavMTJpFhhmgV3DRCYNpw4WYzNl">3</a>, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02rzN9MHqEH4BZ8TJ3HCJJhXrxfzgA1g6quiRnc5S3M8uoUi5Jd2eV1BudEaRRFa5Zl">4</a>) regarding a power outage impacting “all neighborhoods”, caused by a malfunction in one of the main power cables connected to the substation at Parera. This loss of power impacted Internet connectivity on the island, with a significant loss of traffic observed at a country level, as seen in the graph below, as well as across several Internet service providers, including <a href="https://radar.cloudflare.com/as11081">AS11081 (UTS)</a>, <a href="https://radar.cloudflare.com/as52233">AS52233 (Columbus Communications)</a>, and <a href="https://radar.cloudflare.com/as27660">AS27660 (Curaçao Telecom)</a>. A <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02Lq9WQPt8RRKk2hcY3Mo32Zx33t38XabqQoVjvWBBKMyLTT62jXBWJuxwX43jLrXgl">followup Facebook post</a> dated 01:25 local time on June 9 (05:25 UTC) confirmed the restoration of power to all neighborhoods.</p>
    <div>
      <h3>Portugal</h3>
      <a href="#portugal">
        
      </a>
    </div>
    <p>A power outage at an Equinix data center in Prior Velho (near Lisbon) on the afternoon of June 6 affected local utilities, banking services, and court networks, according to published reports (<a href="https://www.publico.pt/2023/06/06/tecnologia/noticia/falhas-afectam-operadoras-internet-nacionais-2052421">1</a>, <a href="https://www.dn.pt/sociedade/falha-de-energia-no-prior-velho-perturba-internet-em-portugal-16486572.html">2</a>). Portuguese Internet service provider MEO was also impacted by the power outage, which caused a drop in traffic for <a href="https://radar.cloudflare.com/as3243">AS3243 (MEO-RESIDENCIAL)</a> and <a href="https://radar.cloudflare.com/as15525">AS15525 (MEO-EMPRESAS)</a>, seen in the graphs below. The disruptions caused by the power outage also impacted connectivity quality within Portugal, as the Radar Internet quality graphs below highlight – a concurrent drop in bandwidth and increase in latency is visible, indicating that end users likely experienced poorer performance during that period of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1S6Vc0X6EP6RuHf6c7TnFW/45976cbce229d73954c9f1b28dff2a33/June-6---Portugal---AS3243.jpeg.jpeg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64e52Dfjd4mgkjSTYyWXTa/e2084dcdef47e10229d8753e3f6c5a94/June-6---Portugal---AS15525.jpeg.jpeg" />
            
            </figure>
    <div>
      <h3>Botswana</h3>
      <a href="#botswana">
        
      </a>
    </div>
    <p>A countrywide power outage in Botswana on May 19 caused an Internet disruption that lasted about 90 minutes, from 10:45 until 12:15 local time (08:45 - 10:15 UTC), visible in the graph below. A <a href="https://twitter.com/BPCBw/status/1659542170640982016">tweet from Botswana Power Corporation</a> provided public notice of the incident, but did not include a root cause.</p>
    <div>
      <h3>Barbados</h3>
      <a href="#barbados">
        
      </a>
    </div>
    <p>On April 4, <a href="https://twitter.com/TweetBLPC/status/1643278955808423937">The Barbados Light &amp; Power Company tweeted an “Outage Notice”</a>, stating “<i>We are aware that our customers across the island are currently without electricity.</i>” Posted at 11:46 local time (15:46 UTC), the notice comes shortly after a significant drop in traffic was observed country-wide, indicating that the power outage also impacted Internet connectivity across the country. After posting several additional updates throughout the day, a final update posted at 18:00 local time (22:00 UTC) indicated that power had been restored to 100% of impacted customers. The graph below shows that traffic took several additional hours to return to normal levels. (Note that the orange highlighting in the graph represents the duration of the disruption, and the red shading is related to an internal data collection issue.)</p><h2>Technical problems</h2>
    <div>
      <h3>Namibia</h3>
      <a href="#namibia">
        
      </a>
    </div>
    <p>A seven-hour Internet disruption observed in Namibia on June 15 and 16 was caused by unspecified “technical challenges” faced by Telecom Namibia. According to a <a href="https://twitter.com/TelecomNamibia/status/1669654083706277888">tweet</a> from the provider, “<i>Telecom Namibia experienced technical challenges on its fixed and mobile data services on Thursday leading to intermittent Internet connectivity.</i>” The impact of these challenges is visible in both the country- and network-level traffic graphs below.</p>
    <div>
      <h3>Solomon Islands</h3>
      <a href="#solomon-islands">
        
      </a>
    </div>
    <p>Unspecified “technical reasons” also disrupted mobile Internet connectivity for Our Telekom customers in the Solomon Islands on April 26 and 27. An April 26 <a href="https://www.facebook.com/ourtelekom/posts/pfbid0vFYKtzqP9J7WuRXQYb2ihXRfoU92kCN5dxGkq3SG5LCSVXCwt5fTrgxxhTadhsFxl">Facebook post</a> from Our Telekom simply stated “<i>Our mobile data network is currently down due to technical reasons.</i>” The graphs below show a significant drop in traffic for <a href="https://radar.cloudflare.com/as45891">AS45891 (Our Telekom/SBT)</a> between 06:30 local time on April 27 (19:30 UTC on April 26) and 17:00 local time on April 27 (06:00 UTC). The loss of mobile traffic from Our Telekom also impacted traffic at a country level, as the graph shows a similar disruption for the Solomon Islands.</p>
    <div>
      <h3>SpaceX Starlink</h3>
      <a href="#spacex-starlink">
        
      </a>
    </div>
    <p>With an increasingly global service footprint, disruptions observed on SpaceX Starlink potentially impact users across <a href="https://www.starlink.com/map">multiple countries</a> around the world. Just before midnight UTC on April 7, Internet traffic seen from <a href="https://radar.cloudflare.com/as14593">AS14593 (SpaceX-Starlink)</a> began to decline significantly. The disruption was short-lived, with traffic returning to expected levels within two hours. According to a <a href="https://twitter.com/elonmusk/status/1644505414296322048">Twitter post from Elon Musk</a>, CEO of SpaceX, the problem was “<i>Caused by expired ground station cert</i>” (an expired digital certificate associated with one or more Starlink ground stations, likely preventing communication between the satellite constellation and the ground station(s)).</p>
    <div>
      <h3>Madagascar</h3>
      <a href="#madagascar">
        
      </a>
    </div>
    <p>In Madagascar, a “problem with the backbone”, <a href="https://twitter.com/GroupeTelma/status/1644264342840303617">reported by Telma Madagascar</a>, caused a loss of as much as two-thirds of Internet traffic between 09:15 - 14:00 local time (06:15 - 11:00 UTC) on April 7. The graphs below show that the backbone issue disrupted traffic at a national level, as well as for <a href="https://radar.cloudflare.com/as37054">AS37054 (Telma Madagascar)</a>.</p>
    <div>
      <h3>United Kingdom</h3>
      <a href="#united-kingdom">
        
      </a>
    </div>
    <p>On April 4, UK Internet provider <a href="https://www.virginmedia.com/">Virgin Media</a> suffered multiple service disruptions that impacted Internet connectivity for broadband customers. The first outage started just before 01:00 local time (midnight UTC)l, lasting until approximately 09:00 local time (08:00 UTC). The second outage started around 16:00 local time (15:00 UTC), with traffic volumes going up and down over the next several hours before appearing to stabilize around 21:30 local time (20:30 UTC).</p><p>Virgin Media’s Twitter account acknowledged the early morning disruption several hours after it began, <a href="https://twitter.com/virginmedia/status/1643157411417542656">posting</a> “<i>We’re aware of an issue that is affecting broadband services for Virgin Media customers as well as our contact centres. Our teams are currently working to identify and fix the problem as quickly as possible and we apologise to those customers affected.</i>” <a href="https://twitter.com/virginmedia/status/1643230963797831682">A subsequent post</a> after service restoration noted “<i>We’ve restored broadband services for customers but are closely monitoring the situation as our engineers continue to investigate. We apologise for any inconvenience caused.</i>”</p><p>However, the second disruption was acknowledged on Virgin Media’s Twitter account much more rapidly, with a <a href="https://twitter.com/virginmedia/status/1643288614585917450">post</a> at 16:25 UTC stating “<i>Unfortunately we have seen a repeat of an earlier issue which is causing intermittent broadband connectivity problems for some Virgin Media customers. We apologise again to those impacted, our teams are continuing to work flat out to find the root cause of the problem and fix it.</i>”</p><p>Although no additional details have been shared via social media by Virgin Media about the outages or their resolution, some additional information was <a href="https://twitter.com/ANRKJosh/status/1643344176006721539">shared via Twitter by an apparent customer</a>, who posted “<i>Virgin Media engineers re-seated fibre cards and reset hub equipment to restore service. TTL was extended as a workaround to maintain stability whilst a permanent fix is implemented.</i>”</p><p>Additional details about the Virgin Media outage can be found in our April 4 blog post: <a href="/virgin-media-outage-april-4-2023/"><i>Cloudflare’s view of the Virgin Media outage in the UK</i></a>.</p><h2>Cyberattacks</h2>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>As we have covered in <a href="/tag/ukraine/">past blog posts</a>, the physical war between Russia and Ukraine also has a very active online component, with traffic shifts, cyberattacks, and traffic rerouting all observed since the conflict began in February 2022. In early May 2022, we observed traffic from several Ukrainian network providers being rerouted through <a href="https://radar.cloudflare.com/as201776">AS201776 (Miranda Media)</a>, a Crimean-based, Russian-controlled network operator. (This rerouting is discussed in more detail in two blog posts: <a href="/tracking-shifts-in-internet-connectivity-in-kherson-ukraine/"><i>Tracking shifts in Internet connectivity in Kherson, Ukraine</i></a> and <a href="/one-year-of-war-in-ukraine/"><i>One year of war in Ukraine: Internet trends, attacks, and resilience</i></a>.)</p><p>A little more than a year later, on May 26, we observed an Internet outage at Miranda Media. Traffic started to fall around 16:30 local time (13:30 UTC), dropping to zero around 18:15 local time (15:15 UTC). The outage disrupted connectivity on the Crimean Peninsula and parts of occupied Ukraine and lasted until approximately 06:00 local time on May 27 (03:00 UTC). Published reports (<a href="https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine">1</a>,<a href="https://riskybiznews.substack.com/p/risky-biz-news-iranian-hacktivists">2</a>) suggest that the outage was due to a cyberattack targeting Miranda Media, reportedly carried out by Ukrainian hacktivists.</p>
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>Russian satellite provider Dozor Teleport, <a href="https://www.datacenterdynamics.com/en/news/russian-satellite-comms-firm-dozer-taken-offline-by-wagner-affiliated-hacker-group-report/">whose customers include</a> Russia’s Ministry of Defense, ships of the Northern Fleet, Russian energy firm Gazprom, remote oil fields, the Bilibino nuclear power plant, the Federal Security Service (FSB), Rosatom, and other organizations, experienced a multi-hour outage on June 29. The outage, which occurred between 01:30 - 17:30 UTC, was reportedly the result of a cyberattack that <a href="https://www.washingtonpost.com/technology/2023/06/30/satellite-hacked-russian-military/">at least two groups claimed responsibility for</a>.</p><h2>Military action</h2>
    <div>
      <h3>Chad</h3>
      <a href="#chad">
        
      </a>
    </div>
    <p>Multiple Internet disruptions occurred in Chad on April 23 and 24, impacting several Internet providers, and were ultimately visible at a country level as well. As seen in the graphs below, the outages occurred from 04:30 - 06:00 local time (03:30 - 05:00 UTC) and 15:00 - 20:00 local time (14:00 - 19:00 UTC) on April 23, and 04:00 - 08:30 local time (03:00 - 07:30 UTC) on April 24. The impacted network providers in Chad included <a href="https://radar.cloudflare.com/AS327802">AS327802 (Millicom Chad)</a>, <a href="https://radar.cloudflare.com/as327756">AS327756 (Airtel Chad)</a>, <a href="https://radar.cloudflare.com/as328594">AS328594 (Sudat Chad)</a>, and <a href="https://radar.cloudflare.com/as327975">AS327975 (ILNET-TELECOM)</a>. The outages were <a href="https://crisis24.garda.com/alerts/2023/04/chad-residual-internet-service-disruptions-possible-over-coming-hours-following-hours-long-outage-across-country-april-23">reportedly</a> caused by damage to fiber infrastructure that links Chad with neighboring Cameroon and Sudan, with the latter experiencing Internet service disruptions amid clashes between the Sudanese Armed Forces (SAF) and Rapid Support Forces (RSF).</p>
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>As noted above, military action in Sudan disrupted Internet connectivity in Chad in April. Starting in mid-April, multiple Internet outages were observed at major Sudanese Internet providers, three of which are shown in the graphs below. The fighting in the country has led to <a href="https://www.datacenterdynamics.com/en/news/internet-disruption-continues-for-mtn-in-sudan-as-conflict-rumbles-on/">fuel shortages and power cuts</a>, ultimately disrupting Internet connectivity.</p><p><a href="https://radar.cloudflare.com/as15706">AS15706 (Sudatel)</a> experienced complete Internet outages from 03:00 on April 23 to 17:00 on April 24 local time (01:00 on April 23 to 15:00 on April 24 UTC) and again from 03:00 on April 25 until 01:00 on April 28 local time (01:00 on April 25 to 23:00 on April 27 UTC). Internet connectivity on <a href="https://radar.cloudflare.com/as36972">AS36972 (MTN</a>) was disrupted between 03:00 and 12:00 local time on April 16 (01:00 - 10:00 UTC) and again between 20:00 on April 27 until 02:00 on April 29 (18:00 on April 27 to 00:00 on April 29). After a nominal multi-day recovery, a long-term near complete outage started on May 5, lasting for multiple weeks. Similar to MTN, multiple extended outages were also observed on <a href="https://radar.cloudflare.com/as33788">AS33788 (Kanar Telecommunication)</a>. After seeing a significant drop in traffic midday on April 19, a near complete outage is visible between 12:00 on April 21 and 01:00 on April 29 (10:00 on April 21 to 23:00 on April 28 UTC), with a very brief minor recovery late in the day on April 24. A longer duration outage began around 00:00 local time on May 11 (22:00 on May 10 UTC), also lasting for multiple weeks.</p><p>Additional details about the Internet disruptions in Sudan can be found in our May 2 blog post: <a href="/sudan-armed-conflict-impact-on-the-internet-since-april-15-2023/"><i>Effects of the conflict in Sudan on Internet patterns</i></a>.</p><h2>Maintenance</h2>
    <div>
      <h3>Togo, Republic of Congo (Brazzaville), Burkina Faso</h3>
      <a href="#togo-republic-of-congo-brazzaville-burkina-faso">
        
      </a>
    </div>
    <p>Repair work on the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs">West Africa Cable System (WACS)</a> submarine cable disrupted Internet connectivity across multiple countries, including Togo, Republic of Congo (Brazzaville), and Burkina Faso on April 6. According to the Google translation of a <a href="https://www.facebook.com/canalboxcongo/posts/pfbid0ugigSynCcSkHJ9iMTYur85nE6WrCZTHTua5SvNpYV53LhS8tByCa7ASH9691iUAxl">Facebook post from Canalbox Congo</a>, the repair work was likely to cause “very strong disruptions on Internet connections with the risk of a total outage”. (Canalbox (GVA) is an African telecommunications operator that provides services <a href="https://www.gva.africa/a-propos-de-gva/">across multiple countries in Africa</a>.)</p><p>The graph below for <a href="https://radar.cloudflare.com/as36924">AS36924 (GVA-Canalbox)</a> shows three overlapping outage annotations, with each related to a disruption observed on that autonomous system (network) in one of the impacted countries. In the Republic of Congo (Brazzaville), a significant traffic disruption is visible between 16:15 - 23:15 local time (15:15 - 22:15 UTC). In Burkina Faso, the disruption happened earlier and was less severe, taking place between 09:15 - 18:00 local time (09:15 - 18:00 UTC), with a similar impact in Togo, where traffic was disrupted between 11:00 - 23:15 local time (11:00 - 23:15 UTC).</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Because of how tightly interwoven the Internet has become with commerce, financial services, and everyday life around the world, any disruption to Internet connectivity ultimately carries an economic impact. The providers impacted by disruptions caused by unexpected or unavoidable events such as cable cuts or severe weather generally try to minimize the scope and duration of such disruptions, ultimately limiting the economic impact. However, in the case of government-directed Internet shutdowns, the damage to the economy is ultimately self-inflicted. The <a href="https://www.internetsociety.org/">Internet Society’s</a> new <a href="https://pulse.internetsociety.org/blog/measure-the-economic-impact-of-internet-shutdowns-with-the-internet-society-pulse-netloss-calculator">Net Loss Calculator</a> now provides a way to quantify this damage, enabling the public, advocacy groups, and governments themselves to understand the potential cost of an Internet shutdown from gross domestic product (GDP), foreign direct investment (FDI), and unemployment perspectives.</p><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around Internet disruptions. Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via <a>email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">QwVhXOMCWabCUrifsbXUS</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing the Cloudflare Radar Internet Quality Page]]></title>
            <link>https://blog.cloudflare.com/introducing-radar-internet-quality-page/</link>
            <pubDate>Fri, 23 Jun 2023 13:00:09 GMT</pubDate>
            <description><![CDATA[ The new Internet Quality page on Cloudflare Radar provides both country and network (autonomous system) level insight into Internet connection performance (bandwidth) and quality (latency, jitter) over time based on benchmark test data as well as speed.cloudflare.com test results ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1j9oLJBK7nXXluuX8PL5AS/142eb5799625609bc9f2e77b6fc20b7d/image6-8.png" />
            
            </figure><p>Internet connections are most often marketed and sold on the basis of "speed", with providers touting the number of megabits or gigabits per second that their various service tiers are supposed to provide. This marketing has largely been successful, as most subscribers believe that "more is better”. Furthermore, many national broadband plans in countries around the world include specific target connection speeds. However, even with a high speed connection, gamers may encounter sluggish performance, while video conference participants may experience frozen video or audio dropouts. Speeds alone don't tell the whole story when it comes to Internet connection quality.</p><p>Additional factors like latency, jitter, and packet loss can significantly impact end user experience, potentially leading to situations where higher speed connections actually deliver a worse user experience than lower speed connections. Connection performance and quality can also vary based on usage – measured average speed will differ from peak available capacity, and latency varies under loaded and idle conditions.</p>
    <div>
      <h2>The new Cloudflare Radar Internet Quality page</h2>
      <a href="#the-new-cloudflare-radar-internet-quality-page">
        
      </a>
    </div>
    <p>A little more than three years ago, as residential Internet connections were strained because of the shift towards working and learning from home due to the COVID-19 pandemic, <a href="/test-your-home-network-performance/">Cloudflare announced the speed.cloudflare.com speed test tool</a>, which enabled users to test the performance and quality of their Internet connection. Within the tool, users can download the results of their individual test as a CSV, or share the results on social media. However, there was no aggregated insight into Cloudflare speed test results at a network or country level to provide a perspective on connectivity characteristics across a larger population.</p><p>Today, we are launching these long-missing aggregated connection performance and quality insights on Cloudflare Radar. The new <a href="https://radar.cloudflare.com/quality">Internet Quality page</a> provides both country and network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous system</a>) level insight into Internet connection performance (<a href="/aim-database-for-internet-quality/">bandwidth</a>) and quality (<a href="https://www.cloudflare.com/learning/performance/glossary/what-is-latency/">latency</a>, <a href="/aim-database-for-internet-quality/">jitter</a>) over time. (Your Internet service provider is likely an autonomous system with its own autonomous system number (ASN), and many large companies, online platforms, and educational institutions also have their own autonomous systems and associated ASNs.) The insights we are providing are presented across two sections: the Internet Quality Index (IQI), which estimates average Internet quality based on aggregated <a href="/benchmarking-edge-network-performance/">measurements against a set of Cloudflare &amp; third-party targets</a>, and Connection Quality, which presents peak/best case connection characteristics based on <a href="https://speed.cloudflare.com/">speed.cloudflare.com</a> test results aggregated over the previous 90 days. (Details on our approach to the analysis of this data are presented below.)</p><p>Users may note that individual speed test results, as well as the aggregate speed test results presented on the Internet Quality page will likely differ from those presented by other speed test tools. <a href="https://cacm.acm.org/magazines/2020/12/248801-measuring-internet-speed/fulltext">This can be due to a number of factors</a> including differences in test endpoint locations (considering both geographic and network distance), test content selection, the impact of “rate boosting” by some ISPs, and testing over a single connection vs. multiple parallel connections. Infrequent testing (on any speed test tool) by users seeking to confirm perceived poor performance or validate purchased speeds will also contribute to the differences seen in the results published by the various speed test platforms.</p><p>And as we announced in April, <a href="/aim-database-for-internet-quality/">Cloudflare has partnered with Measurement Lab (M-Lab)</a> to create a <a href="https://colab.research.google.com/drive/1xgc-7L1Okr04MSjsYJfiFeUN0Gu05bpQ?usp=sharing">publicly-available, queryable repository</a> for speed test results. M-Lab is a non-profit third-party organization dedicated to providing a representative picture of Internet quality around the world. M-Lab produces and hosts the <a href="https://www.measurementlab.net/tests/ndt/">Network Diagnostic Tool</a>, which is a very popular network quality test that records millions of samples a day. Given their mission to provide a publicly viewable, representative picture of Internet quality, we chose to partner with them to provide an accurate view of your Internet experience and the experience of others around the world using openly available data.</p>
    <div>
      <h2>Connection speed &amp; quality data is important</h2>
      <a href="#connection-speed-quality-data-is-important">
        
      </a>
    </div>
    <p>While most advertisements for fixed broadband and mobile connectivity tend to focus on download speeds (and peak speeds at that), there’s more to an Internet connection, and the user’s experience with that Internet connection, than that single metric. In addition to download speeds, users should also understand the upload speeds that their connection is capable of, as well as the quality of the connection, as expressed through metrics known as latency and jitter. Getting insight into all of these metrics provides a more well-rounded view of a given Internet connection, or in aggregate, the state of Internet connectivity across a geography or network.</p><p>The concept of download speeds are fairly well understood as a measure of performance. However, it is important to note that the average download speeds experienced by a user during common Web browsing activities, which often involves the parallel retrieval of multiple smaller files from multiple hosts, can differ significantly from peak download speeds, where the user is downloading a single large file (such as a video or software update), which allows the connection to reach maximum performance. The bandwidth (speed) available for upload is sometimes mentioned in ISP advertisements, but doesn’t receive much attention. (And depending on the type of Internet connection, there’s often a significant difference between the available upload and download speeds.) However, the importance of upload came to the forefront in 2020 as video conferencing tools saw a surge in usage as both work meetings and school classes shifted to the Internet during the COVID-19 pandemic. To share your audio and video with other participants, you need sufficient upload bandwidth, and this issue was often compounded by multiple people sharing a single residential Internet connection.</p><p><a href="https://www.cloudflare.com/learning/performance/glossary/what-is-latency/">Latency</a> is the time it takes data to move through the Internet, and is measured in the number of milliseconds that it takes a packet of data to go from a client (such as your computer or mobile device) to a server, and then back to the client. In contrast to speed metrics, lower latency is preferable. This is especially true for use cases like online gaming where latency can make a difference between a character’s life and death in the game, as well as video conferencing, where higher latency can cause choppy audio and video experiences, but it also <a href="/making-home-internet-faster/">impacts web page performance</a>. The latency metric can be further broken down into loaded and idle latency. The former measures latency on a loaded connection, where bandwidth is actively being consumed, while the latter measures latency on an “idle” connection, when there is no other network traffic present. (These specific loaded and idle definitions are from the device’s perspective, and more specifically, from the speed test application’s perspective. Unless the speed test is being performed directly from a router, the device/application doesn't have insight into traffic on the rest of the network.) <a href="/test-your-home-network-performance/">Jitter</a> is the average variation found in consecutive latency measurements, and can be measured on both idle and loaded connections. A lower number means that the latency measurements are more consistent. As with latency, Internet connections should have minimal jitter, which helps provide more consistent performance.</p>
    <div>
      <h2>Our approach to data analysis</h2>
      <a href="#our-approach-to-data-analysis">
        
      </a>
    </div>
    <p>The Internet Quality Index (IQI) and Connection Quality sections get their data from two different sources, providing two different (albeit related) perspectives. Under the hood they share some common principles, though.</p><p>IQI builds upon the <a href="/benchmarking-edge-network-performance/">mechanism</a> we already use to regularly benchmark ourselves against other industry players. It is based on end user measurements against a set of Cloudflare and third-party targets, meant to represent a pattern that has become very common in the modern Internet, where most content is served from distribution networks with points of presence spread throughout the world. For this reason, and by design, IQI will show worse results for regions and Internet providers that rely on international (rather than peering) links for most content.</p><p>IQI is also designed to reflect the traffic load most commonly associated with web browsing, rather than more intensive use. This, and the chosen set of measurement targets, effectively biases the numbers towards what end users experience in practice (where latency plays an <a href="/making-home-internet-faster/">important role</a> in how fast things can go).</p><p>For each metric covered by IQI, and for each ASN, we calculate the 25th percentile, median, and 75th percentile at 15 minute intervals. At the country level and above, the three calculated numbers for each ASN visible from that region are independently aggregated. This aggregation takes the <a href="https://stats.labs.apnic.net/aspop">estimated user population of each ASN</a> into account, biasing the numbers away from networks that source a lot of automated traffic but have few end users.</p><p>The Connection Quality section gets its data from the <a href="https://speed.cloudflare.com">Cloudflare Speed Test</a> tool, which exercises a user's connection in order to see how well it is able to perform. It measures against the closest Cloudflare location, providing a good balance of realistic results and network proximity to the end user. We have a presence in <a href="https://www.cloudflare.com/network/">285 cities around the world</a>, allowing us to be pretty close to most users.</p><p>Similar to the IQI, we calculate the 25th percentile, median, and 75th percentile for each ASN. But here these three numbers are immediately combined using an operation called the <a href="https://en.wikipedia.org/wiki/Trimean">trimean</a> — a single number meant to balance the best connection quality that most users have, with the best quality available from that ASN (users may not subscribe to the best available plan for a number of reasons).</p><p>Because users may choose to run a speed test for different motives at different times, and also because we take privacy very seriously and don’t record any personally identifiable information along with test results, we aggregate at 90-day intervals to capture as much variability as we can.</p><p>At the country level and above, the calculated trimean for each ASN in that region is aggregated. This, again, takes the estimated user population of each ASN into account, biasing the numbers away from networks that have few end users but which may still have technicians using the Cloudflare Speed Test to assess the performance of their network.</p>
    <div>
      <h2>Navigating the Internet Quality page</h2>
      <a href="#navigating-the-internet-quality-page">
        
      </a>
    </div>
    <p>The new <a href="https://radar.cloudflare.com/quality">Internet Quality page</a> includes three views: Global, country-level, and autonomous system (AS). In line with the other pages on Cloudflare Radar, the country-level and AS pages show the same data sets, differing only in their level of aggregation. Below, we highlight the various components of the Internet Quality page.</p>
    <div>
      <h3>Global</h3>
      <a href="#global">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cMIwMf2Eb3K7ijLgnZwJV/dee237e425616488b7cbabb76177b91d/image10.png" />
            
            </figure><p>The top section of the <a href="https://radar.cloudflare.com/quality">global (worldwide) view</a> includes time series graphs of the Internet Quality Index metrics aggregated at a continent level. The time frame shown in the graphs is governed by the selection made in the time frame drop down at the upper right of the page, and at launch, data for only the last three months is available. For users interested in examining a specific continent, clicking on the other continent names in the legend removes them from the graph. Although continent-level aggregation is still rather coarse, it still provides some insight into regional Internet quality around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uw2wOQ826I1ZI4pSoIPTk/591560341fa18488928e1eac82b44829/image2-32.png" />
            
            </figure><p>Further down the page, the Connection Quality section presents a <a href="https://en.wikipedia.org/wiki/Choropleth_map">choropleth map</a>, with countries shaded according to the values of the speed, latency, or jitter metric selected from the drop-down menu. Hovering over a country displays a label with the country’s name and metric value, and clicking on the country takes you to the country’s Internet Quality page. Note that in contrast to the IQI section, the Connection Quality section always displays data aggregated over the previous 90 days.</p><h3>Country-level<p>Within the country-level page (using <a href="https://radar.cloudflare.com/quality/ca">Canada</a> as an example in the figures below), the country’s IQI metrics over the selected time frame are displayed. These time series graphs show the median bandwidth, latency, and DNS response time within a shaded band bounded at the 25th and 75th percentile and represent the average expected user experience across the country, as discussed in the <i>Our approach to data analysis</i> section above.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hk4e79T8ZLr0CN9qOkVsg/3b42c6353c777b66ec7e3df2b65b0207/image3-25.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iMlQAaL6UNZAHWlNKqm6R/d46de0c921ac57dcd0d1aef48d023009/image7-7.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hnrODy4OgChr7Fy27enNp/bd6463cbc96f97d92a97a48993ba3d1b/image12-1.png" />
            
            </figure><p>Below that is the Connection Quality section, which provides a summary view of the country’s measured upload and download speeds, as well as latency and jitter, over the previous 90 days. The colored wedges in the Performance Summary graph are intended to illustrate aggregate connection quality at a glance, with an “ideal” connection having larger upload and download wedges and smaller latency and jitter wedges. Hovering over the wedges displays the metric’s value, which is also shown in the table to the right of the graph.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7h0DIEi3JxWQlljgXCxASm/e42075ccd1d2da264aa85b502266b245/image4-21.png" />
            
            </figure><p>Below that, the Bandwidth and Latency/Jitter histograms illustrate the bucketed distribution of upload and download speeds, and latency and jitter measurements. In some cases, the speed histograms may show a noticeable bar at 1 Gbps, or 1000 ms (1 second) on the latency/jitter histograms. The presence of such a bar indicates that there is a set of measurements with values greater than the 1 Gbps/1000 ms maximum histogram values.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QL7897X8IVsuAOzjxKr8u/6dc623de0c8d7e3b170ef37a93ee72c5/image11-3.png" />
            
            </figure>
    <div>
      <h3>Autonomous system level</h3>
      <a href="#autonomous-system-level">
        
      </a>
    </div>
    <p>Within the upper-right section of the country-level page, a list of the <a href="/asn-on-radar/">top five autonomous systems</a> within the country is shown. Clicking on an ASN takes you to the Performance page for that autonomous system. For others not displayed in the top five list, you can use the search bar at the top of the page to search by autonomous system name or number. The graphs shown within the AS level view are identical to those shown at a country level, but obviously at a different level of aggregation. You can find the ASN that you are connected to from the <a href="https://radar.cloudflare.com/ip">My Connection page</a> on Cloudflare Radar.</p>
    <div>
      <h2>Exploring connection performance &amp; quality data</h2>
      <a href="#exploring-connection-performance-quality-data">
        
      </a>
    </div>
    <p>Digging into the IQI and Connection Quality visualizations can surface some interesting observations, including characterizing Internet connections, and the impact of Internet disruptions, including shutdowns and network issues. We explore some examples below.</p>
    <div>
      <h3>Characterizing Internet connections</h3>
      <a href="#characterizing-internet-connections">
        
      </a>
    </div>
    <p><a href="https://www.verizon.com/home/fios/">Verizon FiOS</a> is a residential fiber-based Internet service available to customers in the United States. Fiber-based Internet services (as opposed to cable-based, DSL, dial-up, or satellite) will generally offer symmetric upload and download speeds, and the FiOS <a href="https://www.verizon.com/home/fios-fastest-internet/">plans page</a> shows this to be the case, offering 300 Mbps (upload &amp; download), 500 Mbps (upload &amp; download), and “1 Gig” (Verizon claims average wired speeds between 750-940 Mbps download / 750-880 Mbps upload) plans. Verizon carries FiOS traffic on <a href="https://radar.cloudflare.com/quality/as701">AS701</a> (labeled <a href="https://en.wikipedia.org/wiki/UUNET">UUNET</a> due to a historical acquisition), and in looking at the bandwidth histogram for AS701, several things stand out. The first is a rough symmetry in upload and download speeds. (A cable-based Internet service provider, in contrast, would generally show a wide spread of download speeds, but have upload speeds clustered at the lower end of the range.) Another is the peaks around 300 Mbps and 750 Mbps, suggesting that the 300 Mbps and “1 Gig” plans may be more popular than the 500 Mbps plan. It is also clear that there are a significant number of test results with speeds below 300 Mbps. This is due to several factors: one is that Verizon also carries lower speed non-FiOS traffic on AS701, while another is that erratic nature of in-home WiFi often means that the speeds achieved on a test will be lower than the purchased service level.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wjsM0gTtzNBqeU7n8npg6/07c1de6472b7a8f22535ba4be44f034e/image13.png" />
            
            </figure>
    <div>
      <h3>Traffic shifts drive latency shifts</h3>
      <a href="#traffic-shifts-drive-latency-shifts">
        
      </a>
    </div>
    <p>On May 9, 2023, the government of <a href="https://radar.cloudflare.com/pk">Pakistan</a> ordered the shutdown of mobile network services in the wake of protests following the arrest of former Prime Minister Imran Khan. Our blog post covering this <a href="/cloudflares-view-of-internet-disruptions-in-pakistan/">shutdown</a> looked at the impact from a traffic perspective. Within the post, we noted that autonomous systems associated with fixed broadband networks saw significant increases in traffic when the mobile networks were shut down – that is, some users shifted to using fixed networks (home broadband) when mobile networks were unavailable.</p><p>Examining IQI data after the blog post was published, we found that the impact of this traffic shift was also visible in our latency data. As can be seen in the shaded area of the graph below, the shutdown of the mobile networks resulted in the median latency dropping about 25% as usage shifted from higher latency mobile networks to lower latency fixed broadband networks. An increase in latency is visible in the graph when mobile connectivity was restored on May 12.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bMBKpVtEY49leTuopoTHf/4bc57ff4c4e85e3143b331a0f3d81b89/image8-3.png" />
            
            </figure>
    <div>
      <h3>Bandwidth shifts as a potential early warning sign</h3>
      <a href="#bandwidth-shifts-as-a-potential-early-warning-sign">
        
      </a>
    </div>
    <p>On April 4, UK mobile operator <a href="https://twitter.com/CloudflareRadar/status/1643070260130504704">Virgin Media suffered several brief outages</a>. In examining the IQI bandwidth graph for <a href="https://radar.cloudflare.com/quality/as5089">AS5089</a>, the ASN used by Virgin Media (formerly branded as <a href="https://en.wikipedia.org/wiki/NTL_Incorporated">NTL</a>), indications of a potential problem are visible several days before the outages occurred, as median bandwidth dropped by about a third, from around 35 Mbps to around 23 Mbps. The outages are visible in the circled area in the graph below. <a href="https://www.ispreview.co.uk/index.php/2023/04/major-network-outage-strikes-broadband-isp-virgin-media-uk.html">Published reports</a> indicate that the problems lasted into April 5, in line with the lower median bandwidth measured through mid-day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iJ8Kk0I1TyLMf0r3edCjw/aca8ca531143e0da750205e1cd2032f9/image1-34.png" />
            
            </figure>
    <div>
      <h3>Submarine cable issues cause slower browsing</h3>
      <a href="#submarine-cable-issues-cause-slower-browsing">
        
      </a>
    </div>
    <p>On June 5, Philippine Internet provider <a href="https://pldt.com/">PLDT</a> <a href="https://twitter.com/pldt/status/1665670783388254208">Tweeted</a> an advisory that noted “One of our submarine cable partners confirms a loss in some of its internet bandwidth capacity, and thus causing slower Internet browsing.” IQI latency and bandwidth graphs for <a href="https://radar.cloudflare.com/quality/as9299">AS9299</a>, a primary ASN used by PLDT, shows clear shifts starting around 06:45 UTC (14:45 local time). Median bandwidth dropped by half, from 17 Mbps to 8 Mbps, while median latency increased by 75% from 37 ms to around 65 ms. 75th percentile latency also saw a significant increase, nearly tripling from 63 ms to 180 ms coincident with the reported submarine cable issue.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lAnA7kxm6DSC7bKYxN2Oo/f70e019d7950b43eb3d03907fc58055b/June-5---Philippines---PLDT---bandwidth---shaded.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2wSAez7ZOMj6rnH2h4xnfv/07f99ef661079c5e8d4f5141a73b0567/image9.png" />
            
            </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Making network performance and quality insights available on Cloudflare Radar supports Cloudflare’s mission to help build a better Internet. However, we’re not done yet – we have more enhancements planned. These include making data available at a more granular geographical level (such as state and possibly city), incorporating <a href="/aim-database-for-internet-quality/">AIM scores</a> to help assess Internet quality for specific types of use cases, and embedding the Cloudflare speed test directly on Radar using the <a href="https://github.com/cloudflare/speedtest?ref=blog.cloudflare.com">open source JavaScript module</a>.</p><p>In the meantime, we invite you to use <a href="https://speed.cloudflare.com/">speed.cloudflare.com</a> to test the performance and quality of your Internet connection, share any country or AS-level insights you discover on social media (tag <a href="https://twitter.com/cloudflareradar">@CloudflareRadar</a> on Twitter or <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> on Mastodon), and explore the underlying data through the <a href="https://colab.research.google.com/drive/1xgc-7L1Okr04MSjsYJfiFeUN0Gu05bpQ?usp=sharing">M-Lab repository</a> or the <a href="https://developers.cloudflare.com/api/">Radar API</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p></h3> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Performance]]></category>
            <category><![CDATA[Speed]]></category>
            <guid isPermaLink="false">6T1IGaRvIoNpdBuOKcixG8</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Carlos Rodrigues</dc:creator>
        </item>
        <item>
            <title><![CDATA[Measuring network quality to better understand the end-user experience]]></title>
            <link>https://blog.cloudflare.com/aim-database-for-internet-quality/</link>
            <pubDate>Tue, 18 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Starting today, you don’t have to be a network engineer to figure out what your Internet is good for. Let’s tell you how we’re doing it. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3IimU9cm3fV1XvBvAJwmdE/06aabe48db2f742bfdd6e88a34cdfba6/111.png" />
            
            </figure><p>You’re visiting your family for the holidays and you connect to the WiFi, and then notice Netflix isn’t loading as fast as it normally does. You go to speed.cloudflare.com, fast.com, speedtest.net, or type “speed test” into Google Chrome to figure out if there is a problem with your Internet connection, and get something that looks like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6FH3ra6GdbzBMT650WqWeG/9f9a58e5031c5a7363c07e70b7fdfc5d/112.png" />
            
            </figure><p>If you want to see what that looks like for you, try it yourself <a href="https://speed.cloudflare.com/">here</a>. But what do those numbers mean? How do those numbers relate to whether or not your Netflix isn’t loading or any of the other common use cases: playing games or audio/video chat with your friends and loved ones? Even network engineers find that speed tests are difficult to relate to the user experience of… using the Internet.</p><p>Amazingly, speed tests have barely changed in nearly two decades, even though the way we use the Internet has changed a lot. With so many more people on the Internet, the gaps between speed tests and the user’s experience of network quality are growing. The problem is so important that the Internet’s standards organization is <a href="https://datatracker.ietf.org/doc/rfc9318/">paying attention</a>, too.</p><p>From a high-level, there are three grand network test challenges:</p><ol><li><p>Finding ways to efficiently and accurately measure network quality, and convey to end-users if and how the quality affects their experience.</p></li><li><p>When a problem is found, figuring out where the problem exists, be it the wireless connection, or one many cables and machines that make up the Internet.</p></li><li><p>Understanding a single user’s test results in context of their neighbors’, or archiving the results to, for example, compare neighborhoods or know if the network is getting better or worse.</p></li></ol><p>Cloudflare is excited to announce a new Aggregated Internet Measurement (AIM) initiative to help address all three challenges. AIM is a new and open format for displaying Internet quality in a way that makes sense to end users of the Internet, around use cases that demand specific types of Internet performance while still retaining all of the network data engineers need to troubleshoot problems on the Internet. We’re excited to partner with <a href="https://www.measurementlab.net/">Measurement Lab</a> on this project and store all of this data in a <a href="https://colab.research.google.com/drive/1xgc-7L1Okr04MSjsYJfiFeUN0Gu05bpQ?usp=sharing">publicly available repository</a> that you can access to analyze the data behind the scores you see on your speed test page, whose source code is <a href="https://github.com/cloudflare/speedtest">now open-sourced</a> along with the AIM score calculations.</p>
    <div>
      <h2>What is a speed test?</h2>
      <a href="#what-is-a-speed-test">
        
      </a>
    </div>
    <p>A speed test is a point-in-time measurement of your Internet connection. When you connect to any speed test, it typically tries to fetch a large file (important for <a href="https://www.cloudflare.com/developer-platform/solutions/live-streaming/">video streaming</a>), performs a packet loss test (important for gaming), measures jitter (important for video/VoIP calls), and latency (important for all Internet use cases). The goal of this test is to measure your Internet connection’s ability to perform basic tasks.</p><p>There are some challenges with this approach that start with a simple observation: At the “<a href="https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/">network-layer</a>” of the Internet that moves data and packets around, there are three and only three measures that can be directly observed. They are,</p><ul><li><p>available <i>bandwidth</i>, sometimes known as “throughput”;</p></li><li><p>packet <i>loss,</i> which occurs at extremely low levels throughout the Internet at steady state_;_ and</p></li><li><p><i>latency</i>, often referred to as the <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">round-trip time (RTT)</a>.</p></li></ul><p>These three attributes are tightly interwoven. In particular, the portion of available bandwidth that a user actually achieves (throughput) is directly affected by loss and latency. Your computer uses loss and latency to decide when to send a packet, or not. Some loss and latency is expected, even needed! Too much of either, and bandwidth starts to fall.</p><p>These are simple numbers, but their relationship is far from simple. Think about all the ways to add two numbers to equal <i>as much as</i> one-hundred, x + y ≤ 100. If x and y are just right, then they add to one hundred. However, there are many combinations of x and y that do. Worse is that if either x or y or both are a little wrong, then they add to less than one-hundred. In this example, x and y are loss and latency, and 100 is the available bandwidth.</p><p>There are other forces at work, too, and these numbers do not tell the whole story. But they are the only numbers that are directly observable. Their meaning and the reasons they matter for diagnosis are important, so let’s discuss each one of those in order and how Aggregated Internet Measurement tries to solve each of these.</p>
    <div>
      <h2>What do the numbers in a speed test mean?</h2>
      <a href="#what-do-the-numbers-in-a-speed-test-mean">
        
      </a>
    </div>
    <p>Most speed tests will run and produce the numbers you saw above: bandwidth, latency, jitter, and packet loss. Let’s break down each of these numbers one by one to explain what they mean:</p>
    <div>
      <h3>Bandwidth</h3>
      <a href="#bandwidth">
        
      </a>
    </div>
    <p>Bandwidth is the maximum throughput/capacity over a communication link. The common analogy used to define bandwidth is if your Internet connection is a highway, bandwidth is how many lanes the highway has and cars that fit on it. Bandwidth has often been called “speed” in the past because Internet Service Providers (ISPs) measure speed as the amount of time it takes to download a large file, and having more bandwidth on your connection can make that happen faster.</p>
    <div>
      <h3>Packet loss</h3>
      <a href="#packet-loss">
        
      </a>
    </div>
    <p>Packet loss is exactly what it sounds like: some packets are sent from a source to a destination, but the packets are not received by the destination. This can be very impactful for many applications, because if information is lost in transit en route to the receiver, it an e ifiult fr te recvr t udrsnd wt s bng snt (it can be difficult for the receiver to understand what is being sent).</p>
    <div>
      <h3>Latency</h3>
      <a href="#latency">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/performance/glossary/what-is-latency/">Latency</a> is the time it takes for a packet/message to travel from point A to point B. At its core, the Internet is composed of computers sending signals in the form of electrical signals or beams of light over cables to other computers. Latency has generally been defined as the time it takes for that electrical signal to go from one computer to another over a cable or fiber. Therefore, it follows that one way to reduce latency is to shrink the distance the signals need to travel to reach their destination.</p><p>There is a distinction in latency between idle latency and latency under load. This is because there are queues at routers and switches that store data packets when they arrive faster than they can be transmitted. Queuing is normal, by design, and keeps data flowing correctly. However, if the queues are too big, or when other applications behave very differently from yours, the connection can feel slower than it actually is. This event is called <a href="https://www.bufferbloat.net/projects/">bufferbloat</a>.</p><p>In our AIM test we look at idle latency to show you what your latency <i>could</i> be, but we also collect loaded latency, which is a better reflection of what your latency is during your day-to-day Internet experience.</p>
    <div>
      <h3>Jitter</h3>
      <a href="#jitter">
        
      </a>
    </div>
    <p>Jitter is a special way of measuring latency. It is the variance in latency on your Internet connection. If jitter is high, it may take longer for some packets to arrive, which can impact Internet scenarios that require content to be delivered in real time, such as voice communication.</p><p>A good way to think about jitter is to think about a commute to work along some route or path. Latency, alone, asks “how far am I from the destination measured in time?” For example, the average journey on a train is 40 minutes. Instead of journey time, jitter asks, “how consistent is my travel time?” Thinking about the commute, a jitter of zero means the train always takes 40 minutes. However, if the jitter is 15 then, well, the commute becomes a lot more challenging because it could take anywhere from 25 to 55 minutes.</p><p>But even if we understand these numbers, for all that they might tell us <i>what</i> is happening, they are unable to tell us <i>where</i> something is happening.</p>
    <div>
      <h2>Is WiFi or my Internet connection the problem?</h2>
      <a href="#is-wifi-or-my-internet-connection-the-problem">
        
      </a>
    </div>
    <p>When you run a speed test, you’re not just connecting to your ISP, you’re also connecting to your local network which connects to your ISP. And your local network may have problems of its own. Take a speed test that has high packet loss and jitter: that generally means something on the network could be dropping packets. Normally, you would call your ISP, who will often say something like “get closer to your WiFi access point or get an extender”.</p><p>This is important — WiFi uses radio waves to transmit information, and materials like brick, plaster, and concrete can interfere with the signal and make it weaker the farther away you get from your access point. Mesh WiFi appliances like Nest WiFi and Eero periodically take speed tests from their main access point specifically to help detect issues like this. So having <a href="https://developers.cloudflare.com/fundamentals/speed/aim/">potential quick solutions</a> for problems like high packet loss and jitter and giving that to users up front can help users better ascertain if the problem is related to their wireless connection setup.</p><p>While this is true for most issues that we see on the Internet, it often helps if network operators are able to look at this data in aggregate in addition to simply telling users to get closer to their access points. If your speed test went to a place where your network operator could see it and others in your area, network engineers may be able to proactively detect issues before users report them. This not only helps users, it helps network providers as well, because fielding calls and sending out technicians for issues due to user configuration are expensive in addition to being time consuming.</p><p>This is one of the goals of AIM: to help solve the problem before anyone picks up a phone. End users can get a series of tips that will help them understand what their Internet connection can and can’t do and how they can improve it in an easy-to-read format, and network operators can get all the data they need to detect last mile issues before anyone picks up a phone, saving time and money. Let’s talk about how that can work with a real example.</p>
    <div>
      <h2>An example from a real life</h2>
      <a href="#an-example-from-a-real-life">
        
      </a>
    </div>
    <p>When you get a speed test result, the numbers you get can be confusing. This is because you may not understand how those numbers combine to impact your Internet experience. Let’s talk about a real life example and how that impacts you.</p><p>Say you work in a building with four offices and a main area that looks like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4mI2OjDE4asb8FmKeHtJCP/a0e9c36be7927a996729a833f3f9457a/113.png" />
            
            </figure><p>You have to make video calls to her clients all day and you sit in the office farthest away from the wireless access point. Your calls are dropping constantly and you’re having a really bad experience. When you runs a speed test from her office, she sees this result:</p>
<table>
<thead>
  <tr>
    <th><span>Metric</span></th>
    <th><span>Far away from access point</span></th>
    <th><span>Close to access point</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Download Bandwidth</span></td>
    <td><span>21.8 Mbps</span></td>
    <td><span>25.7 Mbps</span></td>
  </tr>
  <tr>
    <td><span>Upload Bandwidth</span></td>
    <td><span>5.66 Mbps</span></td>
    <td><span>5.26 Mbps</span></td>
  </tr>
  <tr>
    <td><span>Unloaded Latency</span></td>
    <td><span>19.6 ms</span></td>
    <td><span>19.5 ms</span></td>
  </tr>
  <tr>
    <td><span>Jitter</span></td>
    <td><span>61.4 ms</span></td>
    <td><span>37.9 ms</span></td>
  </tr>
  <tr>
    <td><span>Packet Loss</span></td>
    <td><span>7.7%</span></td>
    <td><span>0%</span></td>
  </tr>
</tbody>
</table><p>How can you make sense of these? A network engineer would take a look at the high jitter and the packet loss and think “well this user probably needs to move closer to the router to get a better signal”. But you may take a look at these results and have no idea, and have to ask a network engineer for help, which could lead to a call to your ISP, wasting the time and money of everyone. But you shouldn’t have to consult a network engineer to figure out if you need to move your WiFi access point, or if your ISP isn’t giving her a good experience.</p><p>Aggregated Internet Measurement assigns qualitative assessments to the numbers on your speed test to help you make sense of these numbers. We’ve created scenario-specific scores, which is a singular qualitative value that is calculated on a scenario level: we calculate different quality scores based on what you’re trying to do. To start, we’ve created three AIM scores: Streaming, Gaming, and WebChat/RTC. Those scores weigh each metric differently based on what Internet conditions are required for the application to run successfully.</p><p>The AIM scoring rubric assigns point values to your connection based on the tests. We’re releasing AIM with a “weighted score,” in which the point values are calculated based on what metrics matter the most in those scenarios. These point scores aren’t designed to be static, but to evolve based on what application developers, network operators, and the Internet community discover about how different performance characteristics affect application experience for each scenario – and it’s one more reason to post the data to M-Lab, so that the community can help design and converge on good scoring mechanisms.</p><p>Here is the full rubric and each of the point values associated with the metrics today:</p>
<table>
<thead>
  <tr>
    <th><span>Metric</span></th>
    <th><span>0 points</span></th>
    <th><span>5 points</span></th>
    <th><span>10 points</span></th>
    <th><span>20 points</span></th>
    <th><span>30 points</span></th>
    <th><span>50 points</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Loss Rate</span></td>
    <td><span>&gt; 5%</span></td>
    <td><span>&lt; 5%</span></td>
    <td><span>&lt; 1%</span></td>
    <td></td>
    <td></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Jitter</span></td>
    <td><span>&gt; 20 ms</span></td>
    <td><span>&lt; 20ms</span></td>
    <td><span>&lt; 10ms</span></td>
    <td></td>
    <td></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Unloaded latency</span></td>
    <td><span>&gt; 100ms</span></td>
    <td><span>&lt; 50ms</span></td>
    <td><span>&lt; 20ms</span></td>
    <td><span>&lt; 10ms</span></td>
    <td></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Download Throughput</span></td>
    <td><span>&lt; 1Mbps</span></td>
    <td><span>&lt; 10Mbps</span></td>
    <td><span>&lt; 50Mbps</span></td>
    <td><span>&lt; 100Mbps</span></td>
    <td><span>&lt; 1000Mbps</span></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Upload Throughput</span></td>
    <td><span>&lt; 1Mbps</span></td>
    <td><span>&lt; 10Mbps</span></td>
    <td><span>&lt; 50Mbps</span></td>
    <td><span>&lt; 100Mbps</span></td>
    <td><span>&lt; 1000Mbps</span></td>
    <td></td>
  </tr>
  <tr>
    <td><span>Difference between loaded and unloaded latency</span></td>
    <td><span>&gt; 50ms</span></td>
    <td><span>&lt; 50ms</span></td>
    <td><span>&lt; 20ms</span></td>
    <td><span>&lt; 10ms</span></td>
    <td></td>
    <td></td>
  </tr>
</tbody>
</table><p>And here’s a quick overview of what values matter and how we calculate scores for each scenario:</p><ul><li><p>Streaming: download bandwidth + unloaded latency + packet loss + (loaded latency - unloaded latency difference)</p></li><li><p>Gaming: packet loss + unloaded latency + (loaded latency - unloaded latency difference)</p></li><li><p>RTC/video: packet loss + jitter + unloaded latency + (loaded latency - unloaded latency difference)</p></li></ul><p>To calculate each score, we take the point values from your speed test and calculate that out of the total possible points for that scenario. So based on the result, we can give your Internet connection a judgment for each scenario: Bad, Poor, Average, Good, and Great. For example, for Video calls, packet loss, jitter, unloaded latency, and the difference between loaded and unloaded latency matter when determining whether or not your Internet quality is good for video calls. We add together the point values derived from your speed test values and we get a score that shows how far away from the perfect video call experience your Internet quality is. Based on your speed test, here are the AIM scores from your office far away from the access point:</p>
<table>
<thead>
  <tr>
    <th><span>Metric</span></th>
    <th><span>Result</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Streaming Score</span></td>
    <td><span>25/70 pts (Average)</span></td>
  </tr>
  <tr>
    <td><span>Gaming Score</span></td>
    <td><span>15/40 pts (Poor)</span></td>
  </tr>
  <tr>
    <td><span>RTC Score</span></td>
    <td><span>15/50 pts (Average)</span></td>
  </tr>
</tbody>
</table><p>So instead of saying “Your bandwidth is X and your jitter is Y”, we can say “Your Internet is okay for Netflix, but poor for gaming, and only average for Zoom”. In this case, moving the WiFi access point to a more centralized location turned out to be the solution, and turned your AIM scores into this:</p>
<table>
<thead>
  <tr>
    <th><span>Metric</span></th>
    <th><span>Result</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Streaming Score</span></td>
    <td><span>45/70 pts (Good)</span></td>
  </tr>
  <tr>
    <td><span>Gaming Score</span></td>
    <td><span>35/40 pts (Great)</span></td>
  </tr>
  <tr>
    <td><span>RTC Score</span></td>
    <td><span>35/50 pts (Great)</span></td>
  </tr>
</tbody>
</table><p>You can even see these results on the Cloudflare speed test today as a Network Quality Score:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CrZxqJ79VLN4MM6O0gMOX/440836054b316ba12616cb623b6ecd0f/114.png" />
            
            </figure><p>In this particular case, there was no call required to the ISP, and no network engineers were consulted. Simply moving the access point closer to the middle of the office improved the experience for everyone, and no one needed to pick up the phone, providing a more seamless experience for everyone.</p><p>AIM takes the metrics that network engineers care about and it translates them into a more human-readable metric that’s based on the applications you are trying to use. Aggregated data is anonymous (in compliance with our <a href="https://www.cloudflare.com/privacypolicy/">privacy policy</a>), so that your ISP can actually look up speed tests in your metro area and that use your ISP and get the underlying data to help translate user complaints into something that is actionable by network engineers. Additionally, policy makers and researchers can examine the aggregate data to better understand what users in their communities are experiencing to help lobby for better Internet quality.</p>
    <div>
      <h2>Working conditions</h2>
      <a href="#working-conditions">
        
      </a>
    </div>
    <p>Here’s an interesting question: When you run a speed test, where are you connecting to and what is the Internet like at the other end of the connection? One of the challenges that speed tests often face is that the servers you run your test against are not the same servers that run or protect your websites. Because of this, the network paths your speed test may take to the host on the other side may be vastly different, and may even be optimized to serve as many speed tests as possible. This means that your speed test is not actually testing the path that your traffic normally takes when it’s reaching the applications you normally use. The tests that you ran are measuring a network path, but it’s not the network path you use on a regular basis.</p><p>Speed tests should be run under real-world network conditions that reflect how people use the Internet, with multiple applications, browser tabs, and devices all competing for connectivity. This concept of measuring your Internet connection using application-facing tools and doing so while your network is being used as much as possible is called measuring under working conditions. Today, when speed tests run, they make entirely new connections to a website that is reserved for testing network performance. Unfortunately, day-to-day Internet usage isn’t done on new connections to dedicated speed test websites. This is actually by design for many Internet applications, which rely on reusing the same connection to a website to provide a better performing experience to the end-user by eliminating costly latency incurred by establishing encryption, exchanging of certificates, and more.</p><p>AIM is helping to solve this problem in several ways. The first is that we’ve implemented all of our tests the same way our applications would, and measure them under working conditions. We measure loaded latency to show you how your Internet connection behaves when you’re actually using it. You can see it on the speed test today:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HSlY2m75rAmNht9BuCjZc/9ff7bf8ea97bd8f49fa0ae46d8c487eb/Screenshot-2023-02-10-at-11.43.27.png" />
            
            </figure><p>The second is that we are collecting speed test results against endpoints that you use today. By measuring speed tests against Cloudflare and other sites, we are showing end user Internet quality against networks that are frequently used in your daily life, which gives a better idea of what actual working conditions are.</p>
    <div>
      <h2>AIM database</h2>
      <a href="#aim-database">
        
      </a>
    </div>
    <p>We’re excited to announce that AIM data is <a href="https://colab.research.google.com/drive/1xgc-7L1Okr04MSjsYJfiFeUN0Gu05bpQ?usp=sharing">publicly available today</a> through a partnership with Measurement Lab (M-Lab), and end-users and network engineers alike can parse through network quality data across a variety of networks. M-Lab and Cloudflare will both be calculating AIM scores derived from their speed tests and putting them into a shared database so end-users and network operators alike can see Internet quality from as many points as possible across a multitude of different speed tests.</p><p>For just a sample of what we’re seeing, let’s take a look at a visual we’ve made using this data plotting scores from only Cloudflare data per scenario in Tokyo, Japan for the first week of October:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AVAz6PoQwTJszzgx0Bi3Z/32e6ad5e435711d326e0d5810726eb13/116.png" />
            
            </figure><p>Based on this, you can see that out of the 5,814 speed tests run, 50.7% of those users had a good streaming quality, but 48.2% were only average. Gaming appears to be relatively hard in Tokyo as 39% of users had a poor gaming experience, but most users had a pretty average-to-decent RTC experience. Let’s take a look at how that compares to some of the other cities we see:</p>
<table>
<thead>
  <tr>
    <th><span>City</span></th>
    <th><span>Average Streaming Score</span></th>
    <th><span>Average Gaming Score</span></th>
    <th><span>Average RTC Score</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Tokyo</span></td>
    <td><span>31</span></td>
    <td><span>13</span></td>
    <td><span>16</span></td>
  </tr>
  <tr>
    <td><span>New York</span></td>
    <td><span>33</span></td>
    <td><span>13</span></td>
    <td><span>17</span></td>
  </tr>
  <tr>
    <td><span>Mumbai</span></td>
    <td><span>25</span></td>
    <td><span>13</span></td>
    <td><span>16</span></td>
  </tr>
  <tr>
    <td><span>Dublin</span></td>
    <td><span>32</span></td>
    <td><span>14</span></td>
    <td><span>18</span></td>
  </tr>
</tbody>
</table><p>Based on our data, we can see that most users do okay for video streaming except for Mumbai, which is a bit behind. Users generally have a variable gaming experience due to high latency being the primary driver behind the gaming score, but their RTC apps do slightly better, being generally average in all the locales.</p>
    <div>
      <h2>Collaboration with M-Lab</h2>
      <a href="#collaboration-with-m-lab">
        
      </a>
    </div>
    <p>M-Lab is an open, Internet measurement repository whose mission is to measure the Internet, save the data, and make it universally accessible and useful. In addition to providing free and open access to the AIM data for network operators, M-Lab will also be giving policy makers, academic researchers, journalists, digital inclusion advocates, and anyone who is interested access to the data they need to make important decisions that can help improve the Internet.</p><p>In addition to already being an established name in open sharing of Internet quality data to policy makers and academics, M-Lab already provides a “speed” test called Network Diagnostic Test (NDT) that is the same speed test you run when you type “speed test” into Google. By partnering with M-Lab, we are getting Aggregated Internet Measurement metrics from many more users. We want to partner with other speed tests as well to get the complete picture of how Internet quality is mapped across the world for as many users as possible. If you measure Internet performance today, we want you to join us to help show users what their Internet is really good for.</p>
    <div>
      <h2>Speed test, now open sourced</h2>
      <a href="#speed-test-now-open-sourced">
        
      </a>
    </div>
    <p>In addition to partnering with M-Lab, we’ve also open-sourced our speed test client. Open-sourcing the speed test is an important step towards giving applications access to speed measurements through Cloudflare, and an easy way to start calculating AIM scores for your application. Our speed test is now embeddable as a javascript application so that you can perform network quality tests without needing to navigate to the browser. The application not only provides you all of the measurements we use for our speed test today, but also uploads the results in a private fashion to Cloudflare. The repository also shows how we are calculating the AIM scores, so that you can see the inner workings of how network quality is being defined to end-users and how that changes in real-time. To get started developing with our open-source speed test, check out the <a href="https://github.com/cloudflare/speedtest">open-source link</a>.</p>
    <div>
      <h2>A bright future for Internet quality</h2>
      <a href="#a-bright-future-for-internet-quality">
        
      </a>
    </div>
    <p>We’re excited to put this data together to show Internet quality across a variety of tests and networks. We’re going to be analyzing this data and improving our scoring system, and we’ve open-sourced it so that you can see how we are using speed test measurements to score Internet quality across a variety of different applications and even implement AIM yourself. We’ve also put our AIM scores in the speed test alongside all of the tests you see today so that you can finally get a better understanding of what your Internet is good for.</p><p>If you’re running a speed test today and you’re interested in partnering with us to help gather data on how users experience Internet quality, <a>reach out</a> to us and let’s work together to help make the Internet better. And if you’re running an application that wants to measure Internet quality, check out our <a href="https://github.com/cloudflare/speedtest">open source repo</a> so that you can start developing today.</p><p>Figuring out what your Internet is good for shouldn’t require you to become a networking expert; that’s what we’re here for. With AIM and our collaborators at MLab, we want to be able to tell you what your Internet can do and use that information to help <a href="https://blog.cloudflare.com/50-years-of-the-internet-work-in-progress-to-a-better-internet/">make the Internet better</a> for everyone.</p> ]]></content:encoded>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">6uJzPTICOVrX9qkT9solfp</guid>
            <dc:creator>David Tuber</dc:creator>
        </item>
        <item>
            <title><![CDATA[Making home Internet faster has little to do with “speed”]]></title>
            <link>https://blog.cloudflare.com/making-home-internet-faster/</link>
            <pubDate>Tue, 18 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ The speed of an Internet connection is more about decreasing real-world latency than adding underutilized bandwidth ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lEfazasknt17nyfB1EKGP/2322dbc487af3a096a1f5d3206edaf84/image4-17.png" />
            
            </figure><p>More than ten years ago, researchers at Google <a href="https://docs.google.com/a/chromium.org/viewer?a=v&amp;pid=sites&amp;srcid=Y2hyb21pdW0ub3JnfGRldnxneDoxMzcyOWI1N2I4YzI3NzE2">published</a> a paper with the seemingly heretical title “More Bandwidth Doesn’t Matter (much)”. We <a href="/the-bandwidth-of-a-boeing-747-and-its-impact/">published</a> our own blog showing it is faster to fly 1TB of data from San Francisco to London than it is to upload it on a 100 Mbps connection. Unfortunately, things haven’t changed much. When you make purchasing decisions about home Internet plans, you probably consider the bandwidth of the connection when evaluating Internet performance. More bandwidth is faster speed, or so the marketing goes. In this post, we’ll use real-world data to show both bandwidth and – spoiler alert! – latency impact the speed of an Internet connection. By the end, we think you’ll understand why Cloudflare is so laser <a href="/network-performance-update-developer-week/">focused</a> on <a href="/last-mile-insights/">reducing</a> <a href="/new-cities-april-2022-edition/">latency</a> <a href="/network-performance-update-cloudflare-one-week-june-2022/">everywhere</a> we can find it.</p><p>The grand summary of the blog that follows is this:</p><ul><li><p>There are many ways to evaluate network performance.</p></li><li><p>Performance “goodness” depends on the application -- a good number for one application can be of zero benefit to a different application.</p></li><li><p>“Speed” numbers can be misleading, not least because any single metric cannot accurately describe how all applications will perform.</p></li></ul><p>To better understand these ideas, we should define bandwidth and latency. Bandwidth is the amount of data that can be transmitted at any single time. It’s the maximum throughput, or capacity, of the communications link between two servers that want to exchange data. The “bottleneck” is the place in the network where the connection is constrained by the amount of bandwidth available. Usually this is in the “last mile”, either the wire that connects a home, or the modem or router in the home itself.</p><p>If the Internet is an information superhighway, bandwidth is the number of lanes on the road. The wider the road, the more traffic can fit on the highway at any time. Bandwidth is useful for downloading large files like operating system updates and big game updates. We use bandwidth when streaming video, though probably less than you think. Netflix <a href="https://help.netflix.com/en/node/306">recommends</a> 15 Mbps of bandwidth to watch a stream in 4K/Ultra HD. A 1 Gbps connection could stream more than 60 Netflix shows in 4K at the same time!</p><p>Latency, on the other hand, is the time it takes data to move through the Internet. To extend our superhighway analogy, latency is the speed at which vehicles move on the highway. If traffic is moving quickly, you’ll get to your destination faster. Latency is measured in the number of milliseconds that it takes a packet of data to travel between a client (such as your laptop computer) and a server. In practice, we have to measure latency as the <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">round-trip time (RTT)</a> between client and server because every device has its own independent clock, so it’s hard to measure latency in just one direction. If you’re practicing tennis against a wall, round-trip latency is the time the ball was in the air. On the Internet fibre optic “backbone”, data is <a href="https://www.blog.adva.com/en/speed-light-fiber-first-building-block-low-latency-trading-infrastructure#:~:text=The%20refractive%20index%20of%20light,1.467%20%3D%20124%2C188%20miles%20per%20second.">travels</a> at almost 200,000 kilometers per second as it bounces off the glass on the inside of optical wires. That’s fast!</p><p>Low-latency connections are important for gaming, where tiny bits of data, such as the change in position of players in a game, need to reach another computer quickly. And increasingly, we’re becoming aware of high latency when it makes our live video conferencing choppy and unpleasant.</p><p>While we can’t make light travel through glass much faster, we can <a href="https://www.cloudflare.com/developer-platform/solutions/live-streaming/">improve latency</a> by moving the content closer to users, shortening the distance data needs to travel. That’s the effect of our presence in more than <a href="https://www.cloudflare.com/network/">285 cities</a> globally: when you’re on the Internet superhighway trying to reach Cloudflare, we want to be just off the next exit.</p><p>The terms bandwidth, capacity, and maximum throughput are slightly <a href="https://en.wikipedia.org/wiki/Bandwidth_(computing)">different</a> from each other, but close enough in their meaning to be <a href="https://en.wikipedia.org/wiki/Network_performance">interchangeable</a>, Confusingly “speed” has come to mean bandwidth when talking about Internet plans, but “speed” gives no indication of the latency between your devices and the servers they connect to. More on this later.  For now, we don’t use the Internet only to play games, nor only watch streaming video. We do those and more, and we visit a lot of normal web pages in between.</p><p>In the 2010 <a href="https://docs.google.com/a/chromium.org/viewer?a=v&amp;pid=sites&amp;srcid=Y2hyb21pdW0ub3JnfGRldnxneDoxMzcyOWI1N2I4YzI3NzE2">paper</a> from Google, the author simulated loading web pages while varying the throughput and latency of the connection. The finding was that above about 5 Mbps, the page doesn’t load much faster. Increasing bandwidth from 1 Mbps to 2 Mbps is almost a 40 percent improvement in page load time. From 5 Mbps to 6 Mbps is less than a 5 percent improvement.</p><p>However, something interesting happened when varying the latency (the Round Trip Time, or RTT): there was a linear and proportional improvement on page load times. For every 20 milliseconds of reduced latency, the page load time improved by about 10%.</p><p>Let’s see what this looks like in real life with empirical data. Below is a chart from an excellent recent <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4178804">paper</a> by two researchers from MIT. Using data from the FCC’s <a href="https://www.fcc.gov/general/measuring-broadband-america">Measuring Broadband America</a> program, these researchers produced a chart showing similar results to the 2010 simulation. Those results are summarized in the chart below. Though the point of diminishing returns to more bandwidth has moved higher – to about 20 Mbps – the overall trend was exactly the same.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wcZyRWYVXlEd04AvuO820/0ffb9e3162238efc829dac630b0caa0a/download--5-.png" />
            
            </figure><p>We repeated this analysis with a focus on latency using our own Cloudflare data. The results are summarized in the next chart, showing  a familiar pattern. For every 200 milliseconds of latency we can save, we cut the page load time by over 1 second. That relationship applies when the latency is 950 milliseconds. And it applies when the latency is 50 milliseconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UyB3HCO8RA5EWTWF8jFTt/7ce08383bc1d67d3215eb76e96bc21ba/download-1.png" />
            
            </figure><p>There are a few reasons latency matters in the set of transactions needed to load pages. When you connect to a website, the first thing that your browser does is establish a secure connection, to authenticate the website and ensure your data is encrypted. The protocols to do this are TCP and TLS, or <a href="/the-road-to-quic/">QUIC</a> (that is encrypted by default). The number of message exchanges each needs to establish a secure connection varies, but one aspect of the establishment phase is common to all of them: Latency matters most.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5A4Y3IJhLCfCqYMwjAjhst/1b9e0aedcb9054942bf2f256e1ecbf86/download--1--1.png" />
            
            </figure><p>On top of that, when we load a webpage after we establish encryption and verify website authority, we might be asking the browser to <a href="https://www.webpagetest.org/result/221107_BiDcB1_ERZ/2/details/#waterfall_view_step1">load</a> hundreds of different files across dozens of different domains. Some of these files can be loaded in parallel, but others need to be loaded sequentially. As the browser races to compile all these different files, it’s the speed at which it can get to the server and back that determines how fast it can put the page together. The files are often quite small, but there’s a lot of them.</p><p>The chart below shows the beginning of what the browser does when it loads cnn.com. First is the connection handshake phase, followed by 301 redirect to <a href="http://www.cnn.com">www.cnn.com,</a> which requires a completely new  connection handshake before the browser can load the main HTML page in step two. Only then, more than 1 second into the load, does it learn about all the JavaScript files it requires in order to render the page. Files 3-19 are requested mostly on the same connection but are not served until after the HTML file has been delivered in full. Files 8, 9, and 10 are requested over separate connections (all costing handshakes). Files 20-27 are all blocked on earlier files and similarly need new connections. They can’t start until the browser has the previous file back from the server and executes it. There are 650 assets in this page load, and the blocking happens all the way through the page load. Here’s why this matters: better latency makes every file load faster, which in turn unblocks other files faster, and so on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VkNcalwdnqthmWSvdepwK/370b582e9a5ebf1b5dcb93c147be3987/download--2--1.png" />
            
            </figure><p>The protocols will use all the bandwidth available, but often complete a transfer before all the available bandwidth is consumed. It’s no wonder then that adding more bandwidth doesn’t speed up the page load, but better latency does. While developments like <a href="/early-hints/">Early Hints</a> help this by informing browsers of dependencies earlier, allowing them to pre-connect to servers or pre-fetch resources that don’t need to be strictly ordered, this is still a problem for many websites on the Internet today.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/59WkhTSfM4ThiaTl2GKYg5/0711ffe95378b01b113d78ce7f6f8dc0/download--3--1.png" />
            
            </figure><p>Recently, Internet researchers have turned their attention to using our understanding of the relationship between throughput and latency to improve Internet Quality of Experience (QoE). A <a href="https://www.bitag.org/latency-explained.php">paper</a> from the Broadband Internet Technical Advisory Group (BITAG) summarizes:</p><blockquote><p>But we now recognize that it is not just greater throughput that matters, but also consistently low latency. Unfortunately, the way that we’ve historically understood and characterized latency was flawed, and our latency measurements and metrics were not aligned with end-user QoE.</p></blockquote><p>Confusing matters further, there is a difference between latency on an idle Internet connection and latency measured in working conditions when many connections share the network resources, which we call “working latency” or “<a href="https://www.ietf.org/archive/id/draft-cpaasch-ippm-responsiveness-00.html">responsiveness</a>”. Since responsiveness is what the user experiences as the speed of their Internet connection, it’s important to understand and measure this particular latency.</p><p>An Internet connection can suffer from poor responsiveness (even if it has good idle latency) when data is delayed in buffers. If you download a large file, for example an operating system update, the server sending the file might send the file with higher throughput than the Internet connection can accept. That’s ok. Extra bits of the file will sit in a buffer until it’s their turn to go through the funnel. Adding extra lanes to the highway allows more cars to pass through, and is a good strategy if we aren’t particularly concerned with the speed of the traffic.</p><p>Say for example, Christabel is watching a stream of the news while on a video meeting. When Christabel starts watching the video, her browser fetches a bunch of content and stores it in various buffers on the way from the content host to the browser. Those same buffers also contain data packets pertaining to the video meeting Christabel is currently in. If the data generated as part of a video conference sits in the same buffer as the video files, the video files will fill up the buffer and cause delay for the video meeting packets as well. The larger the buffers, the longer the wait for video conference packets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZyNLHmYFSZ3TK5ggfORHe/1b645133b8e42bccb0642fb409cb23cf/download--4--1.png" />
            
            </figure>
    <div>
      <h3>Cloudflare is helping to make “speed” meaningful</h3>
      <a href="#cloudflare-is-helping-to-make-speed-meaningful">
        
      </a>
    </div>
    <p>To help users understand the strengths and weaknesses of their connection, we recently added <a href="https://developers.cloudflare.com/fundamentals/speed/aim/">Aggregated Internet Measurement (AIM)</a> scores to our own <a href="https://speed.cloudflare.com">“Speed” Test</a>. These scores remove the technical metrics and give users a real-world, plain-English understanding of what their connection will be good at, and where it might struggle. We’d also like to collect more data from our speed test to help track Page Load Times (PLT) and see how they are correlated with the reduction of lower working latency. You’ll start seeing those numbers on our speed test soon!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/439M08KpRs8HFYWbYuRAqf/767e90e4080ea76191716a33eb0151c8/download--6-.png" />
            
            </figure><p>We all use our Internet connections in slightly different ways, but we share the desire for our connections to be as fast as possible. As more and more services move into the cloud – word documents, music, websites, communications, etc – the speed at which we can access those services becomes critical. While bandwidth plays a part, the latency of the connection – the real Internet “speed” – is more important.</p><p>At Cloudflare, we’re working every day to help build a more performant Internet. Want to help? Apply for one of our open engineering roles <a href="https://www.cloudflare.com/careers/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Speed]]></category>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Internet Performance]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <guid isPermaLink="false">5aV1I3MBF818MwHBwaCds8</guid>
            <dc:creator>Mike Conlow</dc:creator>
        </item>
    </channel>
</rss>