
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 10 Apr 2026 00:08:49 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cable cuts, storms, and DNS: a look at Internet disruptions in Q4 2025]]></title>
            <link>https://blog.cloudflare.com/q4-2025-internet-disruption-summary/</link>
            <pubDate>Mon, 26 Jan 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ The last quarter of 2025 brought several notable disruptions to Internet connectivity. Cloudflare Radar data reveals the impact of cable cuts, power outages, extreme weather, technical problems, and more. ]]></description>
            <content:encoded><![CDATA[ <p>In 2025, we <a href="https://radar.cloudflare.com/outage-center?dateStart=2025-01-01&amp;dateEnd=2025-12-31"><u>observed over 180 Internet disruptions</u></a> spurred by a variety of causes – some were brief and partial, while others were complete outages lasting for days. In the fourth quarter, we tracked only a single <a href="#government-directed"><u>government-directed</u></a> Internet shutdown, but multiple <a href="#cable-cuts"><u>cable cuts</u></a> wreaked havoc on connectivity in several countries. <a href="#power-outages"><u>Power outages</u></a> and <a href="#weather"><u>extreme weather</u></a> disrupted Internet services in multiple places, and the ongoing <a href="#military-action"><u>conflict</u></a> in Ukraine impacted connectivity there as well. As always, a number of the disruptions we observed were due to <a href="#known-or-unspecified-technical-problems"><u>technical problems</u></a> – with some acknowledged by the relevant providers, while others had unknown causes. In addition, incidents at several hyperscaler <a href="#cloud-platforms"><u>cloud platforms</u></a> and <a href="#cloudflare"><u>Cloudflare</u></a> impacted the availability of websites and applications.  </p><p>This post is intended as a summary overview of observed and confirmed disruptions and is not an exhaustive or complete list of issues that have occurred during the quarter. These anomalies are detected through significant deviations from expected traffic patterns observed across our network. Check out the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> for a full list of verified anomalies and confirmed outages. </p>
    <div>
      <h2>Government-directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p><a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4df6i7hjk25"><u>The Internet was shut down in Tanzania</u></a> on October 29 as <a href="https://www.theguardian.com/world/2025/oct/29/tanzania-election-president-samia-suluhu-hassan-poised-to-retain-power"><u>violent protests</u></a> took place during the country’s presidential election. Traffic initially fell around 12:30 local time (09:30 UTC), dropping more than 90% lower than the previous week. The disruption lasted approximately 26 hours, with <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4qec7zdnt2u"><u>traffic beginning to return</u></a> around 14:30 local time (11:30 UTC) on October 30. However, that restoration <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4gjngzck72u"><u>proved to be quite brief</u></a>, with a significant decrease in traffic occurring around 16:15 local time (13:15 UTC), approximately two hours after it returned. This second near-complete outage lasted until November 3, <a href="https://bsky.app/profile/radar.cloudflare.com/post/3m4g47vasfm2u"><u>when traffic aggressively returned</u></a> after 17:00 local time (14:00 UTC). Nominal drops in <a href="https://radar.cloudflare.com/routing/tz?dateStart=2025-10-29&amp;dateEnd=2025-11-04#announced-ip-address-space"><u>announced IPv4 and IPv6 address space</u></a> were also observed during the shutdown, but there was never a complete loss of announcements, which would have signified a total disconnection of the country from the Internet. (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>Autonomous systems</u></a> announce IP address space to other Internet providers, letting them know what blocks of IP addresses they are responsible for.)</p><p>Tanzania’s president later <a href="https://apnews.com/article/tanzania-samia-suluhu-hassan-internet-shutdown-october-election-1ec66b897e7809865d8971699a7284e0"><u>expressed sympathy</u></a> for the members of the diplomatic community and foreigners residing in the country regarding the impact of the Internet shutdown. Internet and social media services were also <a href="https://www.dw.com/en/tanzania-internet-slowdown-comes-at-a-high-cost/a-55512732"><u>restricted in 2020</u></a> ahead of the country’s general elections.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Digicel Haiti is unfortunately no stranger to Internet disruptions caused by cable cuts, and the network experienced two more such incidents during the fourth quarter. On October 16, traffic from <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> began to fall at 14:30 local time (18:30 UTC), reaching near zero at 16:00 local time (20:00 UTC). A translated <a href="https://x.com/jpbrun30/status/1978920959089230003"><u>X post from the company’s Director General</u></a> noted: “<i>We advise our clientele that @DigicelHT is experiencing 2 cuts on its international fiber optic infrastructure.</i>” Traffic began to recover after 17:00 local time (21:00 UTC), and reached expected levels within the following hour. At 17:33 local time (21:34 UTC), the Director General <a href="https://x.com/jpbrun30/status/1978937426841063504"><u>posted</u></a> that “<i>the first fiber on the international infrastructure has been repaired” </i>and service had been restored. </p><p>On November 25, another translated <a href="https://x.com/jpbrun30/status/1993283730467963345"><u>X post from the provider’s Director General</u></a> stated that its “<i>international optical fiber infrastructure on National Road 1</i>” had been cut. We observed traffic dropping on Digicel’s network approximately an hour earlier, with a complete outage observed between 02:00 - 08:00 local time (07:00 - 13:00 UTC). A <a href="https://x.com/jpbrun30/status/1993309357438910484"><u>follow-on X post</u></a> at 08:22 local time (13:22 UTC) stated that all services had been restored.</p>
    <div>
      <h3>Cybernet/StormFiber (Pakistan)</h3>
      <a href="#cybernet-stormfiber-pakistan">
        
      </a>
    </div>
    <p>At 17:30 local time (12:30 UTC) on October 20, Internet traffic for <a href="https://radar.cloudflare.com/as9541"><u>Cybernet/StormFiber (AS9541)</u></a> dropped sharply, falling to a level approximately 50% the same time a week prior. At the same time, the network’s announced IPv4 address space dropped by over a third. The cause of these shifts was damage to the <a href="https://www.submarinecablemap.com/submarine-cable/peace-cable"><u>PEACE</u></a> submarine cable, which suffered a cut in the Red Sea near Sudan. </p><p>PEACE is one of several submarine cable systems (including <a href="https://www.submarinecablemap.com/submarine-cable/imewe"><u>IMEWE</u></a> and <a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4"><u>SEA-ME-WE-4</u></a>) that carry international Internet traffic for Pakistani providers. The provider <a href="https://profit.pakistantoday.com.pk/2025/10/24/stormfiber-pledges-full-restoration-by-monday-after-weeklong-internet-disruptions/"><u>pledged to fully restore service</u></a> by October 27, but traffic and announced IPv4 address space had recovered to near expected levels by around 02:00 local time on October 21 (21:00 UTC on October 20).</p>
<p>


    </p><div>
      <h3>Camtel, MTN Cameroon, Orange Cameroun</h3>
      <a href="#camtel-mtn-cameroon-orange-cameroun">
        
      </a>
    </div>
    <p>Unusual traffic patterns observed across multiple Internet providers in Cameroon on October 23 were reportedly caused by problems on the <a href="https://www.submarinecablemap.com/submarine-cable/west-africa-cable-system-wacs"><u>WACS (West Africa Cable System)</u></a> submarine cable, which connects countries along the west coast of Africa to Portugal. </p><p>A (translated) <a href="https://teleasu.tv/internet-graves-perturbations-observees-ce-jeudi-23-octobre-2025/"><u>published report</u></a> stated that MTN informed subscribers that “<i>following an incident on the WACS fiber optic cable, Internet service is temporarily disrupted</i>” and Orange Cameroun informed subscribers that “<i>due to an incident on the international access fiber, Internet service is disrupted.</i>” An <a href="https://x.com/Camtelonline/status/1981424170316464390"><u>X post from Camtel</u></a> stated “<i>Cameroon Telecommunications (CAMTEL) wishes to inform the public that a technical incident involving WACS cable equipment in Batoke (LIMBE) occurred in the early hours of 23 October 2025, causing Internet connectivity disruptions throughout the country.</i>” </p><p>Traffic across the impacted providers originally fell just at around  05:00 local time (04:00 UTC) before recovering to expected levels around 22:00 local time (21:00 UTC). Traffic across these networks was quite volatile during the day, dropping 90-99% at times. It isn’t clear what caused the visible spikiness in the traffic pattern—possibly attempts to shift Internet traffic to <a href="https://www.submarinecablemap.com/country/cameroon"><u>other submarine cable systems that connect to Cameroon</u></a>. Announced IP address space from <a href="https://radar.cloudflare.com/routing/as30992?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>MTN Cameroon</u></a> and <a href="https://radar.cloudflare.com/routing/as36912?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>Orange Cameroon</u></a> dropped during this period as well, although <a href="https://radar.cloudflare.com/routing/as15964?dateStart=2025-10-23&amp;dateEnd=2025-10-23#announced-ip-address-space"><u>Camtel’s</u></a> announced IP address space did not change.</p><p>Connectivity in the <a href="https://radar.cloudflare.com/cf"><u>Central African Republic</u></a> and <a href="https://radar.cloudflare.com/cg"><u>Republic of Congo</u></a> was also reportedly impacted by the WACS issues.</p>



    <div>
      <h3>Claro Dominicana</h3>
      <a href="#claro-dominicana">
        
      </a>
    </div>
    <p>On December 9, we saw traffic from <a href="https://radar.cloudflare.com/as6400"><u>Claro Dominicana (AS6400)</u></a>, an Internet provider in the Dominican Republic, drop sharply around 12:15 local time (16:15 UTC). Traffic levels fell again around 14:15 local time (18:15 UTC), bottoming out 77% lower than the previous week before quickly returning to expected levels. The connectivity disruption was likely caused by two fiber optic outages, as an <a href="https://x.com/ClaroRD/status/1998468046311002183"><u>X post from the provider</u></a> during the outage noted that they were “causing intermittency and slowness in some services.” A <a href="https://x.com/ClaroRD/status/1998496113838764343"><u>subsequent post on X</u></a> from Claro stated that technicians had restored Internet services nationwide by repairing the severed fiber optic cables.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Dominican Republic</h3>
      <a href="#dominican-republic">
        
      </a>
    </div>
    <p>According to a (translated) <a href="https://x.com/ETED_RD/status/1988326178219061450"><u>X post from the Empresa de Transmisión Eléctrica Dominicana</u></a> (ETED), a transmission line outage caused an interruption in electrical service in the <a href="https://radar.cloudflare.com/do"><u>Dominican Republic</u></a> on November 11. This power outage impacted Internet traffic from the country, resulting in a <a href="https://noc.social/@cloudflareradar/115533081511310085"><u>nearly 50% drop in traffic</u></a> compared to the prior week, starting at 13:15 local time (17:15 UTC). Traffic levels remained lower until approximately 02:00 local time (06:00 UTC) on December 12, with a later <a href="https://x.com/ETED_RD/status/1988575130990330153"><u>(translated) X post from ETED</u></a> noting “<i>At 2:20 a.m. we have completed the recovery of the national electrical system, supplying 96% of the demand…</i>”</p><p>A subsequent <a href="https://dominicantoday.com/dr/local/2025/11/27/manual-line-disconnection-triggered-nationwide-blackout-report-says/"><u>technical report found</u></a> that “<i>the blackout began at the 138 kV San Pedro de Macorís I substation, where a live line was manually disconnected, triggering a high-intensity short circuit. Protection systems responded immediately, but the fault caused several nearby lines to disconnect, separating 575 MW of generation in the eastern region from the rest of the grid. The imbalance caused major power plants to trip automatically as part of their built-in safety mechanisms.</i>”</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>On December 9, a <a href="https://www.tuko.co.ke/kenya/612181-kenya-power-reveals-7-pm-nationwide-blackout-multiple-regions/"><u>major power outage</u></a> impacted multiple regions across <a href="https://radar.cloudflare.com/ke"><u>Kenya</u></a>. Kenya Power explained that the outage “<i>was triggered by an incident on the regional Kenya-Uganda interconnected power network, which caused a disturbance on the Kenyan side of the system</i>” and claimed that “<i>[p]ower was restored to most of the affected areas within approximately 30 minutes.</i>” However, impacts to Internet connectivity lasted for nearly four hours, between 19:15 - 23:00 local time (16:15 - 20:00 UTC). The power outage caused traffic to drop as much as 18% at a national level, with the traffic shifts most visible in <a href="https://radar.cloudflare.com/traffic/7668902"><u>Nakuru County</u></a> and <a href="https://radar.cloudflare.com/traffic/192709"><u>Kaimbu County</u></a>.</p>


    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Odesa, Ukraine</h3>
      <a href="#odesa-ukraine">
        
      </a>
    </div>
    <p><a href="https://odessa-journal.com/russia-carried-out-a-massive-drone-attack-on-the-odessa-region"><u>Russian drone strikes</u></a> on the <a href="https://radar.cloudflare.com/traffic/698738"><u>Odesa region</u></a> in <a href="https://radar.cloudflare.com/ua"><u>Ukraine</u></a> on December 12 damaged warehouses and energy infrastructure, with the latter causing power outages in parts of the region. Those outages disrupted Internet connectivity, resulting in <a href="https://x.com/CloudflareRadar/status/2000993223406211327?s=20"><u>traffic dropping by as much as 57%</u></a> as compared to the prior week. After the initial drop at midnight on December 13 (22:00 UTC on December 12), traffic gradually recovered over the following several days, returning to expected levels around 14:30 local time (12:30 UTC) on December 16.</p>
    <div>
      <h2>Weather</h2>
      <a href="#weather">
        
      </a>
    </div>
    
    <div>
      <h3>Jamaica</h3>
      <a href="#jamaica">
        
      </a>
    </div>
    <p><a href="https://www.nytimes.com/live/2025/10/28/weather/hurricane-melissa-jamaica-landfall?smid=url-share#df989e67-a90e-50fb-92d0-8d5d52f76e84"><u>Hurricane Melissa</u></a> made landfall on <a href="https://radar.cloudflare.com/jm"><u>Jamaica</u></a> on October 28 and left a trail of damage and destruction in its path. Associated <a href="https://www.jamaicaobserver.com/2025/10/28/eyeonmelissa-35-jps-customers-without-power/"><u>power outages</u></a> and infrastructure damage impacted Internet connectivity, causing traffic to initially <a href="https://x.com/CloudflareRadar/status/1983266694715084866"><u>drop by approximately half</u></a>, <a href="https://x.com/CloudflareRadar/status/1983217966347866383"><u>starting</u></a> around 06:15 local time (11:15 UTC), ultimately reaching as much as <a href="https://x.com/CloudflareRadar/status/1983357587707048103"><u>70% lower</u></a> than the previous week. Internet traffic from Jamaica remained well below pre-hurricane levels for several days, and ultimately started to make greater progress towards expected levels <a href="https://x.com/CloudflareRadar/status/1985708253872107713?s=20"><u>during the morning of November 4</u></a>. It can often take weeks or months for Internet traffic from a country to return to “normal” levels following storms that cause massive and widespread damage – while power may be largely restored within several days, damage to physical infrastructure takes significantly longer to address.</p>
    <div>
      <h3>Sri Lanka &amp; Indonesia</h3>
      <a href="#sri-lanka-indonesia">
        
      </a>
    </div>
    <p>On November 26, <a href="https://apnews.com/article/indonesia-sri-lanka-thailand-malaysia-floods-landsides-aa9947df1f6192a3c6c72ef58659d4d2"><u>Cyclone Senyar</u></a> caused catastrophic floods and landslides in <a href="https://radar.cloudflare.com/lk"><u>Sri Lanka</u></a> and <a href="https://radar.cloudflare.com/id"><u>Indonesia</u></a>, killing over 1,000 people and damaging telecommunications and power infrastructure across these countries. The infrastructure damage resulted in <a href="https://x.com/CloudflareRadar/status/1996233525989720083"><u>disruptions to Internet connectivity</u></a>, and resultant lower traffic levels, across multiple regions.</p><p>In Sri Lanka, regions outside the main Western Province were the most affected, and several provinces saw traffic drop <a href="https://x.com/CloudflareRadar/status/1996233528032301513"><u>between 80% and 95%</u></a> as compared to the prior week, including <a href="https://radar.cloudflare.com/traffic/1232860?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Western</u></a>, <a href="https://radar.cloudflare.com/traffic/1227618?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Southern</u></a>, <a href="https://radar.cloudflare.com/traffic/1225265?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Uva</u></a>, <a href="https://radar.cloudflare.com/traffic/8133521?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Eastern</u></a>, <a href="https://radar.cloudflare.com/traffic/7671049?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Northern</u></a>, <a href="https://radar.cloudflare.com/traffic/1232870?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Central</u></a>, and <a href="https://radar.cloudflare.com/traffic/1228435?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Sabaragamuwa</u></a>.</p>

<p>In <a href="https://x.com/CloudflareRadar/status/1996233530267885938"><u>Indonesia</u></a>, <a href="https://radar.cloudflare.com/traffic/1215638?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>Aceh</u></a> and the Sumatra regions saw the biggest Internet disruptions. In Aceh, traffic initially dropped over 75% as compared to the previous week. In Sumatra, <a href="https://radar.cloudflare.com/traffic/1213642?dateStart=2025-11-24&amp;dateEnd=2025-12-14"><u>North Sumatra</u></a> was the most affected, with an early 30% drop as compared to the previous week, before starting to recover more actively the following week.</p>


    <div>
      <h2>Known or unspecified technical problems</h2>
      <a href="#known-or-unspecified-technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Smartfren (Indonesia)</h3>
      <a href="#smartfren-indonesia">
        
      </a>
    </div>
    <p>On October 3, subscribers to Indonesian Internet provider <a href="https://radar.cloudflare.com/as18004"><u>Smartfren (AS18004</u></a>) experienced a service disruption. The issues were <a href="https://x.com/smartfrenworld/status/1973957300466643203"><u>acknowledged by the provider in an X post</u></a>, which stated (in translation), “<i>Currently, telephone, SMS and data services are experiencing problems in several areas.</i>” Traffic from the provider fell as much as 84%, starting around 09:00 local time (02:00 UTC). The disruption lasted for approximately eight hours, as traffic returned to expected levels around 17:00 local time (10:00 UTC). Smartfren did not provide any additional information on what caused the service problems.</p>
    <div>
      <h3>Vodafone UK</h3>
      <a href="#vodafone-uk">
        
      </a>
    </div>
    <p>Major British Internet provider Vodafone UK (<a href="https://radar.cloudflare.com/as5378"><u>AS5378</u></a> &amp; <a href="https://radar.cloudflare.com/as25135"><u>AS25135</u></a>) experienced a brief service outage on October 23. At 15:00 local time (14:00 UTC), traffic on both Vodafone <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a> dropped to zero. Announced IPv4 address space from <a href="https://radar.cloudflare.com/routing/as5378?dateStart=2025-10-13&amp;dateEnd=2025-10-13#announced-ip-address-space"><u>AS5378</u></a> fell by 75%, while announced IPv4 address space from <a href="https://radar.cloudflare.com/routing/as25135?dateStart=2025-10-13&amp;dateEnd=2025-10-13#announced-ip-address-space"><u>AS25135</u></a> disappeared entirely. Both Internet traffic and address space recovered two hours later, returning to expected levels around 17:00 local time (16:00 UTC). Vodafone did not provide any information on their social media channels about the cause of the outage, and their <a href="https://www.vodafone.co.uk/network/status-checker"><u>network status checker page</u></a> was also unavailable during the outage.</p>






    <div>
      <h3>Fastweb (Italy)</h3>
      <a href="#fastweb-italy">
        
      </a>
    </div>
    <p>According to a <a href="https://tg24.sky.it/tecnologia/2025/10/22/fastweb-down-problemi-internet-oggi"><u>published report</u></a>, a DNS resolution issue disrupted Internet services for customers of Italian provider <a href="https://radar.cloudflare.com/as12874"><u>Fastweb (AS12874)</u></a> on October 22, causing observed traffic volumes to drop by over 75%. Fastweb <a href="https://www.firstonline.info/en/fastweb-down-oggi-internet-bloccato-in-tutta-italia-migliaia-di-segnalazioni/"><u>acknowledged the issue</u></a>, which impacted wired Internet customers between 09:30 - 13:00 local time (08:30 - 12:00 UTC).</p><p>Although not an Internet outage caused by connectivity failure, the impact of DNS resolution issues on Internet traffic is very similar. When a provider’s <a href="https://www.cloudflare.com/learning/dns/dns-server-types/"><u>DNS resolver</u></a> is experiencing problems, switching to a service like Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> will often restore connectivity.</p>
    <div>
      <h3>SBIN, MTN Benin, Etisalat Benin</h3>
      <a href="#sbin-mtn-benin-etisalat-benin">
        
      </a>
    </div>
    <p>On December 7, a concurrent drop in traffic was observed across <a href="https://radar.cloudflare.com/as28683"><u>SBIN (AS28683)</u></a>, <a href="https://radar.cloudflare.com/as37424"><u>MTN Benin (AS37424)</u></a>, and <a href="https://radar.cloudflare.com/as37136"><u>Etisalat Benin (AS37136)</u></a>. Between 18:30 - 19:30 local time (17:30 - 18:30 UTC), traffic dropped as much as 80% as compared to the prior week at a country level, nearly 100% at Etisalat and MTN, and over 80% at SBIN.</p><p>While an <a href="https://www.reuters.com/world/africa/soldiers-benins-national-television-claim-have-seized-power-2025-12-07/"><u>attempted coup</u></a> had taken place earlier in the day, it is unclear whether the observed Internet disruption was related in any way. From a routing perspective, all three impacted networks share <a href="https://radar.cloudflare.com/as174"><u>Cogent (AS174)</u></a> as an upstream provider, so a localized issue at Cogent may have contributed to the brief outage.  </p>



    <div>
      <h3>Cellcom Israel</h3>
      <a href="#cellcom-israel">
        
      </a>
    </div>
    <p>According to a <a href="https://www.ynetnews.com/article/2gpt1kt35"><u>reported announcement</u></a> from Israeli provider <a href="https://radar.cloudflare.com/as1680"><u>Cellcom (AS1680)</u></a>, on December 18, there was “<i>a malfunction affecting Internet connectivity that is impacting some of our customers.</i>” This malfunction dropped traffic nearly 70% as compared to the prior week, and occurred between 09:30 - 11:00 local time (07:30 - 09:00 UTC). The “malfunction” may have been a DNS failure, according to a <a href="https://www.israelnationalnews.com/news/419552"><u>published report</u></a>.</p>
    <div>
      <h3>Partner Communications (Israel)</h3>
      <a href="#partner-communications-israel">
        
      </a>
    </div>
    <p>Closing out 2025, on December 30, a major technical failure at Israeli provider <a href="https://radar.cloudflare.com/as12400"><u>Partner Communications (AS12400)</u></a> <a href="https://www.ynetnews.com/tech-and-digital/article/hjewkibnwe"><u>disrupted</u></a> mobile, TV, and Internet services across the country. Internet traffic from Partner fell by two-thirds as compared to the previous week between 14:00 - 15:00 local time (12:00 - 13:00 UTC). During the outage, queries to Cloudflare’s 1.1.1.1 public DNS resolver spiked, suggesting that the problem may have been related to Partner’s DNS infrastructure. However, the provider did not publicly confirm what caused the outage.</p>




    <div>
      <h2>Cloud Platforms</h2>
      <a href="#cloud-platforms">
        
      </a>
    </div>
    <p>During the fourth quarter, we launched a new <a href="https://radar.cloudflare.com/cloud-observatory"><u>Cloud Observatory</u></a> page on Radar that tracks availability and performance issues at a region level across hyperscaler cloud platforms, including <a href="https://radar.cloudflare.com/cloud-observatory/amazon"><u>Amazon Web Services</u></a>, <a href="https://radar.cloudflare.com/cloud-observatory/microsoft"><u>Microsoft Azure</u></a>, <a href="https://radar.cloudflare.com/cloud-observatory/google"><u>Google Cloud Platform</u></a>, and <a href="https://radar.cloudflare.com/cloud-observatory/oracle"><u>Oracle Cloud Infrastructure</u></a>.</p>
    <div>
      <h3>Amazon Web Services</h3>
      <a href="#amazon-web-services">
        
      </a>
    </div>
    <p>On October 20, the Amazon Web Services us-east-1 region in Northern Virginia experienced “<a href="https://health.aws.amazon.com/health/status?eventID=arn:aws:health:us-east-1::event/MULTIPLE_SERVICES/AWS_MULTIPLE_SERVICES_OPERATIONAL_ISSUE/AWS_MULTIPLE_SERVICES_OPERATIONAL_ISSUE_BA540_514A652BE1A"><u>increased error rates and latencies</u></a>” that affected multiple services within the region. The issues impacted not only customers with public-facing Web sites and applications that rely on infrastructure within the region, but also Cloudflare customers that have origin resources hosted in us-east-1.</p><p>We began to see the impact of the problems around 06:30 UTC, as the share of <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#success-rate"><u>error</u></a> (<a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Status#server_error_responses"><u>5xx-class</u></a>) responses began to climb, reaching as high as 17% around 08:00 UTC. The number of <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#connection-failures"><u>failures encountered when attempting to connect to origins</u></a> in us-east-1 climbed as well, peaking around 12:00 UTC.</p>

<p>The impact could also be clearly seen in key network performance metrics, which remained elevated throughout the incident, returning to normal levels just before the end of the incident, around 23:00 UTC. Both <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#tcp-handshake-duration"><u>TCP</u></a> and <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1?dateStart=2025-10-20&amp;dateEnd=2025-10-21#tls-handshake-duration"><u>TLS</u></a> handshake durations got progressively worse throughout the incident—these metrics measure the amount of time needed for Cloudflare to establish TCP and TLS connections respectively with customer origin servers in us-east-1. In addition, the amount of time elapsed before Cloudflare <a href="https://radar.cloudflare.com/cloud-observatory/amazon/us-east-1/#response-header-receive-duration"><u>received response headers</u></a> from the origin increased significantly during the first several hours of the incident, before gradually returning to expected levels.  </p>





    <div>
      <h3>Microsoft Azure</h3>
      <a href="#microsoft-azure">
        
      </a>
    </div>
    <p>On October 29, Microsoft Azure experienced an <a href="https://azure.status.microsoft/en-us/status/history/?trackingId=YKYN-BWZ"><u>incident</u></a> impacting <a href="https://azure.microsoft.com/en-us/products/frontdoor"><u>Azure Front Door</u></a>, its content delivery network service. According to <a href="https://azure.status.microsoft/en-us/status/history/?trackingId=YKYN-BWZ"><u>Azure's report on the incident</u></a>, “<i>A specific sequence of customer configuration changes, performed across two different control plane build versions, resulted in incompatible customer configuration metadata being generated. These customer configuration changes themselves were valid and non-malicious – however they produced metadata that, when deployed to edge site servers, exposed a latent bug in the data plane. This incompatibility triggered a crash during asynchronous processing within the data plane service.</i>”</p><p>The incident report marked the start time at 15:41 UTC, although we observed the volume of <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#connection-failures"><u>failed connection attempts</u></a> to Azure-hosted origins begin to climb about 45 minutes prior. The TCP and TLS handshake metrics also became more volatile during the incident period, with <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#tcp-handshake-duration"><u>TCP handshakes</u></a> taking over 50% longer at times, and <a href="https://radar.cloudflare.com/cloud-observatory/microsoft/global?dateStart=2025-10-29&amp;dateEnd=2025-10-30#tls-handshake-duration"><u>TLS handshakes</u></a> taking nearly 200% longer at peak. The impacted metrics began to improve after 20:00 UTC, and according to Microsoft, the incident ended at 00:05 UTC on October 30.</p>



    <div>
      <h2>Cloudflare</h2>
      <a href="#cloudflare">
        
      </a>
    </div>
    <p>In addition to the outages discussed above, Cloudflare also experienced two disruptions during the fourth quarter. While these were not Internet outages in the classic sense, they did prevent users from accessing Web sites and applications delivered and protected by Cloudflare when they occurred.</p><p>The first incident took place on November 18, and was caused by a software failure triggered by a change to one of our database systems' permissions, which caused the database to output multiple entries into a “feature file” used by our Bot Management system. Additional details, including a root cause analysis and timeline, can be found in the associated <a href="https://blog.cloudflare.com/18-november-2025-outage/"><u>blog post</u></a>.</p><p>The second incident occurred on December 5, and impacted a subset of customers, accounting for approximately 28% of all HTTP traffic served by Cloudflare. It was triggered by changes being made to our request body parsing logic while attempting to detect and mitigate a newly disclosed industry-wide React Server Components vulnerability. A post-mortem <a href="https://blog.cloudflare.com/5-december-2025-outage/"><u>blog post</u></a> contains additional details, including a root cause analysis and timeline.</p><p>For more information about the work underway at Cloudflare to prevent outages like these from happening again, check out our <a href="https://blog.cloudflare.com/fail-small-resilience-plan/"><u>blog post</u></a> detailing “Code Orange: Fail Small.”</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The disruptions observed in the fourth quarter underscore the importance of real-time data in maintaining global connectivity. Whether it’s a government-ordered shutdown or a minor technical issue, transparency allows the technical community to respond faster and more effectively. We will continue to track these shifts on Cloudflare Radar, providing the insights needed to navigate the complexities of modern networking. We share our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p><p>As a reminder, while these blog posts feature graphs from <a href="https://radar.cloudflare.com/"><u>Radar</u></a> and the <a href="https://radar.cloudflare.com/explorer"><u>Radar Data Explorer</u></a>, the underlying data is available from our <a href="https://developers.cloudflare.com/api/resources/radar/"><u>API</u></a>. You can use the API to retrieve data to do your own local monitoring or analysis, or you can use the <a href="https://github.com/cloudflare/mcp-server-cloudflare/tree/main/apps/radar#cloudflare-radar-mcp-server-"><u>Radar MCP server</u></a> to incorporate Radar data into your AI tools.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[Microsoft Azure]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">6dRT0oOSVcyQzjnZCkzH7S</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[What we know about Iran’s Internet shutdown]]></title>
            <link>https://blog.cloudflare.com/iran-protests-internet-shutdown/</link>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar data shows Internet traffic from Iran has effectively dropped to zero since January 8, signaling a complete shutdown in the country and disconnection from the global Internet.  
 ]]></description>
            <content:encoded><![CDATA[ <p>In late December 2025, <a href="https://apnews.com/article/iran-protests-us-israel-war-economy-d5da3b5f56449dd3871c9438c07f069f"><u>wide-scale protests erupted across multiple cities in Iran</u></a>. While these protests were initially fueled by frustration over inflation, food prices, and currency depreciation, they have grown into demonstrations <a href="https://www.theguardian.com/world/2025/dec/31/we-want-the-mullahs-gone-economic-crisis-sparks-biggest-protests-in-iran-since-2022"><u>demanding a change</u></a> in the country’s leadership regime. </p><p>In the last few days, Internet traffic from Iran has effectively dropped to zero. This is evident in the data available in Cloudflare Radar, as we’ll describe in this post.  </p>
    <div>
      <h2>Background</h2>
      <a href="#background">
        
      </a>
    </div>
    <p>The Iranian government has a history of cutting off Internet connectivity when such protests take place. In November 2019, protests erupted following the announcement of a significant increase in fuel prices. In response, the Iranian government implemented an <a href="https://iran-shutdown.amnesty.org/"><u>Internet shutdown</u></a> for more than five days. In September 2022, <a href="https://www.cnn.com/2022/09/21/middleeast/iran-mahsa-amini-death-widespread-protests-intl-hnk/index.html"><u>protests and demonstrations erupted across Iran</u></a> in response to the death <a href="https://www.aljazeera.com/news/2022/9/16/iranian-woman-dies-after-moral-polices-detention-reports"><u>in police custody</u></a> of Mahsa/Zhina Amini, a 22-year-old woman from the Kurdistan Province of Iran. Internet services were <a href="https://blog.cloudflare.com/protests-internet-disruption-ir/"><u>disrupted across multiple network providers</u></a> in the following days.</p><p>Amid the current protests, lower traffic volumes were already <a href="https://x.com/nima/status/2007830078093250904"><u>observed</u></a> at the start of the year, indicating potential connectivity issues leading into the more dramatic shutdown that has followed. </p>
    <div>
      <h2>Internet connectivity in Iran plummeted on January 8</h2>
      <a href="#internet-connectivity-in-iran-plummeted-on-january-8">
        
      </a>
    </div>
    <p>Some traffic anomalies were seen in the first few days of 2026 (described in further detail below), though peak traffic levels recovered by January 5, and exceeded expected levels during the following days.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cBTGRkiBSJTfJd1QMuXYV/195ffd12571ef25f35c753d8f2594d38/unnamed.png" />
          </figure><p>However, this strong recovery proved to be short-lived. IPv6-related shifts observed on January 8 provided the first indication of the changes to come. At 11:50 UTC (15:20 local time), <a href="https://x.com/CloudflareRadar/status/2009266152355041543"><u>the amount of IPv6 address space announced by Iranian networks dropped by 98.5%</u></a>, falling from over 48 million /48s (blocks of 2^80 IPv6 addresses) to just over 737,000 /48s. A drop in announced IP address space (whether IPv6 or IPv4) means that the announcing networks are no longer telling the world how to reach those addresses. A major drop like this one can signal an intentional disruption to Internet connectivity, as there is no longer a path to the clients or servers using those IP addresses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lQVvoLc77jO11pGGPRG5N/44eabb313e139af6f93ee976c6cd70e7/BLOG-3110_2.png" />
          </figure><p>This drop in announced IPv6 address space served to reduce IPv6’s share of human-generated traffic from around 12% to around 2%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GOdWNEvSKh4HapwJEYsOW/878b4cdfcacf00a416629b7aae464f20/BLOG-3110_3.png" />
          </figure><p>As seen in the graph below, this drop in IPv6 traffic stayed at a relatively consistent level for approximately 100 minutes, before falling further just before 13:30 UTC (17:00 local time). This second drop resulted in IPv6 traffic from Iran all but disappearing.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oYBhaT8U8NKRMYTMfSWY2/21a3aee3066274b11c7b4c059a789bbc/BLOG-3110_4.jpg" />
          </figure><p>Several hours later, we observed <a href="https://x.com/CloudflareRadar/status/2009312093749801350?s=20"><u>overall traffic levels from the country begin to decline rapidly</u></a>. Between 16:30 - 17:00 UTC (20:00 - 20:30 local time), traffic volumes fell nearly 90%, fueled by a loss of traffic from the major Iranian network providers, including <a href="https://radar.cloudflare.com/as197207"><u>MCCI (AS197207)</u></a>, <a href="https://radar.cloudflare.com/as44244"><u>IranCell (AS44244)</u></a>, and <a href="https://radar.cloudflare.com/as58224"><u>TCI (AS58224)</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17V0uq3ZHwSClk1NbMsfXj/6d02a99d67224ebe72d03c2f9aa537c8/BLOG-3110_5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FZOw6Vf0zyZcFReGTDgbJ/9fbd98a696d895b10ce76e3831a258ff/BLOG-3110_6.png" />
          </figure><p>Around 18:45 UTC, Internet traffic from Iran <a href="https://x.com/CloudflareRadar/status/2009354299302908143"><u>dropped to effectively zero</u></a>, signaling a complete shutdown in the country and disconnection from the global Internet.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4h1G0brqaDqQP4LroOpmu8/6a74b8803bbd251375a6d65732f1be56/BLOG-3110_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RY1SofUechQRgKU81yEt9/6ce900d5165a848701306cc34c964817/BLOG-3110_8.png" />
          </figure>
    <div>
      <h2>Brief windows of connectivity on January 9 — but they don’t last</h2>
      <a href="#brief-windows-of-connectivity-on-january-9-but-they-dont-last">
        
      </a>
    </div>
    <p>After the shutdown took hold the previous day, internal traffic data showed an <a href="https://x.com/CloudflareRadar/status/2009758510909665404"><u>extremely low volume of traffic from Iran</u></a>, amounting to less than 0.01% of pre-shutdown peaks, starting around 10:00 UTC (13:30 local time) on January 9. It appears that access to Cloudflare’s public DNS resolver, <a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a>, also became available again around 10:00 UTC (13:30 local time), leading request traffic to briefly spike well above the expected range. However, after spiking, only a small amount of request traffic to 1.1.1.1 remained visible.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q43txqeO1Y5jfDtaHHvIN/0108bd24f598bbf8b89b4485d9ec58b6/BLOG-3110_9.png" />
          </figure><p>Several Iranian universities also saw <a href="https://x.com/CloudflareRadar/status/2009630454383870417?s=20"><u>connectivity briefly restored</u></a>, starting around 11:30 UTC (15:00 local time). These included <a href="https://radar.cloudflare.com/as29068"><u>University of Tehran Informatics Center (AS29068)</u></a>, <a href="https://radar.cloudflare.com/as12660"><u>Sharif University of Technology (AS12660)</u></a>, <a href="https://radar.cloudflare.com/as43965"><u>Tehran University of Medical Science (AS43965)</u></a>, and <a href="https://radar.cloudflare.com/as57745"><u>Tarbita Modares University (AS57745)</u></a>. It is unclear whether this restoration was intentional, but traffic from these networks was once again non-existent after 15:00 UTC (18:30 local time).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/pcP3V6y2nhRnH7swgSnZb/bd1e5601cb208046324607f792c51d2a/BLOG-3110_10.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XEwTXqeAu6O1StFLmeGLe/20ccec04c3441eb10117535c92424c30/BLOG-3110_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ACIe46mGSsNGrcKDRxfQr/8deb5247b24fa9a5b12891dcacae7e27/BLOG-3110_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vZpp0VGcx4He4oNyCLOSK/423f26e3fcdd309dae8a02acad990406/BLOG-3110_13.png" />
          </figure>
    <div>
      <h2>Changes in HTTP traffic preceded the Internet shutdown</h2>
      <a href="#changes-in-http-traffic-preceded-the-internet-shutdown">
        
      </a>
    </div>
    <p>Alongside the lower traffic levels observed at the start of the year, as discussed above, a clear shift in HTTP version usage from human-generated traffic was also observed across leading network providers, as seen in the graphs below. Prior to that point, as much as 40% of HTTP requests on <a href="https://radar.cloudflare.com/as44244"><u>IranCell (AS44244)</u></a> used HTTP/3, but that figure fell to just 5% at 20:00 UTC (23:30 local time) on December 31, and continued to decline over the following days. Usage of QUIC from the network followed a similar pattern, as it relies on HTTP/3. </p><p>On <a href="https://radar.cloudflare.com/as58224"><u>TCI (AS58224)</u></a>, HTTP/3 also accounted for as much as 40% of requests at peak, but gradually declined starting on January 1 before falling below 5% starting around 07:00 UTC (10:30 local time) on January 3. QUIC usage on this network followed a similar pattern as well. MahsaNet, an organization that fights against Internet censorship in Iran, <a href="https://x.com/mahsanet/status/2007491214405140716?s=20"><u>suggested</u></a> that these shifts could indicate that “Severe filtering and layered, upgraded whitelisting are clearly evident and being implemented” (translation via X). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aF6ntL7YtxVJDEibF0tPh/184f99765daf533480f1b9791774a59f/BLOG-3110_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LsVTrJf0kJfhUR0kgu114/9d71caca08bf4aa39979e4388760d158/BLOG-3110_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XyJjijsAwE8M7c9xwqI0Y/88b30b6d306e03d168710b21f90076c6/BLOG-3110_17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Wq1neIAWfcz5P7GP6u5VF/ceeb800a75a1419f2c6de2aa3d9ae1ce/BLOG-3110_18.png" />
          </figure>
    <div>
      <h2>The shutdown continues</h2>
      <a href="#the-shutdown-continues">
        
      </a>
    </div>
    <p>As we noted in social media posts (<a href="https://x.com/cloudflareradar"><u>X</u></a>, <a href="https://noc.social/@cloudflareradar"><u>Mastodon</u></a>, <a href="https://bsky.app/profile/radar.cloudflare.com"><u>Bluesky</u></a>), no significant changes have been observed in Iran’s Internet traffic since January 10. <b>The country remains almost entirely cut off from the global Internet, with internal data showing traffic volumes remaining at a fraction of a percent of previous levels.</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EY7TALUsSytiMgsei2y2h/0aaf1473dfc1a0be908beee6f0b14e72/BLOG-3110_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JXW8ND7fQCbbPj5vexBJH/f194dfd409c343691915dc214917d402/BLOG-3110_20.png" />
          </figure><p>We will continue to monitor the state of Internet connectivity in Iran, and will continue to post updates on our social media accounts. Use Cloudflare Radar’s <a href="https://radar.cloudflare.com/traffic/ir"><u>Traffic</u></a> and <a href="https://radar.cloudflare.com/routing/ir"><u>Routing</u></a> pages for Iran and the <a href="https://radar.cloudflare.com/traffic/ir#autonomous-systems"><u>top networks</u></a> within the country for near-real time insights into these metrics.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <guid isPermaLink="false">5VetKk31z2RaNY9CI4lsye</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/radar-2025-year-in-review/</link>
            <pubDate>Mon, 15 Dec 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We present our 6th annual review of Internet trends and patterns observed across the globe, revealing the disruptions, advances and metrics that defined 2025.  ]]></description>
            <content:encoded><![CDATA[ <p>The <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>2025 Cloudflare Radar Year in Review</u></a> is here: our sixth annual review of the Internet trends and patterns we observed throughout the year, based on Cloudflare’s expansive network view.</p><p>Our view is unique, due to Cloudflare’s global <a href="https://cloudflare.com/network"><u>network</u></a>, which has a presence in 330 cities in over 125 countries/regions, handling over 81 million HTTP requests per second on average, with more than 129 million HTTP requests per second at peak on behalf of millions of customer Web properties, in addition to responding to approximately 67 million (<a href="https://www.cloudflare.com/learning/dns/dns-server-types/"><u>authoritative + resolver</u></a>) DNS queries per second. <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> uses the data generated by these Web and DNS services, combined with other complementary data sets, to provide near-real time insights into <a href="https://radar.cloudflare.com/traffic"><u>traffic</u></a>, <a href="https://radar.cloudflare.com/bots"><u>bots</u></a>, <a href="https://radar.cloudflare.com/security/"><u>security</u></a>, <a href="https://radar.cloudflare.com/quality"><u>connectivity</u></a>, and <a href="https://radar.cloudflare.com/dns"><u>DNS</u></a> patterns and trends that we observe across the Internet. </p><p>Our <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>Radar Year in Review</u></a> takes that observability and, instead of a real-time view, offers a look back at 2025: incorporating interactive charts, graphs, and maps that allow you to explore and compare selected trends and measurements year-over-year and across geographies, as well as share and embed Year in Review graphs. </p><p>The 2025 Year In Review is organized into six sections: <a href="https://radar.cloudflare.com/year-in-review/2025#internet-traffic-growth"><u>Traffic</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#robots-txt"><u>AI</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#ios-vs-android"><u>Adoption &amp; Usage</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#internet-outages"><u>Connectivity</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025#mitigated-traffic"><u>Security</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025#malicious-emails"><u>Email Security</u></a>, with data spanning the period from January 1 to December 2, 2025. To ensure consistency, we kept underlying methodologies unchanged from previous years’ calculations. We also incorporated several new data sets this year, including multiple AI-related metrics, <a href="https://radar.cloudflare.com/year-in-review/2025#speed-tests"><u>global speed test activity</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025#ddos-attacks"><u>hyper-volumetric DDOS size progression</u></a>. Trends for over 200 countries/regions are available on the microsite; smaller or less-populated locations are excluded due to insufficient data. Some metrics are only shown worldwide and are not displayed if a country/region is selected. </p><p>In this post, we highlight key findings and interesting observations from the major Year In Review microsite sections, and we have again published a companion <i>Most Popular Internet Services </i><a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>blog post</u></a> that specifically explores trends seen across <a href="https://radar.cloudflare.com/year-in-review/2025#internet-services"><u>top Internet Services</u></a>.</p><p>We encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2025/"><u>2025 Year in Review microsite</u></a> to explore the datasets and metrics in more detail, including those for your country/region to see how they have changed since 2024, and how they compare to other areas of interest. </p><p>We hope you’ll find the Year in Review to be an insightful and powerful tool — to explore the disruptions, advances, and metrics that defined the Internet in 2025. </p><p>Let’s dig in.</p>
    <div>
      <h2>Key Findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic</h3>
      <a href="#traffic">
        
      </a>
    </div>
    <ul><li><p>Global Internet traffic grew 19% in 2025, with significant growth starting in August. <a href="#global-internet-traffic-grew-19-in-2025-with-significant-growth-starting-in-august"><u>➜</u></a></p></li><li><p>The top 10 most popular Internet services saw a few year-over-year shifts, while a number of new entrants landed on category lists. <a href="#the-top-10-most-popular-internet-services-saw-some-year-over-year-shifts-while-the-category-lists-saw-a-number-of-new-entrants"><u>➜</u></a></p></li><li><p>Starlink traffic doubled in 2025, including traffic from over 20 new countries/regions. <a href="#starlink-traffic-doubled-in-2025-including-traffic-from-over-20-new-countries-regions"><u>➜</u></a></p></li><li><p>Googlebot was again responsible for the highest volume of request traffic to Cloudflare in 2025 as it crawled millions of Cloudflare customer sites for search indexing and AI training. <a href="#googlebot-was-again-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2025-as-it-crawled-millions-of-cloudflare-customer-sites-for-search-indexing-and-ai-training"><u>➜</u></a></p></li><li><p>The share of human-generated Web traffic that is post-quantum encrypted has grown to 52%. <a href="#the-share-of-human-generated-web-traffic-that-is-post-quantum-encrypted-has-grown-to-52"><u>➜</u></a></p></li><li><p>Googlebot was responsible for more than a quarter of Verified Bot traffic. <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic"><u>➜</u></a></p></li></ul>
    <div>
      <h3>AI</h3>
      <a href="#ai">
        
      </a>
    </div>
    <ul><li><p>Crawl volume from dual-purpose Googlebot dwarfed other AI bots and crawlers. <a href="#crawl-volume-from-dual-purpose-googlebot-dwarfed-other-ai-bots-and-crawlers"><u>➜</u></a></p></li><li><p>AI “user action” crawling increased by over 15x in 2025. <a href="#ai-user-action-crawling-increased-by-over-15x-in-2025"><u>➜</u></a></p></li><li><p>While other AI bots accounted for 4.2% of HTML request traffic, Googlebot alone accounted for 4.5%. <a href="#while-other-ai-bots-accounted-for-4-2-of-html-request-traffic-googlebot-alone-accounted-for-4-5"><u>➜</u></a></p></li><li><p>Anthropic had the highest crawl-to-refer ratio among the leading AI and search platforms. <a href="#anthropic-had-the-highest-crawl-to-refer-ratio-among-the-leading-ai-and-search-platforms"><u>➜</u></a></p></li><li><p>AI crawlers were the most frequently fully disallowed user agents found in robots.txt files. <a href="#ai-crawlers-were-the-most-frequently-fully-disallowed-user-agents-found-in-robots-txt-files"><u>➜</u></a></p></li><li><p>On Workers AI, Meta’s llama-3-8b-instruct model was the most popular model, and text generation was the most popular task type. <a href="#on-workers-ai-metas-llama-3-8b-instruct-model-was-the-most-popular-model-and-text-generation-was-the-most-popular-task-type"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Adoption &amp; Usage</h3>
      <a href="#adoption-usage">
        
      </a>
    </div>
    <ul><li><p>iOS devices generated 35% of mobile device traffic globally — and more than half of device traffic in many countries. <a href="#ios-devices-generated-35-of-mobile-device-traffic-globally-and-more-than-half-of-device-traffic-in-many-countries"><u>➜</u></a></p></li><li><p>The shares of global Web requests using HTTP/3 and HTTP/2 both increased slightly in 2025. <a href="#the-shares-of-global-web-requests-using-http-3-and-http-2-both-increased-slightly-in-2025"><u>➜</u></a></p></li><li><p>JavaScript-based libraries and frameworks remained integral tools for building Web sites. <a href="#javascript-based-libraries-and-frameworks-remained-integral-tools-for-building-web-sites"><u>➜</u></a></p></li><li><p>One-fifth of automated API requests were made by Go-based clients. <a href="#one-fifth-of-automated-api-requests-were-made-by-go-based-clients"><u>➜</u></a></p></li><li><p>Google remains the top search engine, with Yandex, Bing, and DuckDuckGo distant followers. <a href="#google-remains-the-top-search-engine-with-yandex-bing-and-duckduckgo-distant-followers"><u>➜</u></a></p></li><li><p>Chrome remains the top browser across platforms and operating systems – except on iOS, where Safari has the largest share. <a href="#chrome-remains-the-top-browser-across-platforms-and-operating-systems-except-on-ios-where-safari-has-the-largest-share"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Connectivity</h3>
      <a href="#connectivity">
        
      </a>
    </div>
    <ul><li><p>Almost half of the 174 major Internet outages observed around the world in 2025 were due to government-directed regional and national shutdowns of Internet connectivity. <a href="#almost-half-of-the-174-major-internet-outages-observed-around-the-world-in-2025-were-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity"><u>➜</u></a></p></li><li><p>Globally, less than a third of dual-stack requests were made over IPv6, while in India, over two-thirds were. <a href="#globally-less-than-a-third-of-dual-stack-requests-were-made-over-ipv6-while-in-india-over-two-thirds-were"><u>➜</u></a></p></li><li><p>European countries had some of the highest download speeds, all above 200 Mbps. Spain remained consistently among the top locations across measured Internet quality metrics. <a href="#european-countries-had-some-of-the-highest-download-speeds-all-above-200-mbps-spain-remained-consistently-among-the-top-locations-across-measured-internet-quality-metrics"><u>➜</u></a></p></li><li><p>London and Los Angeles were hotspots for Cloudflare speed test activity in 2025. <a href="#london-and-los-angeles-were-hotspots-for-cloudflare-speed-test-activity-in-2025"><u>➜</u></a></p></li><li><p>More than half of request traffic comes from mobile devices in 117 countries/regions. <a href="#more-than-half-of-request-traffic-comes-from-mobile-devices-in-117-countries-regions"><u>➜</u></a></p></li></ul>
    <div>
      <h3>Security</h3>
      <a href="#security">
        
      </a>
    </div>
    <ul><li><p>6% of global traffic over Cloudflare’s network was mitigated by our systems — either as potentially malicious or for customer-defined reasons. <a href="#6-of-global-traffic-over-cloudflares-network-was-mitigated-by-our-systems-either-as-potentially-malicious-or-for-customer-defined-reasons"><u>➜</u></a></p></li><li><p>40% of global bot traffic came from the United States, with Amazon Web Services and Google Cloud originating a quarter of global bot traffic. <a href="#40-of-global-bot-traffic-came-from-the-united-states-with-amazon-web-services-and-google-cloud-originating-a-quarter-of-global-bot-traffic"><u>➜</u></a></p></li><li><p>Organizations in the "People and Society” sector were the most targeted during 2025. <a href="#organizations-in-the-people-and-society-vertical-were-the-most-targeted-during-2025"><u>➜</u></a></p></li><li><p>Routing security, measured as the shares of RPKI valid routes and covered IP address space, saw continued improvement throughout 2025. <a href="#routing-security-measured-as-the-shares-of-rpki-valid-routes-and-covered-ip-address-space-saw-continued-improvement-throughout-2025"><u>➜</u></a></p></li><li><p>Hyper-volumetric DDoS attack sizes grew significantly throughout the year. <a href="#hyper-volumetric-ddos-attack-sizes-grew-significantly-throughout-the-year"><u>➜</u></a></p></li><li><p>More than 5% of email messages analyzed by Cloudflare were found to be malicious. <a href="#more-than-5-of-email-messages-analyzed-by-cloudflare-were-found-to-be-malicious"><u>➜</u></a></p></li><li><p>Deceptive links, identity deception, and brand impersonation were the most common types of threats found in malicious email messages. <a href="#deceptive-links-identity-deception-and-brand-impersonation-were-the-most-common-types-of-threats-found-in-malicious-email-messages"><u>➜</u></a></p></li><li><p>Nearly all of the email messages from the .christmas and .lol Top Level Domains were found to be either spam or malicious. <a href="#nearly-all-of-the-email-messages-from-the-christmas-and-lol-top-level-domains-were-found-to-be-either-spam-or-malicious"><u>➜</u></a></p></li></ul>
    <div>
      <h2>Traffic trends</h2>
      <a href="#traffic-trends">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3EqqyX4A0PI27tBdVijUq2/9102522d8661d7d5911ece00c1b1e678/BLOG-3077_2.png" />
          </figure>
    <div>
      <h3>Global Internet traffic grew 19% in 2025, with significant growth starting in August</h3>
      <a href="#global-internet-traffic-grew-19-in-2025-with-significant-growth-starting-in-august">
        
      </a>
    </div>
    <p>To determine the traffic trends over time for the Year in Review, we use the average daily traffic volume (excluding bot traffic) over the second full calendar week (January 12-18) of 2025 as our baseline. (The second calendar week is used to allow time for people to get back into their “normal” school and work routines after the winter holidays and New Year’s Day.) The percent change shown in the traffic trends chart is calculated relative to the baseline value — it does not represent absolute traffic volume for a country/region. The trend line represents a seven-day trailing average, which is used to smooth the sharp changes seen with data at a daily granularity. </p><p>Traffic growth in 2025 appeared to occur in several phases. Traffic was, on average, somewhat flat through mid-April, generally within a couple of percent of the baseline value. However, it then saw growth through May to approximately 5% above baseline, staying in the +4-7% range through mid-August. It was at that time that growth accelerated, climbing steadily through September, October, and November, <a href="https://radar.cloudflare.com/year-in-review/2025#internet-traffic-growth"><u>peaking at 19% growth</u></a> for the year. Aided by a late-November increase, 2025’s rate of growth is about 10% higher than the 17% growth observed in 2024. In <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#global-internet-traffic-grew-17-2-in-2024"><u>past years</u></a>, we have also observed traffic growth accelerating in the back half of the year, although in 2022-2024, that acceleration started in July. It’s not clear why this year’s growth was seemingly delayed by several weeks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3I9BSisZlIKlCrANpDTBtx/deb202dba9ca9aa7e23379bab6d81412/BLOG-3077_3_-_traffic-internet_traffic_growth_-_worldwide.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, worldwide</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2025/bw#internet-traffic-growth"><u>Botswana</u></a> saw the highest peak growth, reaching 298% above baseline on November 8, and ending the period 295% over baseline. (More on what accounts for that growth in the Starlink section below.) Botswana and <a href="https://radar.cloudflare.com/year-in-review/2025/sd#internet-traffic-growth"><u>Sudan</u></a> were the only countries/regions to see traffic more than double over the course of the year, although some others experienced peak increases over 100% at some point during the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1z4fQNQvLZM5li5h7JWeIq/ed3afd5c7d2412a7426f3e7c4985be33/BLOG-3077_4_-_traffic-internet_traffic_growth_-_Botswana.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Botswana</i></sup></p><p>The impact of extended Internet disruptions are clearly visible within the graphs as well. For example, on October 29, the <a href="https://radar.cloudflare.com/year-in-review/2025/tz#internet-traffic-growth"><u>Tanzanian</u></a> government imposed an Internet shutdown there in response to election day protests. That shutdown lasted just a day, but another one followed from October 30 until November 3. Although traffic in the country had increased more than 40% above baseline ahead of the shutdowns, the disruption ultimately dropped traffic more than 70% below baseline — a rapid reversal. Traffic recovered quickly after connectivity was restored. A similar pattern was observed in <a href="https://radar.cloudflare.com/year-in-review/2025/jm#internet-traffic-growth"><u>Jamaica</u></a>, where Internet traffic spiked ahead of the arrival of <a href="https://x.com/CloudflareRadar/status/1983188999461319102?s=20"><u>Hurricane Melissa</u></a> on October 28, and then dropped significantly after the storm caused power outages and infrastructure damage on the island. Traffic began to rebound after the storm’s passing, returning to a level just above baseline by early December.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dVMnD0mQvl4sB1bbn6kka/a7c433aaf2df3319328b27156bf70618/BLOG-3077_5_-_traffic-internet_traffic_growth_-_Tanzania.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Tanzania</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dovYDK7vTfjsL9FBNAvjE/a80a0c8fe69cce81ecc03605ae874859/BLOG-3077_6_-_traffic-internet_traffic_growth_-_Jamaica.png" />
          </figure><p><sup><i>Internet traffic trends in 2025, Jamaica</i></sup></p>
    <div>
      <h3>The top 10 most popular Internet services saw some year-over-year shifts, while the category lists saw a number of new entrants</h3>
      <a href="#the-top-10-most-popular-internet-services-saw-some-year-over-year-shifts-while-the-category-lists-saw-a-number-of-new-entrants">
        
      </a>
    </div>
    <p>For the Year in Review, we look at the 11-month year-to-date period. In addition to an “overall” ranked list, we also rank services across nine categories, based on analysis of anonymized query data of traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> from millions of users around the world. For the purposes of these rankings, domains that belong to a single Internet service are grouped together.</p><p>Google and Facebook once again held the top two spots among the <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-services"><u>top 10</u></a>. Although the other members of the top 10 list remained consistent with 2024’s rankings, there was some movement in the middle. Microsoft, Instagram, and YouTube all moved higher; Amazon Web Services (AWS) dropped one spot lower, while TikTok fell four spots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vMi7DU13dkmLCkhEvvzVO/bdc5b0baa3b140c6112abf3b7414da83/BLOG-3077_7_-_traffic-topinternetservices.png" />
          </figure><p><sup><i>Top Internet services in 2025, worldwide</i></sup></p><p>Among Generative AI services, ChatGPT/OpenAI remained at the top of the list. But there was movement elsewhere, highlighting the dynamic nature of the industry. Services that moved up the rankings include Perplexity, Claude/Anthropic, and GitHub Copilot. New entries in the top 10 for 2025 include Google Gemini, Windsurf AI, Grok/xAI, and DeepSeek.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vUiNheIzMym9Mr3TPK3yN/c4684bb93696e31dcd689b1a150d35cd/BLOG-3077_8_-_Generative_AI.png" />
          </figure><p><sup><i>Top Generative AI services in 2025, worldwide</i></sup></p><p>Other categories saw movement within their lists as well – Shopee (“the leading e-commerce online shopping platform in Southeast Asia and Taiwan”) is a new entrant to the E-Commerce list, and HBO Max joined the Video Streaming ranking. These categorical rankings, as well as trends seen by specific services, are explored in more detail in <a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>a separate blog post</u></a>.</p><p>In addition, this year we are also providing top Internet services insights at a country/region level for the Overall, Generative AI, Social Media, and Messaging categories. (In 2024, we only shared Overall insights.)</p>
    <div>
      <h3>Starlink traffic doubled in 2025, including traffic from over 20 new countries/regions</h3>
      <a href="#starlink-traffic-doubled-in-2025-including-traffic-from-over-20-new-countries-regions">
        
      </a>
    </div>
    <p>SpaceX Starlink’s satellite-based Internet service continues to be a popular option for bringing connectivity to unserved or underserved areas, as well as to users on <a href="https://starlink.com/business/aviation"><u>planes</u></a> and <a href="https://starlink.com/business/maritime"><u>boats</u></a>. We analyzed aggregate request traffic volumes associated with Starlink's primary <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (<a href="https://radar.cloudflare.com/as14593"><u>AS14593</u></a>) to track the growth in usage of the service throughout 2025. The request volume shown on the trend line in the chart represents a seven-day trailing average. </p><p>Globally, <a href="https://radar.cloudflare.com/year-in-review/2025/#starlink-traffic-trends"><u>traffic from Starlink</u></a> continued to see consistent growth throughout 2025, with total request volume up 2.3x across the year. We tend to see rapid traffic growth when Starlink service becomes available in a country/region, and that trend continues in 2025. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4d7DF8FT1RuK8rbrFfUu1E/c05645dc7640e11794b35770bc0bcd70/BLOG-3077_9_-_traffic-starlink-worldwide.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, worldwide</i></sup></p><p>That’s exactly what we saw in the more than 20 new countries/regions where <a href="https://x.com/starlink"><u>@Starlink</u></a> announced availability: within days, Starlink traffic in those places increased rapidly. These included <a href="https://radar.cloudflare.com/year-in-review/2025/am#starlink-traffic-trends"><u>Armenia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ne#starlink-traffic-trends"><u>Niger</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/lk#starlink-traffic-trends"><u>Sri Lanka</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/sx#starlink-traffic-trends"><u>Sint Maarten</u></a>.</p><p>We also saw Starlink traffic from a number of locations that are not currently <a href="https://starlink.com/map"><u>marked for service availability</u></a>. However, there are IPv4 and/or IPv6 prefixes associated with these countries in Starlink’s <a href="https://geoip.starlinkisp.net/feed.csv"><u>published geofeed</u></a>. Given the ability for Starlink users to <a href="https://starlink.com/roam"><u>roam</u></a> with their service (and equipment), this traffic likely comes from roaming users in those areas.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4knmSgVn4FFyMm3ZRNRvuq/887455ee737217a7f9bad2cedbbff009/BLOG-3077_10_-_traffic-starlink-niger.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, Niger</i></sup></p><p>Of countries/regions where service was active before 2025, <a href="https://radar.cloudflare.com/year-in-review/2025/bj#starlink-traffic-trends"><u>Benin</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/tl#starlink-traffic-trends"><u>Timor-Leste</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/bw#starlink-traffic-trends"><u>Botswana</u></a> had some of the largest traffic growth, at 51x, 19x, and 16x respectively. Starlink service availability in <a href="https://x.com/Starlink/status/1720438167944499638"><u>Benin</u></a> was first announced in November 2023, <a href="https://x.com/Starlink/status/1866631930902622360"><u>Timor-Leste</u></a> in December 2024, and <a href="https://x.com/Starlink/status/1828840132688130322"><u>Botswana</u></a> in August 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PlOuYo67dUghmsSVtzd5k/d8ff2816e5703cc425c403c52bd56be1/BLOG-3077_11_-_traffic-starlink-botswana.png" />
          </figure><p><sup><i>Starlink traffic growth in 2025, Botswana</i></sup></p><p>Similar services, such as <a href="https://leo.amazon.com/"><u>Amazon Leo</u></a>, <a href="https://www.eutelsat.com/satellite-services/tv-internet-home/satellite-internet-home-business-konnect"><u>Eutelsat Konnect</u></a>, and China’s <a href="https://en.wikipedia.org/wiki/Qianfan"><u>Qianfan</u></a>, continue to grow their satellite constellations and move towards commercial availability. We hope to review traffic growth across these services in the future as well.</p>
    <div>
      <h3>Googlebot was again responsible for the highest volume of request traffic to Cloudflare in 2025 as it crawled millions of Cloudflare customer sites for search indexing and AI training</h3>
      <a href="#googlebot-was-again-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2025-as-it-crawled-millions-of-cloudflare-customer-sites-for-search-indexing-and-ai-training">
        
      </a>
    </div>
    <p>To look at the aggregate request traffic Cloudflare saw in 2025 from the entire IPv4 Internet, we can use a <a href="https://en.wikipedia.org/wiki/Hilbert_curve"><u>Hilbert curve</u></a>, which allows us to visualize a sequence of IPv4 addresses in a two-dimensional pattern that keeps nearby IP addresses close to each other, making them <a href="https://xkcd.com/195/"><u>useful</u></a> for surveying the Internet's IPv4 address space. Within the <a href="https://radar.cloudflare.com/year-in-review/2025/#ipv4-traffic-distribution"><u>visualization</u></a>, we aggregate IPv4 addresses into <a href="https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf"><u>/20</u></a> prefixes, meaning that at the highest zoom level, each square represents traffic from 4,096 IPv4 addresses. This level of aggregation keeps the amount of data used for the visualization manageable. See the <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2024-as-it-retrieved-content-from-millions-of-cloudflare-customer-sites-for-search-indexing"><u>2024 Year in Review blog post</u></a> for additional details about the visualization.</p><p>For the third year in a row, the IP address block that had the maximum request volume to Cloudflare during 2025 was Google’s <a href="https://radar.cloudflare.com/routing/prefix/66.249.64.0/20"><u>66.249.64.0/20</u></a> –  <a href="https://developers.google.com/static/search/apis/ipranges/googlebot.json"><u>one of several</u></a> used by the <a href="https://developers.google.com/search/docs/crawling-indexing/googlebot"><u>Googlebot</u></a> web crawler to retrieve content for search indexing and AI training. That a Googlebot IP address block ranked again as the top request traffic source is unsurprising, given the number of web properties on Cloudflare’s network and <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic"><u>Googlebot’s aggressive crawling activity</u></a>. The Googlebot prefix accounted for nearly 4x as much IPv4 request traffic as the next largest traffic source, 146.20.240.0/20, which is part of a <a href="https://radar.cloudflare.com/routing/prefix/146.20.0.0/16"><u>larger block of IPv4 address space announced by Rackspace Hosting</u></a>. As a cloud and hosting provider, Rackspace supports many different types of customers and applications, so the driver of the observed traffic to Cloudflare isn’t known.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NpjYc7D7ykOlLh837jarL/59c2bd9927a2fb16bb39973f4d8d1db8/BLOG-3077_12_-_traffic-ipv4distribution-googlebot.png" />
          </figure><p><i><sup>Zoomed Hilbert curve view showing the address block that generated the highest volume of requests in 2025</sup></i></p><p>This year, we’ve added the ability to search for an autonomous system (ASN) to the visualization, allowing you to see how broadly a network provider’s IP address holdings are distributed across the IPv4 universe. </p><p>One example is AS16509 (AMAZON-02, used with AWS), which shows the results of Amazon’s acquisitions of <a href="https://toonk.io/aws-and-their-billions-in-ipv4-addresses/index.html"><u>large amounts of IPv4 address space</u></a> over the years. Another example is AS7018 (ATT-INTERNET4, AT&amp;T), which is one of the largest <a href="https://radar.cloudflare.com/routing/us#ases-registered-in-united-states"><u>announcers of IPv4 address space in the United States</u></a>. Much of the traffic we see from this ASN comes from <a href="https://radar.cloudflare.com/routing/prefix/12.0.0.0/8"><u>12.0.0.0/8</u></a>, a block of over 16 million IPv4 addresses that has been <a href="https://wq.apnic.net/apnic-bin/whois.pl?searchtext=12.147.5.178"><u>owned by AT&amp;T since 1983</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42mehcaIRV4Kp9h6P86z6d/436e033e353710419fcc49865d765258/BLOG-3077_13_-_traffic-ipv4distribution-as7018.png" />
          </figure><p><sup><i>Hilbert curve showing the IPv4 address blocks from AS7018 that sent traffic to Cloudflare in 2025</i></sup></p>
    <div>
      <h3>The share of human-generated Web traffic that is post-quantum encrypted has grown to 52%</h3>
      <a href="#the-share-of-human-generated-web-traffic-that-is-post-quantum-encrypted-has-grown-to-52">
        
      </a>
    </div>
    <p>“<a href="https://en.wikipedia.org/wiki/Post-quantum_cryptography"><u>Post-quantum</u></a>” refers to a set of cryptographic techniques designed to protect encrypted data from “<a href="https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later"><u>harvest now, decrypt later</u></a>” attacks by adversaries that have the ability to capture and store current data for future decryption by sufficiently advanced quantum computers. The Cloudflare Research team has been <a href="https://blog.cloudflare.com/sidh-go/"><u>working on post-quantum cryptography since 2017</u></a>, and regularly publishes <a href="https://blog.cloudflare.com/pq-2025/"><u>updates</u></a> on the state of the post-quantum Internet.</p><p>After seeing <a href="https://radar.cloudflare.com/year-in-review/2024#post-quantum-encryption"><u>significant growth in 2024</u></a>, the global share of <a href="https://radar.cloudflare.com/year-in-review/2025/#post-quantum-encryption"><u>post-quantum encrypted traffic</u></a> nearly doubled throughout 2025, from 29% at the start of the year to 52% in early December. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qqehh1EqKIMi7xNcSr8SN/c24962ce446e153fbd37c9abe7254f78/BLOG-3077_14_-_traffic-postquantum-worldwide.png" />
          </figure><p><sup><i>Post-quantum encrypted TLS 1.3 traffic growth in 2025, worldwide</i></sup></p><p>Twenty-eight countries/regions saw their share of post-quantum encrypted traffic more than double throughout the year, including significant growth in <a href="https://radar.cloudflare.com/year-in-review/2025/pr#post-quantum-encryption"><u>Puerto Rico</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/kw#post-quantum-encryption"><u>Kuwait</u></a>. Kuwait’s share nearly tripled, from 13% to 37%, and Puerto Rico’s share grew from 20% to 49%. </p><p>Those three were among others that saw significant share growth in mid-September, <a href="https://9to5mac.com/2025/09/09/apple-announces-ios-26-release-date-september-15/"><u>concurrent with</u></a> Apple releasing operating system updates, in which “<i>TLS-protected connections will </i><a href="https://support.apple.com/en-us/122756"><i><u>automatically advertise support for hybrid, quantum-secure key exchange</u></i></a><i> in TLS 1.3</i>”. In Kuwait and Puerto Rico, over half of request traffic is from mobile devices, and approximately half comes from iOS devices in both locations as well, so it is not surprising that this software update resulted in a significant increase in post-quantum traffic share</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Y65KuTezdGnAfilj9Xosr/a74b60f9f24322827ea89f9ad1eef035/BLOG-3077_15_-_traffic-postquantum-puertorico.png" />
          </figure><p><sup><i>Post-quantum encrypted TLS 1.3 traffic growth in 2025, Puerto Rico</i></sup></p><p>To that end, the share of post-quantum encrypted traffic from Apple iOS devices <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=post_quantum&amp;filters=botClass%253DLIKELY_HUMAN%252Cos%253DiOS&amp;dt=2025-09-01_2025-09-28"><u>grew significantly in September</u></a> after iOS 26 was officially released. Just <a href="https://x.com/CloudflareRadar/status/1969159602999640535?s=20"><u>four days after release</u></a>, the global share of requests with post-quantum support from iOS devices grew from just under 2% to 11%. By <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=post_quantum&amp;filters=deviceType%253DMobile%252Cos%253DiOS%252CbotClass%253DLikely_Human&amp;dt=2025-12-01_2025-12-07"><u>early December</u></a>, more than 25% of requests from iOS devices used post-quantum encryption.</p>
    <div>
      <h3>Googlebot was responsible for more than a quarter of Verified Bot traffic</h3>
      <a href="#googlebot-was-responsible-for-more-than-a-quarter-of-verified-bot-traffic">
        
      </a>
    </div>
    <p>The new <a href="https://radar.cloudflare.com/bots/directory?kind=all"><u>Bots Directory</u></a> on Cloudflare Radar provides a wealth of information about <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/"><u>Verified Bots</u></a> and <a href="https://developers.cloudflare.com/bots/concepts/bot/signed-agents/"><u>Signed Agents</u></a>, including their operators, categories, and associated user agents, links to documentation, and traffic trends. Verified Bots must conform to a <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/policy/"><u>set of requirements</u></a> as well as being verified through either <a href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/"><u>Web Bot Auth</u></a> or <a href="https://developers.cloudflare.com/bots/reference/bot-verification/ip-validation/"><u>IP validation</u></a>. A signed agent is controlled by an end user and a verified signature-agent from their <a href="https://developers.cloudflare.com/bots/reference/bot-verification/web-bot-auth/"><u>Web Bot Auth</u></a> implementation, and must conform to a separate <a href="https://developers.cloudflare.com/bots/concepts/bot/signed-agents/policy/"><u>set of requirements</u></a>.</p><p><a href="https://radar.cloudflare.com/bots/directory/google"><u>Googlebot</u></a> is used to crawl Web site content for search indexing and AI training, and it was far and away the <a href="https://radar.cloudflare.com/year-in-review/2025/#per-bot-traffic"><u>most active bot seen by Cloudflare</u></a> throughout 2025. It was most active between mid-February and mid-July, peaking in mid-April, and was responsible for over 28% of traffic from Verified Bots. Other Google-operated bots that were responsible for notable amounts of traffic included <a href="https://radar.cloudflare.com/bots/directory/googleads"><u>Google AdsBot</u></a> (used to monitor Web sites where Google ads are served), <a href="https://radar.cloudflare.com/bots/directory/googleimageproxy"><u>Google Image Proxy</u></a> (used to retrieve and cache images embedded in email messages), and <a href="https://radar.cloudflare.com/bots/directory/google-other"><u>GoogleOther</u></a> (used by various product teams for fetching publicly accessible content from sites).</p><p>OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/gptbot"><u>GPTBot</u></a>, which crawls content for AI training, was the next most active bot, originating about 7.5% of Verified Bot traffic, with fairly volatile crawling activity during the first half of the year. Microsoft’s <a href="https://radar.cloudflare.com/bots/directory/bing"><u>Bingbot</u></a> crawls Web site content for search indexing and AI training and generated 6% of Verified Bot traffic throughout the year, showing relatively stable activity. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/01CNwrALbfJ1DBJpX3hHvw/58f278f76b4e57d095e5e61b879f3728/BLOG-3077_16_-_traffic-verifiedbot-bots.png" />
          </figure><p><sup><i>Verified Bot traffic trends in 2025, worldwide</i></sup></p><p>Search engine crawlers and AI crawlers are the two most active Verified Bot categories, with traffic patterns mapping closely to the leading bots in those categories, including GoogleBot and OpenAI’s GPTBot. <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_CRAWLER&amp;kind=all"><u>Search engine crawlers</u></a> were responsible for 40% of Verified Bot traffic, with <a href="https://radar.cloudflare.com/bots/directory?category=AI_CRAWLER&amp;kind=all"><u>AI crawlers</u></a> generating half as much (20%). <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_OPTIMIZATION&amp;kind=all"><u>Search engine optimization</u></a> bots were also quite active, driving over 13% of requests from Verified Bots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IFOI7astEqMk1fqLPvhMK/860c1b28fe6d2987b7bcd8510d1495b5/BLOG-3077_17_-_traffic-verifiedbots-category.png" />
          </figure><p><sup><i>Verified Bot traffic trends by category in 2025, worldwide</i></sup></p>
    <div>
      <h2>AI insights</h2>
      <a href="#ai-insights">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IY2MCHqrWK7wPO5XSrHwc/2d4622db6417472e2702c31a95d31cef/BLOG-3077_18_-_.png" />
          </figure>
    <div>
      <h2> Crawl volume from dual-purpose Googlebot dwarfed other AI bots and crawlers</h2>
      <a href="#crawl-volume-from-dual-purpose-googlebot-dwarfed-other-ai-bots-and-crawlers">
        
      </a>
    </div>
    <p>In September, a Cloudflare <a href="https://blog.cloudflare.com/building-a-better-internet-with-responsible-ai-bot-principles/"><u>blog post</u></a> laid out a proposal for responsible AI bot principles, one of which was “AI bots should have one distinct purpose and declare it.” In the <a href="https://radar.cloudflare.com/ai-insights#ai-bot-best-practices"><u>AI bots best practices overview</u></a> on Radar, we note that several bot operators have dual-purpose crawlers, including Google and Microsoft.</p><p>Because <a href="https://radar.cloudflare.com/bots/directory/google"><u>Googlebot</u></a> crawls for both search engine indexing and AI training, we have included it in this year’s <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-bot-and-crawler-traffic"><u>AI crawler overview</u></a>. In 2025, its crawl volume dwarfed that of other leading AI bots. Request traffic began to increase in mid-February, peaking in late April, and then slowly declined through late July. After that, it grew gradually into the end of the year. <a href="https://radar.cloudflare.com/bots/directory/bing"><u>Bingbot</u></a> also has a similar dual purpose, although its crawl volume is a fraction of Googlebot’s. Bingbot’s crawl activity trended generally upwards across the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14AYO1s8q9J0zN9gcTaz0h/d60ad6cdd7af04938d98eda081bea834/BLOG-3077_19_-_ai-botandcrawlertraffic.png" />
          </figure><p><sup><i>AI crawler traffic trends in 2025, worldwide</i></sup></p><p>OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/gptbot"><u>GPTBot</u></a> is used to crawl content that may be used in training OpenAI's generative AI foundation models. Its crawling activity was quite volatile across the year, reaching its highest levels in June, but it ended November slightly above the crawl levels seen at the beginning of the year. </p><p>Crawl volume for OpenAI’s <a href="https://radar.cloudflare.com/bots/directory/chatgpt-user"><u>ChatGPT-User</u></a>, which visits Web pages when users ask ChatGPT or a CustomGPT questions, saw sustained growth over the course of the year, with a weekly usage pattern becoming more evident starting in mid-February, suggesting increasing usage at schools and in the workplace. Peak request volumes were as much as 16x higher than at the beginning of the year. A drop in activity was also evident in the June to August timeframe, when many students were out of school and many professionals took vacation time. </p><p><a href="https://radar.cloudflare.com/bots/directory/oai-searchbot"><u>OAI-SearchBot</u></a>, which is used to link to and surface websites in search results in ChatGPT's search features, saw crawling activity grow gradually through August, then several traffic spikes in August and September, before starting to grow more aggressively heading into October, with peak request volume during a late October spike approximately 5x higher than the beginning of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Y39lUtvOLcaxwSwop4Egs/b9790ef1314a35ff811e4ed09d875271/BLOG-3077_20_-_image59.png" />
          </figure><p><sup><i>OpenAI crawler traffic trends in 2025, worldwide</i></sup></p><p>Crawling by Anthropic’s ClaudeBot effectively doubled through the first half of the year, but gradually declined during the second half, returning to a level approximately 10% higher than the start of the year. Perplexity’s PerplexityBot crawling traffic grew slowly through January and February, but saw a big jump in activity from mid-March into April. After that, growth was more gradual through October, before seeing a significant increase again in November, winding up about 3.5x higher than where it started the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PgjYaCVUzZgmt23SdKj6q/142ebab34ffbea6dd6770bcebdf2f1d2/BLOG-3077_21_-_image42.png" />
          </figure><p><sup><i>ClaudeBot traffic trends in 2025, worldwide</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hkDU4jX6T7GibKUxDqycO/c0eab7d698916d05ef7314973974ef5d/BLOG-3077_22_-_.png" />
          </figure><p><sup><i>PerplexityBot traffic trends in 2025, worldwide</i></sup></p><p>ByteDance’s Bytespider, one of 2024’s top AI crawlers, saw crawling volume below several other training bots, and its activity dropped across the year, continuing the decline observed last year.</p>
    <div>
      <h3>AI “user action” crawling increased by over 15x in 2025</h3>
      <a href="#ai-user-action-crawling-increased-by-over-15x-in-2025">
        
      </a>
    </div>
    <p>Most AI bot crawling is done for one of three <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-crawler-traffic-by-purpose"><u>purposes</u></a>: training, which gathers Web site content for AI model training; search, which indexes Web site content for search functionality available on AI platforms; and user action, which visits Web sites in response to user questions posed to a chatbot. Note that search crawling may also include crawling for <a href="https://developers.cloudflare.com/ai-search/concepts/what-is-rag/"><u>Retrieval-Augmented Generation (RAG)</u></a>, which enables a content owner to bring their own data into LLM generation without retraining or fine-tuning a model. (A fourth “undeclared” purpose captures traffic from AI bots whose crawling purpose is unclear or unknown.)</p><p>Crawling for model training is responsible for the overwhelming majority of AI crawler traffic, reaching as much as 7-8x search crawling and 32x user action crawling at peak. The training traffic figure is heavily influenced by OpenAI’s GPTBot, and as such, it followed a very similar pattern through the year.</p><p>Crawling for search was strongest through mid-March, when it dropped by approximately 40%. It returned to more gradual growth after that, though it ended the surveyed time period just under 10% lower than the start of the year.</p><p>User action crawling started 2025 with the lowest crawl volume of the three defined purposes, but more than doubled through January and February. It again doubled in early March, and from there, it continued to grow throughout the year, up over 21x from January through early December. This growth maps very closely to the traffic trends seen for OpenAI’s ChatGPT-User bot.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Cs9yjb8rpfwiOgfGmYGxx/7e11b9014a69b84af3b7b25cde4e73ac/BLOG-3077_23_-_ai-crawlpurpose-useraction.png" />
          </figure><p><sup><i>User action crawler traffic trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>While other AI bots accounted for 4.2% of HTML request traffic, Googlebot alone accounted for 4.5%</h3>
      <a href="#while-other-ai-bots-accounted-for-4-2-of-html-request-traffic-googlebot-alone-accounted-for-4-5">
        
      </a>
    </div>
    <p>AI bots have frequently been in the news during 2025 as content owners raise concerns about the amount of traffic that they are generating, especially as much of it <a href="https://blog.cloudflare.com/content-independence-day-no-ai-crawl-without-compensation/"><u>does not translate into</u></a> end users being referred back to the source Web sites. To better understand the impact of AI bot crawling activity, as compared to non-AI bots and human Web usage, we analyzed request traffic for HTML content across Cloudflare’s customer base and <a href="https://radar.cloudflare.com/year-in-review/2025/#ai-traffic-share"><u>classified it</u></a> as coming from a human, an AI bot, or another “non-AI” type of bot. (Note that because we are focusing on just HTML content here, the bot and human shares of traffic will differ from that shown on Radar, which analyzes request traffic for all content types.) Because Googlebot crawls so actively, and is dual-purpose, we have broken its share out separately in this analysis.</p><p>Throughout 2025, we found that traffic from AI bots accounted for an average of 4.2% of HTML requests. The share varied widely throughout the year, dropping as low as 2.4% in early April, and reaching as high as 6.4% in late June.</p><p>To that end, non-AI bots started 2025 responsible for half of requests to HTML pages, seven percentage points above human-generated traffic. This gap grew as wide as 25 percentage points during the first few days of June. However, these traffic shares began to draw closer together starting in mid June, and starting on September 11, entered a period where the human generated share of HTML traffic sometimes exceeded that of non-AI bots. As of December 2, human traffic generated 47% of HTML requests, and non-AI bots generated 44%.</p><p>Googlebot is a particularly voracious crawler, and this year it originated 4.5% of HTML requests, a share slightly larger than AI bots in aggregate. Starting the year at just under 2.5%, its share ramped quickly over the next four months, peaking at 11% in late April. It subsequently fell back towards its starting point over the next several months, and then grew again during the second half of the year, ending with a 5% share. This share shift largely mirrors Googlebot’s crawling activity as discussed above.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69Kmxq3C29UO0AM7yWOJmY/411e1fe6e4799ae08cfdfec8783a8a71/BLOG-3077_24_-_ai-aibottrafficshare.png" />
          </figure><p><sup><i>HTML traffic shares by bot type in 2025, worldwide</i></sup></p>
    <div>
      <h3>Anthropic had the highest crawl-to-refer ratio among the leading AI and search platforms</h3>
      <a href="#anthropic-had-the-highest-crawl-to-refer-ratio-among-the-leading-ai-and-search-platforms">
        
      </a>
    </div>
    <p>We <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/"><u>launched the crawl-to-refer ratio metric on Radar</u></a> on July 1 to track how often a given AI or search platform sends traffic to a site relative to how often it crawls that site. A high ratio means a whole lot of AI crawling without sending actual humans to a Web site.</p><p>It can be a volatile metric, with the values shifting day-by-day as crawl activity and referral traffic change. This <a href="https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/#how-does-this-measurement-work"><u>metric compares</u></a> total number of requests from relevant user agents associated with a given search or AI platform where the response was of Content-type: text/html by the total number of requests for HTML content where the Referer header contained a hostname associated with a given search or AI platform. </p><p>Anthropic had the highest <a href="https://radar.cloudflare.com/year-in-review/2025/#crawl-refer-ratio"><u>crawl-to-refer ratios this year</u></a>, reaching as much as 500,000:1, although they were quite erratic from January through May. Both the magnitude and erratic nature of the metric was likely due to sparse referral traffic over that time period. After that, the ratios became more consistent, but remained higher than others, ranging from ~25,000:1 to ~100,000:1.</p><p>OpenAI’s ratios over time were quite spiky, and reached as much as 3,700:1 in March. These shifts may be due to the stabilization of GPTBot crawling activity, coupled with increased usage of ChatGPT search functionality, which includes links back to source Web sites within its responses. Users following those links would increase Referer counts, potentially lowering the ratio. (Assuming that crawl traffic wasn’t increasing at a similar or greater rate.)</p><p>Perplexity had the lowest crawl-to-refer ratios of the major AI platforms, starting the year below 100:1 before spiking in late March above 700:1, concurrent with a spike of crawl traffic seen from PerplexityBot.  Settling back down after the spike, peak ratio values generally remained below 400:1, and below 200:1 from September onwards.</p><p>Among search platforms, Microsoft’s ratio unexpectedly exhibited a cyclical weekly pattern, reaching its lowest levels on Thursdays, and peaking on Sundays. Peak ratio values were generally in the 50:1 to 70:1 range across the year. Starting the year just over 3:1, Google’s crawl-to-refer ratio increased steadily through April, reaching as high as 30:1. After peaking, it fell somewhat erratically through mid-July, dropping back to 3:1, although it has been slowly increasing through the latter half of 2025. DuckDuckGo’s ratio remained below 1:1 for the first three calendar quarters of 2025, but experienced a sudden jump to 1.5:1 in mid-October and stayed elevated for the remainder of the period.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Z0LM4kJGevPxirhokT85o/401363b41b9f5987fe06976197967d9a/BLOG-3077_25_-_ai-crawltoreferratios.png" />
          </figure><p><sup><i>AI &amp; search platform crawl-to-refer ratios in 2025, worldwide</i></sup></p>
    <div>
      <h3>AI crawlers were the most frequently fully disallowed user agents found in robots.txt files</h3>
      <a href="#ai-crawlers-were-the-most-frequently-fully-disallowed-user-agents-found-in-robots-txt-files">
        
      </a>
    </div>
    <p>The robots.txt file, formally defined in <a href="https://www.rfc-editor.org/rfc/rfc9309.html"><u>RFC 9309</u></a> as the Robots Exclusion Protocol, is a text file that content owners can use to signal to Web crawlers which parts of a Web site the crawlers are allowed to access, using directives to explicitly allow or disallow search and AI crawlers from their whole site, or just parts of it. The directives within the file are effectively a “keep out” sign and don’t provide any formal access control. Having said that, Cloudflare’s <a href="https://blog.cloudflare.com/control-content-use-for-ai-training/#putting-up-a-guardrail-with-cloudflares-managed-robots-txt"><u>managed robots.txt</u></a> feature automatically updates a site’s existing robots.txt or creates a robots.txt file on the site that includes directives asking popular AI bot operators to not use the content for AI model training. In addition, our <a href="https://blog.cloudflare.com/ai-audit-enforcing-robots-txt/"><u>AI Crawl Control</u></a> capabilities can track violations of a site’s robots.txt directives, and give the site owner the ability to block requests from the offending user agent.</p><p>On Cloudflare Radar, we provide <a href="https://radar.cloudflare.com/ai-insights#ai-user-agents-found-in-robotstxt"><u>insight</u></a> into the number of robots.txt files found among our top 10,000 <a href="https://radar.cloudflare.com/domains"><u>domains</u></a> and the full/partial disposition of the allow and disallow directives found within the files for selected crawler user agents. (In this context, “full” refers to directives that apply to the whole site, and “partial” refers to directives that apply to specified paths or file types.) <a href="https://radar.cloudflare.com/year-in-review/2025/#robots-txt"><u>Within the Year in Review microsite</u></a>, we show how the disposition of these directives changed over the course of 2025.</p><p>The user agents with the highest number of fully disallowed directives are those associated with <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">AI crawlers</a>, including GPTBot, ClaudeBot, and <a href="https://www.theatlantic.com/technology/2025/11/common-crawl-ai-training-data/684567/"><u>CCBot</u></a>. The directives for Googlebot and Bingbot crawlers, used for both search indexing and AI training, leaned heavily towards partial disallow, likely focused on cordoning off login endpoints and other non-content areas of a site. For these two bots, directives applying to the whole site remained a small fraction of the total number of disallow directives observed through the year. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hCZ4jExApvVaK2CrEulZO/5eb528b8851868d0c90b56e638ffae86/BLOG-3077_26_-_ai-robotstxt-disallow.png" />
          </figure><p><sup><i>Robots.txt disallow directives by user agent</i></sup></p><p>The number of explicit allow directives found across the discovered robots.txt files was a fraction of the observed disallow directives, likely because allow is the default policy, absent any specific directive. Googlebot had the largest number of explicit allow directives, although over half of them were partial allows. Allow directives targeting AI crawlers were found across fewer domains, with directives targeting OpenAI’s crawlers leaning more towards explicit full allows. </p><p><a href="https://developers.google.com/crawling/docs/crawlers-fetchers/google-common-crawlers#google-extended"><u>Google-Extended</u></a> is a user agent token that web publishers can use to manage whether content that Google crawls from their sites may be used for training <a href="https://deepmind.google/models/gemini/"><u>Gemini models</u></a> or providing site content from the Google Search index to Gemini, and the number of allow directives targeting it tripled during the year — most partially allowed access at the start of the year, while the end of the year saw a larger number of directives that explicitly allowed full site access than those that allowed access to just some of the site’s content. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hCZ4jExApvVaK2CrEulZO/5eb528b8851868d0c90b56e638ffae86/BLOG-3077_26_-_ai-robotstxt-disallow.png" />
          </figure><p><sup><i>Robots.txt allow directives by user agent</i></sup></p>
    <div>
      <h3>On Workers AI, Meta’s llama-3-8b-instruct model was the most popular model, and text generation was the most popular task type</h3>
      <a href="#on-workers-ai-metas-llama-3-8b-instruct-model-was-the-most-popular-model-and-text-generation-was-the-most-popular-task-type">
        
      </a>
    </div>
    <p>The AI model landscape is rapidly evolving, with providers regularly releasing more powerful models, capable of tasks like text and image generation, speech recognition, and image classification. Cloudflare collaborates with AI model providers to ensure that <a href="https://developers.cloudflare.com/workers-ai/models/"><u>Workers AI supports these models</u></a> as soon as possible following their release, and we <a href="https://blog.cloudflare.com/replicate-joins-cloudflare/"><u>recently acquired Replicate</u></a> to greatly expand our catalog of supported models. In <a href="https://blog.cloudflare.com/expanded-ai-insights-on-cloudflare-radar/#popularity-of-models-and-tasks-on-workers-ai"><u>February 2025</u></a>, we introduced visibility on Radar into the popularity of publicly available supported <a href="https://radar.cloudflare.com/ai-insights/#workers-ai-model-popularity"><u>models</u></a> as well as the types of <a href="https://radar.cloudflare.com/ai-insights/#workers-ai-task-popularity"><u>tasks</u></a> that these models perform, based on customer account share. </p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#workers-ai-model-and-task-popularity"><u>Throughout the year</u></a>, Meta’s <a href="https://developers.cloudflare.com/workers-ai/models/llama-3-8b-instruct/"><u>llama-3-8b-instruct</u></a> model was dominant, with an account share (36.3%) more than three times larger than the next most popular models, OpenAI’s <a href="https://developers.cloudflare.com/workers-ai/models/whisper/"><u>whisper</u></a> (10.1%) and Stability AI’s <a href="https://developers.cloudflare.com/workers-ai/models/stable-diffusion-xl-base-1.0/"><u>stable-diffusion-xl-base-1.0</u></a> (9.8%). Both Meta and BAAI (Beijing Academy of Artificial Intelligence) had multiple models among the top 10, and the top 10 models had an account share of 89%, with the balance spread across a long tail of other models.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1a3GPm3cqrr0KcK6nCeLRZ/fd5ba576f02518c50fd6efbe312cacae/BLOG-3077_28_-_ai-workersaimostpopularmodels.png" />
          </figure><p><sup><i>Most popular models on Workers AI in 2025, worldwide</i></sup></p><p>Task popularity was driven in large part by the top models, with text generation, text-to-image, and automatic speech recognition topping the list. Text generation was used by 48.2% of Workers AI customer accounts, nearly four times more than the text-to-image share of 12.3% and automatic speech recognition’s 11.0% share. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JxZW6bB7q0kxnzPrh454m/b057fd945ce521aceaf0e8cd27b14f3d/BLOG-3077_29_-_ai-workersaimostpopulartasks.png" />
          </figure><p><sup><i>Most popular tasks on Workers AI in 2025, worldwide</i></sup></p>
    <div>
      <h2>What’s being crawled</h2>
      <a href="#whats-being-crawled">
        
      </a>
    </div>
    <p>In addition to the year-to-date analysis presented above, below we present point-in-time analyses of what is being crawled. Note that these insights are not included in the Year in Review microsite.</p>
    <div>
      <h3>Crawling by geographic region</h3>
      <a href="#crawling-by-geographic-region">
        
      </a>
    </div>
    <p>Within the AI section of Year in Review, we are looking at traffic from AI bots and crawlers globally, without regard for the geography associated with the account that owns the content being crawled. If we drill down a level geographically, using data from October 2025, and look at which bots generate the most crawling traffic for sites owned by customers with a billing address in a given geographic region, we find that Googlebot accounts for between 35% and 55% of crawler traffic in each region.</p><p>OpenAI’s GPTBot or Microsoft’s Bingbot are second most active, with crawling shares of 13-14%. In the developed economies across North America, Europe, and Oceania, Bingbot maintains a solid lead over AI crawlers. But for sites based in fast-growing markets across South America and Asia, GPTBot holds a slimmer lead over Bingbot.</p><table><tr><th><p><b>Geographic region</b></p></th><th><p><b>Top crawlers</b></p></th></tr><tr><td><p>North America</p></td><td><p>Googlebot (45.5%)
Bingbot (14.0%)</p><p>Meta-ExternalAgent (7.7%)</p></td></tr><tr><td><p>South America</p></td><td><p>Googlebot (44.2%)
GPTBot (13.8%)
Bingbot (13.5%)</p></td></tr><tr><td><p>Europe</p></td><td><p>Googlebot (48.6%)
Bingbot (13.2%)
GPTBot (10.8%)</p></td></tr><tr><td><p>Asia</p></td><td><p>Googlebot (39.0%)
GPTBot (14.0%)
Bingbot (12.6%)</p></td></tr><tr><td><p>Africa</p></td><td><p>Googlebot (35.8%)
Bingbot (13.7%)
GPTBot (13.1%)</p></td></tr><tr><td><p>Oceania</p></td><td><p>Googlebot (54.2%)
Bingbot (13.8%)
GPTBot (6.6%)</p></td></tr></table>
    <div>
      <h3>Crawling by industry</h3>
      <a href="#crawling-by-industry">
        
      </a>
    </div>
    <p>In analyzing AI crawler activity by customer industry during October 2025, we found that Retail and Computer Software consistently attracted the most AI crawler traffic, together representing just over 40% of all activity.</p><p>Others in the top 10 accounted for much smaller shares of crawling activity. These top 10 industries accounted for just under 70% of crawling, with the balance spread across a long tail of other industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N55U6SrN7zKkCp66hmhFz/304b038e492e4eda249f3b1fdb664b4a/BLOG-3077_30_-_AI-crawlbyindustry.png" />
          </figure><p><sup><i>Industry share of AI crawling activity, October 2025</i></sup></p>
    <div>
      <h2>Adoption &amp; usage</h2>
      <a href="#adoption-usage">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73LdMVjBBlMOnQGi8LF4oy/f659eaf5d95219e5b54d62b9e16db809/BLOG-3077_31_-_image35.png" />
          </figure>
    <div>
      <h3>iOS devices generated 35% of mobile device traffic globally – and more than half of device traffic in many countries</h3>
      <a href="#ios-devices-generated-35-of-mobile-device-traffic-globally-and-more-than-half-of-device-traffic-in-many-countries">
        
      </a>
    </div>
    <p>The two leading mobile device operating systems globally are <a href="https://en.wikipedia.org/wiki/IOS"><u>Apple’s iOS</u></a> and <a href="https://en.wikipedia.org/wiki/Android_(operating_system)"><u>Google’s Android</u></a>. By analyzing information in the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> header included with each Web request, we can calculate the distribution of traffic by client operating system throughout the year. Android devices generate the majority of mobile device traffic globally, due to the wide distribution of price points, form factors, and capabilities of such devices.</p><p>Globally, the <a href="https://radar.cloudflare.com/year-in-review/2025/#ios-vs-android"><u>share of traffic from iOS</u></a> grew slightly <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>year-over-year</u></a>, up two percentage points to 35% in 2025. Looking at the top countries for iOS traffic share, <a href="https://radar.cloudflare.com/year-in-review/2025/mc#ios-vs-android"><u>Monaco</u></a> had the highest share, at 70%, and iOS drove 50% or more of mobile device traffic in a total of 30 countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2025/dk#ios-vs-android"><u>Denmark</u></a> (65%), <a href="https://radar.cloudflare.com/year-in-review/2025/jp#ios-vs-android"><u>Japan</u></a> (57%), and <a href="https://radar.cloudflare.com/year-in-review/2025/pr#ios-vs-android"><u>Puerto Rico</u></a> (52%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/btCnb93d23FUPVfkupEGb/79574bfd6f045f88d6331caf488f37a5/BLOG-3077_32_-_adoption-iosvsandroid.png" />
          </figure><p><sup><i>Distribution of mobile device traffic by operating system in 2025, worldwide</i></sup></p><p>For countries/regions with higher Android usage, the shares were significantly larger. Twenty-seven had Android adoption above 90% in 2025, with <a href="https://radar.cloudflare.com/year-in-review/2025/pg#ios-vs-android"><u>Papua New Guinea</u></a> the highest at 97%. <a href="https://radar.cloudflare.com/year-in-review/2025/sd#ios-vs-android"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mw#ios-vs-android"><u>Malawi</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/bd#ios-vs-android"><u>Bangladesh</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/et#ios-vs-android"><u>Ethiopia</u></a> also registered an Android share of 95% or more. Android was responsible for 50% or more of mobile device traffic in 175 countries/regions, with the <a href="https://radar.cloudflare.com/year-in-review/2025/bs#ios-vs-android"><u>Bahamas</u></a>’ 51% share placing it at the bottom of that list. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SAm11BSUjgT2uBOfMT4dU/67d85c4786bb8bfe924f92f28956e5b6/BLOG-3077_33_-_adoption-iosvsandroid-map.png" />
          </figure><p><sup><i>Distribution of iOS and Android usage in 2025</i></sup></p>
    <div>
      <h3>The shares of global Web requests using HTTP/3 and HTTP/2 both increased slightly in 2025</h3>
      <a href="#the-shares-of-global-web-requests-using-http-3-and-http-2-both-increased-slightly-in-2025">
        
      </a>
    </div>
    <p>HTTP (HyperText Transfer Protocol) is the protocol that makes the Web work. Over the last 30+ years, it has gone through several major revisions. The first standardized version, <a href="https://datatracker.ietf.org/doc/html/rfc1945"><u>HTTP/1.0</u></a>, was adopted in 1996, <a href="https://www.rfc-editor.org/rfc/rfc2616.html"><u>HTTP/1.1</u></a> in 1999, and <a href="https://www.rfc-editor.org/rfc/rfc7540.html"><u>HTTP/2</u></a> in 2015. <a href="https://www.rfc-editor.org/rfc/rfc9114.html"><u>HTTP/3</u></a>, standardized in 2022, marked a significant update, running on top of a new transport protocol known as <a href="https://blog.cloudflare.com/the-road-to-quic/"><u>QUIC</u></a>. Using QUIC as its underlying transport allows <a href="https://www.cloudflare.com/learning/performance/what-is-http3/"><u>HTTP/3</u></a> to establish connections more quickly, as well as deliver improved performance by mitigating the effects of packet loss and network changes. Because it also provides encryption by default, using HTTP/3 mitigates the risk of attacks. </p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#http-versions"><u>Globally in 2025</u></a>, 50% of requests to Cloudflare were made over HTTP/2, HTTP/1.x accounted for 29%, and the remaining 21% were made via HTTP/3. These shares are largely unchanged <a href="https://radar.cloudflare.com/year-in-review/2024#http-versions"><u>from 2024</u></a> — HTTP/2 and HTTP/3 gained just fractions of a percentage point this year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GdxQoS6Zgx6IPgHapkS8N/07d2d023e2e91f58793e7b4359faa263/BLOG-3077_34_-_adoption-httpversions.png" />
          </figure><p><sup><i>Distribution of traffic by HTTP version in 2025, worldwide</i></sup></p><p>Geographically, usage of HTTP/3 appears to be both increasing and spreading. Last year, we noted that we had found eight countries/regions sending more than a third of their requests over HTTP/3. In 2025, 15 countries/regions sent more than a third of requests over HTTP/3, with Georgia’s 38% adoption just exceeding 2024’s top adoption rate of 37% in Réunion. (Looking at <a href="https://radar.cloudflare.com/adoption-and-usage/ge?dateStart=2025-01-01&amp;dateEnd=2025-12-02"><u>historical data</u></a>, Georgia <a href="https://radar.cloudflare.com/adoption-and-usage/ge?dateStart=2025-01-01&amp;dateEnd=2025-01-07"><u>started the year</u></a> around 46% HTTP/3 adoption, but dropped through the first half of the year before leveling off.) Armenia had the largest increase in HTTP/3 adoption year-over-year, jumping from 25% to 37%. </p><p>Seven countries/regions saw overall HTTP/3 usage levels below 10% due to high levels of bot-originated HTTP/1.x traffic. These include Hong Kong, Dominica, Singapore, Ireland, Iran, Seychelles, and Gibraltar. </p>
    <div>
      <h3>JavaScript-based libraries and frameworks remained integral tools for building Web sites</h3>
      <a href="#javascript-based-libraries-and-frameworks-remained-integral-tools-for-building-web-sites">
        
      </a>
    </div>
    <p>To deliver a modern Web site, developers must capably integrate a growing collection of libraries and frameworks with third-party tools and platforms. All of these components must work together to ensure a performant, feature-rich, problem-free user experience. As in past years, we used <a href="https://radar.cloudflare.com/scan"><u>Cloudflare Radar’s URL Scanner</u></a> to scan Web sites associated with the <a href="https://radar.cloudflare.com/domains"><u>top 5,000 domains</u></a> to identify the <a href="https://radar.cloudflare.com/year-in-review/2025/#website-technologies"><u>most popular technologies and services</u></a> used across eleven categories. </p><p><a href="https://jquery.com/"><u>jQuery</u></a> is self-described as a fast, small, and feature-rich JavaScript library, and our scan found it on 8x as many sites as <a href="https://kenwheeler.github.io/slick/"><u>Slick</u></a>, a JavaScript library used to display image carousels. <a href="https://react.dev/"><u>React</u></a> remained the top JavaScript framework used for building Web interfaces, found on twice as many scanned sites as <a href="https://vuejs.org/"><u>Vue.js</u></a>. PHP, node.js, and Java remained the most popular programming languages/technologies, holding a commanding lead over other languages, including Ruby, Python, Perl, and C.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QBZ6xnDPw9i3y7EBhTqsd/f232925caf1cf3caa91e80a4e16d5ba8/BLOG-3077_35_-_adoption-websitetechnologies.png" />
          </figure><p><sup><i>Top Web site technologies, JavaScript libraries category in 2025</i></sup></p><p><a href="https://wordpress.org/"><u>WordPress</u></a> remained the most popular content management system (CMS), though its share of scanned sites dropped to 47%, with the difference distributed across gains seen by multiple challengers. <a href="https://www.hubspot.com/"><u>HubSpot</u></a> and <a href="https://business.adobe.com/products/marketo.html"><u>Marketo</u></a> remained the top marketing automation platforms, with a combined share 10% higher YoY. Among A/B testing tools, <a href="https://vwo.com/"><u>VWO</u></a>’s share grew by eight percentage points year-over-year, extending its lead over <a href="https://www.optimizely.com/"><u>Optimizely</u></a>, while <a href="https://support.google.com/analytics/answer/12979939?hl=en"><u>Google Optimize</u></a>, which was sunsetted in September 2023, saw its share fall from 14% to 4%.</p>
    <div>
      <h3>One-fifth of automated API requests were made by Go-based clients</h3>
      <a href="#one-fifth-of-automated-api-requests-were-made-by-go-based-clients">
        
      </a>
    </div>
    <p>Application programming interfaces (APIs) are the foundation of modern dynamic Web sites and both Web-based and native applications. These sites and applications rely heavily on automated API calls to provide customized information. Analyzing the Web traffic protected and delivered by Cloudflare, we can identify requests being made to API endpoints. By applying heuristics to these API-related requests determined to not be coming from a person using a browser or native mobile application, we can identify the <a href="https://radar.cloudflare.com/year-in-review/2025/#api-client-language-popularity"><u>top languages used to build API clients</u></a>.</p><p>In 2025, 20% of automated API requests were made by Go-based clients, representing significant growth from Go’s 12% share in 2024. Python’s share also increased year-over-year, growing from 9.6% to 17%. Java jumped to third place, reaching an 11.2% share, up from 7.4% in 2024. <a href="http://node.js"><u>Node.js</u></a>, last year’s second-most popular language, saw its share fall to just 8.3% in 2025, pushing it down to fourth place, while .NET remained at the bottom of the top five, dropping to just 2.3%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tntP1mMqqsH5Bjj0r6xyc/0b03ad6b7257b7b935e102d78ec6bdb4/BLOG-3077_36_-_image56.png" />
          </figure><p><sup><i>Most popular automated API client languages in 2025</i></sup></p>
    <div>
      <h3>Google remains the top search engine, with Yandex, Bing, and DuckDuckGo distant followers</h3>
      <a href="#google-remains-the-top-search-engine-with-yandex-bing-and-duckduckgo-distant-followers">
        
      </a>
    </div>
    <p>Cloudflare is in a unique position to measure <a href="https://radar.cloudflare.com/year-in-review/2025/#search-engine-market-share"><u>search engine market share</u></a> because we protect websites and applications for millions of customers. To that end, since the fourth quarter of 2021, we have been publishing quarterly <a href="https://radar.cloudflare.com/reports"><u>reports</u></a> on this data. We use the HTTP <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer"><u>referer header</u></a> to identify the search engine sending traffic to customer sites and applications, and present the market share data as an overall aggregate, as well as broken out by device type and operating system. (Device type and operating system insights are based on the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> HTTP request headers.)</p><p>Globally, Google referred the most traffic to sites protected and delivered by Cloudflare, with a nearly 90% share in 2025. The other search engines in the top 5 include Bing (3.1%), Yandex (2.0%), Baidu (1.4%), and DuckDuckGo (1.2%). Looking at trends across the year, Yandex dropped from a 2.5% share in May to a 1.5% share in July, while Baidu grew from 0.9% in April to 1.6% in June.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7As9GnMsW9ru3h0RaH0zoX/55e396801f33af890b24aa871f989be5/BLOG-3077_37_-_adoption-searchenginemarketshare.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, worldwide</i></sup></p><p>Yandex users are primarily based in <a href="https://radar.cloudflare.com/year-in-review/2025/ru#search-engine-market-share"><u>Russia</u></a>, where the domestic platform holds a 65% market share, almost double that of Google at 34%. In the <a href="https://radar.cloudflare.com/year-in-review/2025/cz#search-engine-market-share"><u>Czech Republic</u></a>, users prefer Google (84%), but local search engine Seznam’s 7.7% share is a strong showing compared to the second place search engines in other countries. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fUk9r7hXP0SaMiFiFa3UK/ea4e213f4ac2fb55273e731eacdc10a4/BLOG-3077_38_-_adoption-searchenginemarketshare-czechrepublic.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, Czech Republic</i></sup></p><p>For traffic from “desktop” systems aggregated globally, Google’s market share drops to about 80%, while Bing’s jumps to nearly 11%. This is likely driven by the continued market dominance of Windows-based systems: On Windows, Google refers just 76% of traffic, while Bing refers about 14%. For traffic from mobile devices, Google holds almost 93% of market share, with the same share seen for traffic from both Android and iOS devices.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ATWm3D3Jp8v0Pob2qibkw/71869e620f0ec7fb42e636d8da6840d7/BLOG-3077_39_-_adoption-searchenginemarketshare-windows.png" />
          </figure><p><sup><i>Overall search engine market share in 2025, Windows-based systems</i></sup></p><p>For additional details, including search engines aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/search-engines"><u>Search Engine Referral Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h3>Chrome remains the top browser across platforms and operating systems – except on iOS, where Safari has the largest share</h3>
      <a href="#chrome-remains-the-top-browser-across-platforms-and-operating-systems-except-on-ios-where-safari-has-the-largest-share">
        
      </a>
    </div>
    <p>Cloudflare is also in a unique position to measure <a href="https://radar.cloudflare.com/year-in-review/2025/#browser-market-share"><u>browser market share</u></a>, and we have been publishing quarterly <a href="https://radar.cloudflare.com/reports"><u>reports</u></a> on the topic for several years. To identify the browser and associated operating system making content requests, we use information from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> HTTP headers. We present browser market share data as an overall aggregate, as well as broken out by device type and operating system. Note that the shares of browsers available on both desktop and mobile devices, such as Google Chrome or Apple Safari, are presented in aggregate.</p><p>Globally, two-thirds of request traffic to Cloudflare came from Chrome in 2025, similar to its share last year. Safari, available exclusively on Apple devices, was the second most-popular browser, with a 15.4% market share. They were followed by Microsoft Edge (7.4%), Mozilla Firefox (3.7%) and Samsung Internet (2.3%). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6NH8hVOr8lxytXTdrCARAk/ac7173e80db1b39da11c2564a3ae4980/BLOG-3077_40_-_adoption-browsermarketshare.png" />
          </figure><p><sup><i>Overall browser market share in 2025, worldwide</i></sup></p><p>In <a href="https://radar.cloudflare.com/year-in-review/2025/ru#browser-market-share"><u>Russia</u></a>, Chrome remains the most popular with a 44% share, but the domestic Yandex Browser comes in a strong second with a 33% market share, as compared to the sub-10% shares for Safari, Edge, and Opera. Interestingly, the Yandex Browser actually beat Chrome by a percentage point (39% to 38%) in June before giving up significant market share to Chrome as the year progressed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PGmYbREZR4xvALWdrRqzF/737b9550291d3d5cacfc85cbe72e3551/BLOG-3077_41_-_adoption-browsermarketshare-Russia.png" />
          </figure><p><sup><i>Overall browser market share in 2025, Russia</i></sup></p><p>As the default browser on iOS, Safari is far and away the most popular on such devices, with a 79% market share, four times Chrome’s 19% share. Less than 1% of requests come from DuckDuckGo, Firefox, and QQ Browser (developed in China by Tencent). In contrast, on Android, 85% of requests are from Chrome, while vendor-provided Samsung Internet is a distant second with a 6.6% share. Huawei Browser, another vendor-provided browser, is third at just 1%. And despite being the default browser on Windows, Edge’s 19% share pales in comparison to Chrome, which leads with a 69% share on that operating system.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zXj6HWrNSNdAWnDXIrLc5/79b47c9671a1c7691b1fde68749d5812/BLOG-3077_42_-_adoption-browsermarketshare-ios.png" />
          </figure><p><sup><i>Overall browser market share in 2025, iOS devices</i></sup></p><p>For additional details, including browsers aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/browser"><u>Browser Market Share Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h2>Connectivity</h2>
      <a href="#connectivity">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZkJ7IDSXBHzKnK9RSNHsY/f042e40576b2380a77282831fe194398/BLOG-3077_43_-_image13.png" />
          </figure>
    <div>
      <h3>Almost half of the 174 major Internet outages observed around the world in 2025 were due to government-directed regional and national shutdowns of Internet connectivity</h3>
      <a href="#almost-half-of-the-174-major-internet-outages-observed-around-the-world-in-2025-were-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity">
        
      </a>
    </div>
    <p>Internet outages continue to be an ever-present threat, and the potential impact of these outages continues to grow, as they can lead to economic losses, disrupted educational and government services, and limited communications. During 2025, we covered significant Internet disruptions and their associated causes in our quarterly summary posts (<a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/"><u>Q3</u></a>) as well standalone posts covering major outages in <a href="https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/"><u>Portugal &amp; Spain</u></a> and <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><u>Afghanistan</u></a>. The <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> tracks these Internet outages, and uses Cloudflare traffic data for insights into their scope and duration.</p><p>Nearly half of the <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-outages"><u>observed outages</u></a> this year were related to Internet shutdowns intended to prevent cheating on academic exams. Countries including <a href="https://x.com/CloudflareRadar/status/1930310203083210760"><u>Iraq</u></a>, <a href="https://x.com/CloudflareRadar/status/1952002641896288532"><u>Syria</u></a>, and <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#sudan"><u>Sudan</u></a> again implemented regular multi-hour shutdowns over the course of several weeks during exam periods. Other government-directed shutdowns in <a href="https://x.com/CloudflareRadar/status/1924531952993841639"><u>Libya</u></a> and <a href="https://x.com/CloudflareRadar/status/1983502557868666900"><u>Tanzania</u></a> were implemented in response to protests and civil unrest, while in <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><u>Afghanistan</u></a>, the Taliban ordered the shutdown of fiber optic Internet connectivity in multiple provinces as part of a drive to “prevent immorality.”</p><p>Cable cuts, affecting both submarine and domestic fiber optic infrastructure, were also a leading cause of Internet disruptions in 2025. These cuts resulted in network providers in countries/regions including the <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#texas-united-states"><u>United States</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#south-africa"><u>South Africa</u></a>, <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#digicel-haiti"><u>Haiti</u></a>, <a href="https://blog.cloudflare.com/q3-2025-internet-disruption-summary/#pakistan-united-arab-emirates"><u>Pakistan</u></a>, and <a href="https://x.com/CloudflareRadar/status/1910709632756019219"><u>Hong Kong</u></a> experiencing service disruptions lasting from several hours to several days. Other notable outages include one caused by a <a href="https://bsky.app/profile/radar.cloudflare.com/post/3ltf6jtxd5s2p"><u>fire</u></a> in a telecom building in Cairo, Egypt, which disrupted Internet connectivity across multiple service providers for several days, and another in <a href="https://x.com/CloudflareRadar/status/1983188999461319102"><u>Jamaica</u></a>, where damage caused by Hurricane Melissa resulted in lower Internet traffic from the island for over a week.</p><p>Within the <a href="https://radar.cloudflare.com/year-in-review/2025#internet-outages"><u>timeline</u></a> on the Year in Review microsite, hovering over a dot will display information about that outage, and clicking on it will link to additional insights.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gC9MsV4mObyNllxyQPzDy/cfe5dcee5e751e00309f7b4f6902a03e/BLOG-3077_44_-_connectivity-internetoutages.png" />
          </figure><p><sup><i>Over 170 major Internet outages were observed around the world during 2025</i></sup></p>
    <div>
      <h3>Globally, less than a third of dual-stack requests were made over IPv6, while in India, over two-thirds were</h3>
      <a href="#globally-less-than-a-third-of-dual-stack-requests-were-made-over-ipv6-while-in-india-over-two-thirds-were">
        
      </a>
    </div>
    <p>Available IPv4 address space has been largely exhausted <a href="https://ipv4.potaroo.net/"><u>for a decade or more</u></a>, though solutions like <a href="https://en.wikipedia.org/wiki/Network_address_translation"><u>Network Address Translation</u></a> have enabled network providers to stretch limited IPv4 resources. This has served in part to slow the adoption of <a href="https://www.rfc-editor.org/rfc/rfc1883"><u>IPv6</u></a>, designed in the mid-1990s as a successor protocol to IPv4, and offers an expanded address space intended to better support the expected growth in the number of Internet-connected devices.</p><p>For nearly 15 years, Cloudflare has been a vocal and active advocate for IPv6 as well, launching solutions including <a href="https://blog.cloudflare.com/introducing-cloudflares-automatic-ipv6-gatewa/"><u>Automatic IPv6 Gateway</u></a> in 2011, which enabled free IPv6 support for all of our customers and <a href="https://blog.cloudflare.com/i-joined-cloudflare-on-monday-along-with-5-000-others"><u>IPv6 support by default for all of our customers</u></a> in 2014. Simplistically, server-side support is only half of what is needed to drive IPv6 adoption, because end user connections need to support it as well. By aggregating and analyzing the IP version used for requests made to Cloudflare across the year, we can get insight into the distribution of traffic across IPv6 and IPv4.</p><p><a href="https://radar.cloudflare.com/year-in-review/2025/#ipv6-adoption"><u>Globally</u></a>, 29% of IPv6-capable (“<a href="https://www.techopedia.com/definition/19025/dual-stack-network"><u>dual-stack</u></a>”) requests for content were made over IPv6, up a percentage point from <a href="https://radar.cloudflare.com/year-in-review/2024#ipv6-adoption"><u>28% in 2024</u></a>. India again topped the list with an IPv6 adoption rate of 67%, followed by just three other countries/regions (<a href="https://radar.cloudflare.com/year-in-review/2025/my#ipv6-adoption"><u>Malaysia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/sa#ipv6-adoption"><u>Saudi Arabia</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/uy#ipv6-adoption"><u>Uruguay</u></a>) that also made more than half of such requests over IPv6, the same as last year. Some of the largest gains were seen in <a href="https://radar.cloudflare.com/year-in-review/2025/bz#ipv6-adoption"><u>Belize</u></a>, which grew from 4.3% to 24% year-over-year, and <a href="https://radar.cloudflare.com/year-in-review/2025/qa#ipv6-adoption"><u>Qatar</u></a>, which saw its adoption nearly double to 33% in 2025. Unfortunately, some countries/regions still lag the leaders, with 94 seeing adoption rates below 10%, including <a href="https://radar.cloudflare.com/year-in-review/2025/ru#ipv6-adoption"><u>Russia</u></a> (8.6%), <a href="https://radar.cloudflare.com/year-in-review/2025/ie#ipv6-adoption"><u>Ireland</u></a> (6.5%), and <a href="https://radar.cloudflare.com/year-in-review/2025/hk#ipv6-adoption"><u>Hong Kong</u></a> (3.0%). Even further behind are the 20 countries/regions with adoption rates below 1%, including <a href="https://radar.cloudflare.com/year-in-review/2025/tz#ipv6-adoption"><u>Tanzania</u></a> (0.9%), <a href="https://radar.cloudflare.com/year-in-review/2025/sy#ipv6-adoption"><u>Syria</u></a> (0.3%), and <a href="https://radar.cloudflare.com/year-in-review/2025/gi#ipv6-adoption"><u>Gibraltar</u></a> (0.1%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NkFC1eLbAPdpJv6WPkvHT/26a260f8068656f8ed4aa0a28009a5d9/BLOG-3077_45_-_connectivity-ipv6.png" />
          </figure><p><sup><i>Distribution of traffic by IP version in 2025, worldwide</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Mzu2k3Xs1YZVNhpZpx9xH/23d19f5057b52690e2def65bc2c9c64a/BLOG-3077_46_-_connectivity-ipv6-top5.png" />
          </figure><p><sup><i>Top five countries for IPv6 adoption in 2025</i></sup></p>
    <div>
      <h3>European countries had some of the highest download speeds, all above 200 Mbps. Spain remained consistently among the top locations across measured Internet quality metrics</h3>
      <a href="#european-countries-had-some-of-the-highest-download-speeds-all-above-200-mbps-spain-remained-consistently-among-the-top-locations-across-measured-internet-quality-metrics">
        
      </a>
    </div>
    <p>Over the past decade or so, we have turned to Internet speed tests for many purposes: keeping our service providers honest, troubleshooting a problematic connection, or showing off a particularly high download speed on social media. In fact, we’ve become conditioned to focus on download speeds as the primary measure of a connection’s quality. While it is absolutely an important metric, for increasingly popular use cases — like videoconferencing, live-streaming, and online gaming — strong upload speeds and low latency are also critical. However, even when Internet providers offer service tiers that include high symmetric speeds and lower latency, consumer adoption is often mixed due to cost, availability, or other issues.</p><p>Tests on <a href="https://speed.cloudflare.com/"><u>speed.cloudflare.com</u></a> measure both download and upload speeds, as well as loaded and unloaded latency. By aggregating the results of <a href="https://radar.cloudflare.com/year-in-review/2025/#internet-quality"><u>tests taken around the world during 2025</u></a>, we can get a country/region perspective on average values for these <a href="https://developers.cloudflare.com/radar/glossary/#connection-quality"><u>connection quality</u></a> metrics, as well as insight into the distribution of the measurements.</p><p>Europe was well-represented among those with the highest average download speeds in 2025. <a href="https://radar.cloudflare.com/year-in-review/2025/es#internet-quality"><u>Spain</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/hu#internet-quality"><u>Hungary</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/pt#internet-quality"><u>Portugal</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/dk#internet-quality"><u>Denmark</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ro#internet-quality"><u>Romania</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/fr#internet-quality"><u>France</u></a> were all in the top 10, with both Spain and Hungary averaging download speeds above 300 Mbps. Spain’s average grew by 25 Mbps from 2024, while Hungary’s jumped 46 Mbps. Meanwhile, Asian countries had many of the highest average upload speeds, with <a href="https://radar.cloudflare.com/year-in-review/2025/kr#internet-quality"><u>South Korea</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mo#internet-quality"><u>Macau</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/sg#internet-quality"><u>Singapore</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/jp#internet-quality"><u>Japan</u></a> reaching the top 10, all seeing averages in excess of 130 Mbps.</p><p>But it was Spain that topped the list for the upload metric as well at 206 Mbps, up 13 Mbps from 2024. The country’s strong showing across both speed metrics is potentially attributable to <a href="https://commission.europa.eu/projects/unico-broadband_en"><u>“UNICO-Broadband,”</u></a> a “<i>call for projects by telecommunications operators aiming at the deployment of high-speed broadband infrastructure capable of providing services at symmetric speeds of at least 300 Mbps, scalable at 1 Gbps,</i>” which aimed to cover 100 % of the population in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pZCAQEMEmbUjXkIUzAwUP/8aec93e96debe19d496396a6e6cd1db7/BLOG-3077_47_-_connectivity-downloadspeeds.png" />
          </figure><p><sup><i>Countries/regions with the highest download speeds in 2025, worldwide</i></sup></p><p>As noted above, low latency connections are needed to provide users with good <a href="https://www.screenbeam.com/wifihelp/wifibooster/how-to-reduce-latency-or-lag-in-gaming-2/#:~:text=Latency%20is%20measured%20in%20milliseconds,%2C%2020%2D40ms%20is%20optimal."><u>gaming</u></a> and <a href="https://www.haivision.com/glossary/video-latency/#:~:text=Low%20latency%20is%20typically%20defined,and%20streaming%20previously%20recorded%20events."><u>videoconferencing/streaming</u></a> experiences. The <a href="https://blog.cloudflare.com/introducing-radar-internet-quality-page/#connection-speed-quality-data-is-important"><u>latency metric</u></a> can be broken down into loaded and idle latency. The former measures latency on a loaded connection, where bandwidth is actively being consumed, while the latter measures latency on an “idle” connection, when there is no other network traffic present. (These definitions are from the speed test application’s perspective.) </p><p>In 2025, a number of European countries were among those with both the lowest idle and loaded latencies. For average idle latency, <a href="https://radar.cloudflare.com/year-in-review/2025/is#internet-quality"><u>Iceland</u></a> measured the lowest at 13 ms, just 2 ms better than <a href="https://radar.cloudflare.com/year-in-review/2025/md#internet-quality"><u>Moldova</u></a>. In addition to these two, <a href="https://radar.cloudflare.com/year-in-review/2025/pt#internet-quality"><u>Portugal</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/es#internet-quality"><u>Spain</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/hu#internet-quality"><u>Hungary</u></a> also ranked among the top 10, all with average idle latencies below 20 ms. Moldova topped the list of countries/regions with the lowest average loaded latency, at 73 ms. Hungary, Spain, <a href="https://radar.cloudflare.com/year-in-review/2025/be#internet-quality"><u>Belgium</u></a>, Portugal, <a href="https://radar.cloudflare.com/year-in-review/2025/sk#internet-quality"><u>Slovakia</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/si#internet-quality"><u>Slovenia</u></a> were also part of the top 10, all with average loaded latencies below 100 ms.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4yFdtVsghuBNrCe0sqdEuS/1ed59c6a972f2c511ed567ef69863f39/BLOG-3077_48_-_connectivity-latency-moldova.png" />
          </figure><p><sup><i>Measured idle/loaded latency, Moldova</i></sup></p>
    <div>
      <h3>London and Los Angeles were hotspots for Cloudflare speed test activity in 2025</h3>
      <a href="#london-and-los-angeles-were-hotspots-for-cloudflare-speed-test-activity-in-2025">
        
      </a>
    </div>
    <p>As we discussed above, the speed test at <a href="http://speed.cloudflare.com"><u>speed.cloudflare.com</u></a> measures a user’s connection speeds and latency. We reviewed the aggregate findings from those tests, highlighting the countries/regions with the best results. However, we also wondered about test activity around the world -– where are users most concerned about their connection quality, and how frequently do they perform tests? <a href="https://radar.cloudflare.com/year-in-review/2025/#speed-tests"><u>A new animated Year in Review visualization illustrates speed test activity</u></a>, aggregated weekly.</p><p>Data is aggregated at a regional level and the associated activity is plotted on the map, with circles sized based on the number of tests taken each week. Note that locations with fewer than 100 speed tests per week are not plotted. Looking at test volume across the year, the greater London and Los Angeles areas were most active, as were Tokyo and Hong Kong and several U.S. cities.</p><p>Animating the graph to see changes across the year, a number of week-over-week surges in test volume are visible. These include in the Nairobi, Kenya, area during the seven-day period ending June 10; in the Tehran, Iran, area the period ending July 29; across multiple areas in Russia the period ending August 5; and in the Karnataka, India, area the period ending October 28. It isn’t clear what drove these increases in test volume — the <a href="https://radar.cloudflare.com/outage-center?dateStart=2025-01-01&amp;dateEnd=2025-12-02"><u>Cloudflare Radar Outage Center</u></a> does not show any observed Internet outages impacting those areas around those times, so it is unlikely to be subscribers testing the restoration of connectivity.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73PtVEdvkENBbF5O8qD8ij/482d15f05359cbf6ae24fb606ed61793/BLOG-3077_49_-_connectivity-globalspeedtestactivity.png" />
          </figure><p><sup><i>Cloudflare speed test activity by location in 2025</i></sup></p>
    <div>
      <h3>More than half of request traffic comes from mobile devices in 117 countries/regions</h3>
      <a href="#more-than-half-of-request-traffic-comes-from-mobile-devices-in-117-countries-regions">
        
      </a>
    </div>
    <p>For better or worse, over the last quarter-century, mobile devices have become an indispensable part of everyday life. Adoption varies around the world — statistics from <a href="https://blogs.worldbank.org/en/voices/Mobile-phone-ownership-is-widespread-Why-is-digital-inclusion-still-lagging"><u>the World Bank</u></a> show multiple countries/regions with mobile phone ownership above 90%, while in several others, ownership rates are below 10%, as of October 2025. In some countries/regions, mobile devices primarily connect to the Internet via Wi-Fi, while other countries/regions are “mobile first,” where 4G/5G services are the primary means of Internet access.</p><p>Information contained within the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> header included with each request to Cloudflare enables us to categorize it as coming from a mobile, desktop, or other type of device. <a href="https://radar.cloudflare.com/year-in-review/2025/#mobile-vs-desktop"><u>Aggregating this categorization globally across 2025</u></a> found that 43% of requests were from mobile devices, up from <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>41% in 2024</u></a>. The balance came from “classic” laptop and desktop type devices. Similar to an observation <a href="https://blog.cloudflare.com/radar-2024-year-in-review/#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices"><u>made last year</u></a>, these traffic shares were in line with those measured in Year in Review reports dating back to 2022, suggesting that mobile device usage has achieved a “steady state.”</p><p>In 117 countries/regions, more than half of requests came from mobile devices, led by <a href="https://radar.cloudflare.com/year-in-review/2025/sd#mobile-vs-desktop"><u>Sudan</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/mw#mobile-vs-desktop"><u>Malawi</u></a> at 75% and 74% respectively. Five other African countries/regions — <a href="https://radar.cloudflare.com/year-in-review/2025/sz#mobile-vs-desktop"><u>Eswatini (Swaziland)</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/ye#mobile-vs-desktop"><u>Yemen</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/bw#mobile-vs-desktop"><u>Botswana</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2025/mz#mobile-vs-desktop"><u>Mozambique</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2025/so#mobile-vs-desktop"><u>Somalia</u></a> — also had mobile request shares above 70% in 2025, in line with <a href="https://voxdev.org/topic/understanding-mobile-phone-and-internet-use-across-world"><u>strong mobile phone ownership</u></a> in the region. Among countries/regions with low mobile device traffic share, <a href="https://radar.cloudflare.com/year-in-review/2025/gi#mobile-vs-desktop"><u>Gibraltar</u></a> was the only one below 10% (at 5.1%), with just six others originating less than a quarter of requests from mobile devices. This is fewer than in <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>2024</u></a>, when a dozen countries/regions had a mobile share below 25%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fcUaDzUxKouChLsJzfQf5/13e3eb93633c6d5ed017378022218505/BLOG-3077_50_-_connectivity-mobiledesktop.png" />
          </figure><p><sup><i>Distribution of traffic by device type in 2025, worldwide</i></sup></p><p><sup><i></i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6X1wD6uZUA4eB5vyf3vwl6/72a9445980b21e2917424eca151c77b4/BLOG-3077_51_-_connectivity-mobiledesktop-map.png" />
          </figure><p><sup><i>Global distribution of traffic by device type in 2025</i></sup></p>
    <div>
      <h2>Security</h2>
      <a href="#security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1X1yOLxEicpVw5U4ukcAQF/f7d0b02841a8220151a66cd6f0226302/BLOG-3077_52_-_image18.png" />
          </figure>
    <div>
      <h3>6% of global traffic over Cloudflare’s network was mitigated by our systems — either as potentially malicious or for customer-defined reasons</h3>
      <a href="#6-of-global-traffic-over-cloudflares-network-was-mitigated-by-our-systems-either-as-potentially-malicious-or-for-customer-defined-reasons">
        
      </a>
    </div>
    <p>Cloudflare automatically mitigates attack traffic targeting customer websites and applications using <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS</u></a> mitigation techniques or <a href="https://developers.cloudflare.com/waf/managed-rules/"><u>Web Application Firewall (WAF) Managed Rules</u></a>, protecting them from a variety of threats posed by malicious actors. We also enable customers to mitigate traffic, even if it isn’t malicious, using techniques like <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/"><u>rate-limiting</u></a> requests or <a href="https://developers.cloudflare.com/waf/tools/ip-access-rules/"><u>blocking all traffic from a given location</u></a>. The need to do so may be driven by regulatory or business requirements. We looked at the overall share of traffic to Cloudflare’s network throughout 2025 that was mitigated for any reason, as well as the share that was blocked as a DDoS attack or by WAF Managed Rules.</p><p>This year, <a href="https://radar.cloudflare.com/year-in-review/2025/#mitigated-traffic"><u>6.2% of global traffic was mitigated</u></a>, down a quarter of a percentage point <a href="https://radar.cloudflare.com/year-in-review/2024#mitigated-traffic"><u>from 2024</u></a>. 3.3% of traffic was mitigated as a DDoS attack, or by managed rules, up one-tenth of a percentage point year over year. General mitigations were applied to more than 10% of the traffic coming from over 30 countries/regions, while 14 countries/regions had DDoS/WAF mitigations applied to more than 10% of originated traffic. Both counts were down in comparison to 2024. </p><p>Equatorial Guinea had the largest shares of mitigated traffic with 40% generally mitigated and 29% with DDoS/WAF mitigations applied. These shares grew over the last year, from 26% (general) and 19% (DDoS/WAF). In contrast, Dominica had the smallest shares of mitigated traffic, with just 0.7% of traffic mitigated, with DDoS/WAF mitigations applied to just 0.1%.</p><p>The large increase in mitigated traffic seen during July in the graph below is due to a very large DDoS attack campaign that primarily targeted a single Cloudflare customer domain.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xzs0onu96x2qCwGRNHrPW/a730564c03b600f793ae92df8ad38ee8/BLOG-3077_53_-_security-mitigatedtraffic.png" />
          </figure><p><sup><i>Mitigated traffic trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>40% of global bot traffic came from the United States, with Amazon Web Services and Google Cloud originating a quarter of global bot traffic</h3>
      <a href="#40-of-global-bot-traffic-came-from-the-united-states-with-amazon-web-services-and-google-cloud-originating-a-quarter-of-global-bot-traffic">
        
      </a>
    </div>
    <p>A <a href="https://developers.cloudflare.com/bots/concepts/bot/"><u>bot</u></a> is a software application programmed to do certain tasks, and Cloudflare uses advanced <a href="https://blog.cloudflare.com/bots-heuristics/"><u>heuristics</u></a> to differentiate between bot traffic and human traffic, <a href="https://developers.cloudflare.com/bots/concepts/bot-score/"><u>scoring</u></a> each request on the likelihood that it originates from a bot or a human user. By monitoring traffic suspected to be from bots, site and application owners can spot and, if necessary, block potentially malicious activity. However, not all bots are malicious — bots can also be helpful, and Cloudflare maintains a <a href="https://radar.cloudflare.com/bots/directory?kind=all"><u>directory of verified bots</u></a> that includes those used for things like <a href="https://radar.cloudflare.com/bots/directory?category=SEARCH_ENGINE_CRAWLER&amp;kind=all"><u>search engine indexing</u></a>, <a href="https://radar.cloudflare.com/bots/directory?category=SECURITY&amp;kind=all"><u>security scanning</u></a>, and <a href="https://radar.cloudflare.com/bots/directory?category=MONITORING_AND_ANALYTICS&amp;kind=all"><u>site/application monitoring</u></a>. Regardless of intent, we analyzed <a href="https://radar.cloudflare.com/year-in-review/2025/#bot-traffic-sources"><u>where bot traffic was originating from in 2025</u></a>, using the IP address of a request to identify the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a>) and country/region associated with the bot making the request. </p><p>Globally, the top 10 countries/regions accounted for 71% of observed bot traffic. Forty percent originated from the United States, far ahead of Germany’s 6.5% share. The US share was up over five percentage points <a href="https://radar.cloudflare.com/year-in-review/2024#bot-traffic-sources"><u>from 2024</u></a>, while Germany’s share was down a fraction of a percentage point. The remaining countries in the top 10 all contributed bot traffic shares below 5% in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29tI5aXT8HeRwmzHMyFaTt/0081d745e48499966611a4d2f3a14f2e/BLOG-3077_54_-_security-bottraffic-countries.png" />
          </figure><p><sup><i>Global bot traffic distribution by source country/region in 2025</i></sup></p><p>Looking at bot traffic by network, we found that cloud platforms remained among the leading sources. This is due to a number of factors, including the ease of using automated tools to quickly provision compute resources, their relatively low cost, their broadly distributed geographic footprints, and the platforms’ high-bandwidth Internet connectivity. </p><p>Two autonomous systems associated with Amazon Web Services accounted for a total of 14.4% of observed bot traffic, and two associated with Google Cloud were responsible for a combined 9.7% of bot traffic. They were followed by Microsoft Azure, which originated 5.5% of bot traffic. The shares from all three platforms were up as compared to 2024. These cloud platforms have a strong regional data center presence in many of the countries/regions in the top 10. Elsewhere, around the world, local telecommunications providers frequently accounted for the largest shares of automated bot traffic observed in those countries/regions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NCt3TgkYWbl9cQmZH2QZW/3ed0e512bdff74025dd34744b989dc41/BLOG-3077_55_-_security-bottraffic-asns.png" />
          </figure><p><sup><i>Global bot traffic distribution by source network in 2025</i></sup></p>
    <div>
      <h3>Organizations in the "People and Society” vertical were the most targeted during 2025</h3>
      <a href="#organizations-in-the-people-and-society-vertical-were-the-most-targeted-during-2025">
        
      </a>
    </div>
    <p>Attackers are constantly shifting their tactics and targets, mixing things up in an attempt to evade detection, or based on the damage they intend to cause. They may try to cause financial harm to businesses by targeting ecommerce sites during a busy shopping period, make a political statement by attacking government-related or civil society sites, or attempt to knock opponents offline by attacking a game server. To identify vertical-targeted attack activity during 2025, we analyzed mitigated traffic for customers that had an associated industry and vertical within their customer record. Mitigated traffic was aggregated weekly by source country/region across 17 target verticals.</p><p>Organizations in the "People and Society” vertical were the <a href="https://radar.cloudflare.com/year-in-review/2025/#most-attacked-industries"><u>most targeted across the year</u></a>, with 4.4% of global mitigated traffic targeting the vertical. Customers classified as “People and Society” include religious institutions, nonprofit organizations, civic &amp; social organizations, and libraries. The vertical started out the year with under 2% of mitigated traffic, but saw the share jump to 10% the week of March 5, and increase to over 17% by the end of the month. Other attack surges targeting these sites occurred in late April (to 19.1%) and early July (to 23.2%). Many of these types of organizations are protected by Cloudflare’s Project Galileo, and <a href="https://blog.cloudflare.com/celebrating-11-years-of-project-galileo-global-impact/"><u>this blog post</u></a> details the attacks and threats they experienced in 2024 and 2025.</p><p>Gambling/Games, the <a href="https://radar.cloudflare.com/year-in-review/2024#most-attacked-industries"><u>most-targeted vertical last year</u></a>, saw its share of mitigated attacks drop by more than half year-over-year, to just 2.6%. While one might expect to see attacks targeting gambling sites peak around major sporting events like the Super Bowl and March Madness, such a trend was not evident, as attack share peaked at 6.5% the week of March 5 — a month after the Super Bowl, and a couple of weeks before the start of March Madness.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HqH4NQhC77KEgh1Z3tJDw/a9787f0913ad8160607a1cb21de6347a/BLOG-3077_56_-_security-mostattackedverticals.png" />
          </figure><p><sup><i>Global mitigated traffic share by vertical in 2025, summary view</i></sup></p>
    <div>
      <h3>Routing security, measured as the shares of RPKI valid routes and covered IP address space, saw continued improvement throughout 2025</h3>
      <a href="#routing-security-measured-as-the-shares-of-rpki-valid-routes-and-covered-ip-address-space-saw-continued-improvement-throughout-2025">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol (BGP)</u></a> is the Internet’s core routing protocol, enabling traffic to flow between source and destination by communicating routes between networks. However, because it relies on trust between connected networks, incorrect information shared between peers (intentionally or not) can send traffic to the wrong place — potentially to <a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/"><u>systems under control of an attacker</u></a>. To address this, <a href="https://blog.cloudflare.com/rpki/"><u>Resource Public Key Infrastructure (RPKI)</u></a> was developed as a cryptographic method of signing records that associate a BGP route announcement with the correct originating autonomous system (AS) number to ensure that the information being shared originally came from a network that is allowed to do so. Cloudflare has been a vocal advocate for routing security, including as a founding participant in the <a href="https://www.internetsociety.org/news/press-releases/2020/leading-cdn-and-cloud-providers-join-manrs-to-improve-routing-security/"><u>MANRS CDN and Cloud Programme</u></a> and by providing a <a href="https://isbgpsafeyet.com/"><u>public tool</u></a> that enables users to test whether their Internet provider has implemented BGP safely. </p><p>We analyzed data available on Cloudflare Radar’s <a href="https://radar.cloudflare.com/routing"><u>Routing page</u></a> to determine the share of <a href="https://rpki.readthedocs.io/en/latest/about/help.html"><u>RPKI valid routes</u></a> and how that share changed throughout 2025, as well as determining the <a href="https://radar.cloudflare.com/year-in-review/2025/#routing-security"><u>share of IP address space covered by valid routes</u></a>. The latter metric is noteworthy because a route announcement covering a large amount of IP address space (millions of IPv4 addresses) has a greater potential impact than an announcement covering a small block of IP address space (hundreds of IPv4 addresses).</p><p>We started 2025 with 50% valid IPv4 routes, growing to 53.9% by December 2. The share of valid IPv6 routes increased to 60.1%, up 4.7 percentage points. Looking at the global share of IP address space covered by valid routes, IPv4 increased to 48.5%, a three percentage point increase. The share of IPv6 address space covered by valid routes fell slightly to 61.6%. Although the year-over-year changes for these metrics are slowing, we have made significant progress over the last five years. Since the start of 2020, the share of RPKI valid IPv4 routes and IPv4 address space have both grown by approximately 3x.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EtRqY7MgRKLxjsLIlNuis/013b3bf92c6d3b173cd8086b1ff370c4/BLOG-3077_57_-_security-routingsecurity-routes.png" />
          </figure><p><sup><i>Shares of global RPKI valid routing entries by IP version in 2025</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JEv5ViM6qYdYxSzE6sbYD/4f89f5acbd2aeef55562fbee63dd2f07/BLOG-3077_58_-_security-routingsecurity-addressspace.png" />
          </figure><p><sup><i>Shares of globally announced IP address space covered by RPKI valid routes in 2025</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2025/bb#routing-security"><u>Barbados</u></a> saw the biggest growth in the share of valid IPv4 routes, growing from 2.2% to 20.8%. Looking at valid IPv6 routes, <a href="https://radar.cloudflare.com/year-in-review/2025/ml#routing-security"><u>Mali</u></a> saw the most significant share growth in 2025, from 10.0% to 58.3%. </p><p>Barbados also experienced the biggest increase in the share of IPv4 space covered by valid routes, jumping from just 2.0% to 18.6%. For IPv6 address space, both <a href="https://radar.cloudflare.com/year-in-review/2025/tj#routing-security"><u>Tajikistan</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2025/dm#routing-security"><u>Dominica</u></a> went from having effectively no space covered by valid routes at the start of the year, to 5.5% and 3.5% respectively. </p>
    <div>
      <h3>Hyper-volumetric DDoS attack sizes grew significantly throughout the year </h3>
      <a href="#hyper-volumetric-ddos-attack-sizes-grew-significantly-throughout-the-year">
        
      </a>
    </div>
    <p>In our quarterly DDoS Report series (<a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/ddos-threat-report-2025-q3/"><u>Q3</u></a>), we have highlighted the increasing frequency and size of hyper-volumetric network layer attacks targeting Cloudflare customers and Cloudflare’s infrastructure. We define a “hyper-volumetric network layer attack” as one that operates at Layer 3/4 and that peaks at more than one terabit per second (1 Tbps) or more than one billion packets per second (1 Bpps). These reports provide a quarterly perspective, but we also wanted to <a href="https://radar.cloudflare.com/year-in-review/2025/#ddos-attacks"><u>show a view of activity across the year</u></a> to understand when attackers are most active, and how attack sizes have grown over time. </p><p>Looking at hyper-volumetric attack activity in 2025 from a Tbps perspective, July saw the largest number of such attacks, at over 500, while February saw the fewest, at just over 150. Attack intensity remained generally below 5 Tbps, although a 10 Tbps attack blocked at the end of August was a harbinger of things to come. This attack was the first of a campaign of &gt;10 Tbps attacks that took place during the first week of September, ahead of a series of &gt;20 Tbps attacks during the last week of the month. In early October, multiple increasingly larger hyper-volumetric attacks were observed, with the largest for the month <a href="https://blog.cloudflare.com/ddos-threat-report-2025-q3/#aisuru-breaking-records-with-ultrasophisticated-hyper-volumetric-ddos-attacks"><u>peaking at 29.7 Tbps</u></a>. However, that record was soon eclipsed, as an early November attack reached 31.4 Tbps.</p><p>From a Bpps perspective, hyper-volumetric attack activity was much lower, with November experiencing the most (over 140), while just three were seen in February and June. Attack intensity across the year generally remained below 4 Bpps through late August, though a succession of increasingly larger attacks were seen over the next several months, peaking in October. Although the intensity of most of the 110+ attacks blocked in October was below 5 Bpps, a 14 Bpps attack seen during the month was the largest hyper-volumetric attack by packets per second blocked during the year, besting five other successive record-setting attacks that occurred in September.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q4Ruw6z07JUGXF6FsZMTv/414a388b7f10eff0940a460e1356e938/BLOG-3077_59_-_security-hypervolumetricddos.png" />
          </figure><p><sup><i>Peak DDoS attack sizes in 2025</i></sup></p>
    <div>
      <h2>Email security</h2>
      <a href="#email-security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mchtw8EWCzTpDs3K4jQ1A/3b740b7facca7869a4a191808e94ef45/BLOG-3077_60_-_image12.png" />
          </figure>
    <div>
      <h3>More than 5% of email messages analyzed by Cloudflare were found to be malicious</h3>
      <a href="#more-than-5-of-email-messages-analyzed-by-cloudflare-were-found-to-be-malicious">
        
      </a>
    </div>
    <p><a href="https://www.signite.io/emails-are-still-king"><u>Recent statistics</u></a> suggest that email remains the top communication channel for external business contact, despite the growing enterprise use of collaboration/messaging apps. Given its broad enterprise usage, attackers still find it to be an attractive entry point into corporate networks. Generative AI tools <a href="https://blog.cloudflare.com/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><u>make it easier</u></a> to craft highly targeted malicious emails that convincingly impersonate trusted brands or legitimate senders (like corporate executives) but contain deceptive links, dangerous attachments, or other types of threats. <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> protects customers from email-based attacks, including those carried out through targeted malicious email messages. </p><p>In 2025, an <a href="https://radar.cloudflare.com/year-in-review/2025/#malicious-emails"><u>average of 5.6% of emails analyzed by Cloudflare were found to be malicious</u></a>. The share of messages processed by Cloudflare Email Security that were found to be malicious generally ranged between 4% and 6% throughout most of the year. Our data shows a jump in malicious email share starting in October, likely due to an improved classification system implemented by Cloudflare Email Security.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/422qqM5R83j6IkdbWdasYR/696a68ded36a67dba1b73e045ab5bb28/BLOG-3077_61_-_emailsecurity-maliciousemailpercentage.png" />
          </figure><p><sup><i>Global malicious email share trends in 2025</i></sup></p>
    <div>
      <h3>Deceptive links, identity deception, and brand impersonation were the most common types of threats found in malicious email messages</h3>
      <a href="#deceptive-links-identity-deception-and-brand-impersonation-were-the-most-common-types-of-threats-found-in-malicious-email-messages">
        
      </a>
    </div>
    <p>Deceptive links were the <a href="https://radar.cloudflare.com/year-in-review/2025/#top-email-threats"><u>top malicious email threat category in 2025</u></a>, found in 52% of messages, up from <a href="https://radar.cloudflare.com/year-in-review/2024#top-email-threats"><u>43% in 2024</u></a>. Since the display text for a hyperlink in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually linking to a malicious resource that can be used to steal login credentials or download malware. The share of processed emails containing deceptive links was as high as 70% in late April, and again in mid-November.</p><p>Identity deception occurs when an attacker sends an email claiming to be someone else. They may do this using domains that look similar, are spoofed, or use display name tricks to appear to be coming from a trusted domain. Brand impersonation is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation may also use display name spoofing or domain impersonation. Identity deception (38%) and brand impersonation (32%) were growing threats in 2025, up from 35% and 23% respectively in 2024. Both saw an increase in mid-November.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sq7v5IqOTPZZ5DwCnr8Mv/762e5bd4dda4c34475ffb5507898a08a/BLOG-3077_62_-_emailsecurity-maliciousemail-threatcategory.png" />
          </figure><p><sup><i>Email threat category trends in 2025, worldwide</i></sup></p>
    <div>
      <h3>Nearly all of the email messages from the .christmas and .lol Top Level Domains were found to be either spam or malicious</h3>
      <a href="#nearly-all-of-the-email-messages-from-the-christmas-and-lol-top-level-domains-were-found-to-be-either-spam-or-malicious">
        
      </a>
    </div>
    <p>In addition to providing traffic, geographic distribution, and digital certificate insights for Top Level Domains (TLDs) like <a href="https://radar.cloudflare.com/tlds/com"><u>.com</u></a> or <a href="https://radar.cloudflare.com/tlds/us"><u>.us</u></a>, Cloudflare Radar also provides insights into the <a href="https://radar.cloudflare.com/security/email#most-abused-tlds"><u>“most abused” TLDs</u></a> – those with domains that we have found are originating the largest shares of malicious and spam email among messages analyzed by Cloudflare Email Security. The analysis is based on the sending domain’s TLD, found in the From: header of an email message. For example, if a message came from sender@example.com, then example.com is the sending domain, and .com is the associated TLD. For the Year in Review analysis, we only included TLDs from which we saw an average minimum of 30 messages per hour.</p><p>Based on <a href="https://radar.cloudflare.com/year-in-review/2025/#most-abused-tlds"><u>messages analyzed throughout 2025</u></a>, we found that <a href="https://radar.cloudflare.com/tlds/christmas"><u>.christmas</u></a> and <a href="https://radar.cloudflare.com/tlds/lol"><u>.lol</u></a> were the most abused TLDs, with 99.8% and 99.6% of messages from these TLDs respectively characterized as either spam or malicious. Sorting the list of TLDs by malicious email share, <a href="https://radar.cloudflare.com/tlds/cfd"><u>.cfd</u></a> and <a href="https://radar.cloudflare.com/tlds/sbs"><u>.sbs</u></a> both had more than 90% of analyzed emails categorized as malicious. The <a href="https://radar.cloudflare.com/tlds/best"><u>.best</u></a> TLD was the worst in terms of spam email share, with 69% of email messages characterized as spam.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tTPjf9VkDFDnzaKCUXE9y/93e88ce8e7f65ef6373308f805b0219f/BLOG-3077_63_-_emailsecurity-maliciousemail-mostabusedtlds.png" />
          </figure><p><sup><i>TLDs originating the largest total shares of malicious and spam email in 2025</i></sup></p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Although the Internet and the Web continue to evolve and change over time, it appears that some of the key metrics have become fairly stable. However, we expect that others, such as those metrics tracking AI trends, will shift over the coming years as that space evolves at a rapid pace. </p><p>We encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2025"><u>Cloudflare Radar 2025 Year In Review microsite</u></a> and explore the trends for your country/region, and consider how they impact your organization as you plan for 2026. You can also get near real-time insight into many of these metrics and trends on <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. And as noted above, for insights into the top Internet services across multiple industry categories and countries/regions, we encourage you to read the <a href="https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/"><u>companion Year in Review blog post</u></a>.</p><p>If you have any questions, you can contact the Cloudflare Radar team at <a><u>radar@cloudflare.com</u></a> or on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p>
    <div>
      <h2>Acknowledgements</h2>
      <a href="#acknowledgements">
        
      </a>
    </div>
    <p>As the saying goes, it takes a village to make our annual Year in Review happen, from aggregating and analyzing the data, to creating the microsite, to developing associated content. I’d like to acknowledge those team members that contributed to this year’s effort, with thanks going out to: Jorge Pacheco, Sabina Zejnilovic, Carlos Azevedo, Mingwei Zhang, Sofia Cardita (data analysis); André Páscoa, Nuno Pereira (frontend development); João Tomé (Most Popular Internet Services); David Fidalgo, Janet Villarreal, and the internationalization team (translations); Jackie Dutton, Kari Linder, Guille Lasarte (Communications); Laurel Wamsley (blog editing); and Paula Tavares (Engineering Management), as well as other colleagues across Cloudflare for their support and assistance.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">2Mp06VKep73rBpdUmywpQ2</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[ChatGPT's rivals, Kwai's quiet rise: the top Internet services of 2025]]></title>
            <link>https://blog.cloudflare.com/radar-2025-year-in-review-internet-services/</link>
            <pubDate>Mon, 15 Dec 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ AI competition intensified in 2025 as ChatGPT gained strong challengers. Instagram climbed, X declined, and platforms like Shopee, Temu, and Kwai reshaped global Internet usage. Our 2025 DNS data shows how Internet patterns evolved. ]]></description>
            <content:encoded><![CDATA[ <p>In 2025, the Internet is more central to our lives than ever, and we rely on an array of online services to get things done, connect with others, and enjoy ourselves. Cloudflare’s Top Internet Services of 2025 report explores how the connected world interacted this year, based on Cloudflare’s observations and analysis of DNS trends. </p><p>This report is part of the <a href="https://radar.cloudflare.com/year-in-review/2025"><u>2025 Cloudflare Radar Year in Review</u></a>, focused on shifts in popularity of Internet services. We hope you find the results are a compelling view of trends in nine major categories — who’s moving up, who’s sliding down, and who continues to hold our attention.</p><p>These rankings show relative popularity within each category, based on anonymized DNS query data from Cloudflare’s <a href="https://1.1.1.1/"><u>1.1.1.1</u></a> <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/"><u>DNS resolver</u></a> and a machine-learning-assisted ranking method introduced in <a href="https://blog.cloudflare.com/radar-domain-rankings/#our-approach"><u>2022</u></a>. A lower rank does not imply lower traffic, only that other services may have grown faster.</p>
    <div>
      <h4>Categories</h4>
      <a href="#categories">
        
      </a>
    </div>
    <ul><li><p>Generative AI <a href="#generative-ai-claude-perplexity-and-gemini-become-serious-chatgpt-competitors">➜</a></p></li><li><p>Social Media <a href="#social-media-instagram-and-snapchat-up-x-down">➜</a></p></li><li><p>E-commerce <a href="#e-commerce-shopee-and-temu-rise">➜</a></p></li><li><p>Video Streaming <a href="#video-streaming-youtube-and-netflix-lead-hbo-enters-top-10">➜</a></p></li><li><p>News <a href="#news-globo-and-bbc-global-perspectives">➜</a></p></li><li><p>Messaging <a href="#messaging-whatsapp-dominates-signal-rises">➜</a></p></li><li><p>Metaverse &amp; Gaming <a href="#metaverse-gaming-roblox-leads-playstation-overtakes-xbox">➜</a></p></li><li><p>Financial Services <a href="#financial-services-stripe-keeps-lead-with-no-changes-on-top">➜</a></p></li><li><p>Cryptocurrency Services <a href="#cryptocurrency-binance-leads-okx-shines-at-the-end-of-the-year">➜</a></p></li></ul>
    <div>
      <h3>Key trends and takeaways</h3>
      <a href="#key-trends-and-takeaways">
        
      </a>
    </div>
    <p>From the dominance of social media and streaming to the rapid growth of AI chatbots, the data reflects an Internet that is constantly adapting to user needs and new technologies. Some of the shifts we observed coincide with news events such as the short Israel-Iran war and Donald Trump’s inauguration — as well as global phenomena like Eurovision and Black Friday.</p><ul><li><p><b>Asian e-commerce climbs:</b> Shopee and Temu joined Amazon in the global e-commerce top 3.</p></li><li><p><b>ChatGPT still leads, but rivals emerge:</b> Claude, Gemini, Perplexity, and DeepSeek turned Generative AI into a crowded field, with Gemini holding the #2 spot by year’s end.</p></li><li><p><b>Instagram up, TikTok and X down:</b> Instagram rose to #5 overall (from #7) and #2 in Social Media, while TikTok slipped to #8 and X fell outside the Top 20.</p></li><li><p><b>Kwai’s quiet rise in emerging markets:</b> The Chinese short-video app climbed in our global social ranking and is now #3 in Brazil and high in several emerging markets.</p></li><li><p><b>Roblox still rules gaming, PlayStation overtakes Xbox:</b> Roblox kept the #1 spot in Metaverse &amp; Gaming, while PlayStation passed Xbox for #2.</p></li><li><p><b>Stripe and Nubank digital-first finance dominates</b>: Stripe remained #1 in Financial Services, while Brazilian neobank Nubank highlights Latin America's digital banking surge.</p></li><li><p><b>Crypto steadies, OKX surges:</b> Binance kept the top spot, but OKX jumped to #2 as crypto traffic spiked around Trump’s inauguration and market rallies.</p></li><li><p><b>News under AI pressure</b>: Globo and ESPN dominated the News category, and most traditional outlets slid in our Overall ranking as AI platforms are reshaping how people find information.</p></li></ul><p>We’re also including a by-country and by-region perspective on the most popular Internet services in our <a href="https://radar.cloudflare.com/year-in-review/2025"><u>Year in Review microsite</u></a> for the second year. It features Top 10 lists not only for the Overall ranking but also for Generative AI, Social Media, and Messaging across more than 100 countries and regions. At the end of this post, we highlight key trends from this localized data.</p><p>Explore the full <a href="https://radar.cloudflare.com/year-in-review/2025"><u>2025 Cloudflare Radar Year in Review microsite</u></a> for interactive visualizations, additional metrics, and deeper analysis of Internet traffic patterns, security trends, and network performance data. Check out the <a href="https://blog.cloudflare.com/radar-2025-year-in-review/"><u>2025 Year in Review blog post</u></a> for more insights.</p>
    <div>
      <h4>Methodology</h4>
      <a href="#methodology">
        
      </a>
    </div>
    <p>Our analysis uses anonymized DNS query data from the <a href="https://1.1.1.1/"><u>1.1.1.1</u></a> public <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/"><u>DNS resolver</u></a>, used by millions globally. We aggregate domains associated with each service (e.g., twitter.com, t.co, and x.com are grouped as “X”) and focus on services accessed by end users, excluding infrastructure domains like root-servers.net. </p>
    <div>
      <h2>Google is still #1, while Instagram and YouTube move up</h2>
      <a href="#google-is-still-1-while-instagram-and-youtube-move-up">
        
      </a>
    </div>
    <p>Since we introduced our current ranking method in <a href="https://blog.cloudflare.com/radar-2022-year-in-review/"><u>2022</u></a>, Google (which includes services like Google Maps and Google Calendar) has remained the #1 most popular Internet service globally. Facebook continued to hold the #2 position for the third year in a row.</p><p>Apple and Microsoft follow a similar pattern to Google in that their main domains (apple.com and microsoft.com) power many different services. Other services with distinct domains, such as Outlook or iCloud, are counted separately.</p>


<p><i>(Note: In these rankings we use <span>▲</span><span>▼</span> symbols to indicate changes from 2024.)</i></p>

<strong>Top 10 most popular Internet services in 2025, overall</strong>
<ol>
    <li>Google</li>
    <li>Facebook</li>
    <li>Apple</li>
    <li>Microsoft <span>▲</span></li>
    <li>Instagram <span>▲</span></li>
    <li>AWS <span>▼</span></li>
    <li>YouTube <span>▲</span></li>
    <li>TikTok <span>▼</span></li>
    <li>Amazon </li>
    <li>WhatsApp</li>
</ol>
<p>
Apple held #3 through most of the year, but beginning in the summer Microsoft briefly challenged it, reaching that spot on several days in late 2025. Even so, Apple finished the year at #3. Microsoft’s tools performed better overall than in 2024 — Outlook and Microsoft 365/Office were just outside the Top 10.</p><p>Instagram was one of 2025’s strongest performers. It started the year at #7, matching its 2024 position, but climbed to #5 by year-end, reaching #4 on several days in May and June. YouTube also improved, rising one place to #7. Another Meta service, WhatsApp, remained #10 but appeared more frequently at #9 in late 2025 and even reached #7 during parts of May and June.</p><p>TikTok declined in the Overall ranking after a turbulent start to the year, including a temporary ban in the U.S. It fell from #4 in late 2024 to #8 by the end of 2025, performing worst during and after the summer. Amazon Web Services (AWS), which is tracked separately from Amazon through the amazonaws.com domain, also slipped slightly, moving down one position to #6. Amazon remained #9 but faced stronger competition than in 2024.</p><p>The chart below shows how these top Internet services evolved throughout the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Jjm9FRa7YPVSviBV9APob/e9485d5203a4099f4d3a3cb8fd50d560/BLOG-3095_1_Overall_top_10.png" />
          </figure><p>X continued its downward trajectory. In 2022, it ranked as high as #10 and was close to Instagram. In 2023, it fell out of the Top 10 and, in 2024, dropped to around #14-15. In 2025, it began at #15 and slid further, ending the year outside the Top 20. More on X’s performance appears in the <a href="#social-media-instagram-and-snapchat-up-x-down">Social Media section</a> below.</p>
    <div>
      <h2>Generative AI: Claude, Perplexity, and Gemini become serious ChatGPT competitors</h2>
      <a href="#generative-ai-claude-perplexity-and-gemini-become-serious-chatgpt-competitors">
        
      </a>
    </div>
    <p>Generative AI became a globally recognized category in late 2022 with the launch of ChatGPT, which turned into a worldwide phenomenon throughout <a href="https://blog.cloudflare.com/radar-2023-year-in-review-internet-services/"><u>2023</u></a>. In 2025, as in 2024, OpenAI’s ChatGPT remained by far the most popular service in this category, which includes chatbots, coding assistants, and other AI tools. But it now faces serious all-purpose chatbot competitors, including Claude, Perplexity, and Google Gemini, which saw more growth as the year went on.</p>

<strong>Top 10 Generative AI services in 2025</strong>
<ol>
    <li>ChatGPT / OpenAI</li>
    <li>Claude / Anthropic <span>▲</span></li>
    <li>Perplexity <span>▲</span></li>
    <li>Google Gemini <span>▲</span></li>
    <li>Character.AI <span>▼</span></li>
    <li>GitHub Copilot  <span>▲</span></li>
    <li>Windsurf AI <span>▼</span></li>
    <li>QuillBot <span>▼</span></li>
    <li>Grok / xAI <span>▲</span></li>
    <li>DeepSeek <span>▲</span></li>
</ol>
<p>In 2024, the closest services behind ChatGPT were Character.AI (role-play chatbots), Codeium (the coding assistant that’s now Windsurf), and QuillBot (writing and paraphrasing). These tools dropped in the rankings in 2025, especially QuillBot, as users sought out broad, consumer-facing chatbots. The drop in Character.AI’s ranking also coincides with its October announcement that <a href="https://www.bbc.com/news/articles/cq837y3v9y1o"><u>it would be banning teens</u></a> from using its AI chatbots — by November it was oscillating between #5 and #7.</p><p>The biggest jump came from Google’s Gemini. It began 2025 outside the Top 10 but climbed steadily and, from mid-September onward, held the #2 position on most days. In our year-end weighted ranking, it finished at #4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2P9pcO1tvMhqXCSN132jsr/8a8120f9fd5559120c2a933159ee4ed2/BLOG-3095_2_GenAI_top_10.png" />
          </figure>
    <div>
      <h2>Claude, Perplexity, Grok, and the explosive entrance of DeepSeek</h2>
      <a href="#claude-perplexity-grok-and-the-explosive-entrance-of-deepseek">
        
      </a>
    </div>
    <p>Claude, the AI assistant from Anthropic, delivered one of the year’s strongest performances, rising from #8-10 in early 2025 to #2 on most weekdays in July and August, before Gemini overtook it in mid-September. Consistent with its enterprise positioning, Claude showed markedly stronger weekday usage.</p><p>Perplexity climbed from #7 to secure #3 from September onward, while Grok (the chatbot from xAI) entered the Top 20 in mid-February and reached #9 by the end of the month, later peaking at #6 on several weekends in October and November.</p><p>DeepSeek, the Chinese chatbot and open-source model developer, made the year’s most notable entrance. Between January 28 and February 3, it surged from outside the Top 20 to #3, demonstrating how quickly new entrants can disrupt the GenAI landscape. It stabilized between #6 and #10 for the remainder of the year.</p><p>Clear weekend-versus-weekday patterns emerged: ChatGPT and Claude dominated weekdays, reflecting workplace adoption, while Grok, Perplexity, and DeepSeek performed better on weekends, indicating stronger consumer and potentially hobbyist appeal.</p><p>Among coding assistants, GitHub Copilot improved from #7 in 2024 to #6 in 2025, reaching #3 on several days during the first half of the year. Windsurf AI (formerly Codeium) started strong at #4 but declined to #7-8 by year-end as consumer-facing platforms rose.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7BLXH0PyTtxCuSn1dJiCoJ/13bfaa843a2c0202a86a831bc86ddfe5/BLOG-3095_3_GitHub_copilot.png" />
          </figure>
    <div>
      <h2>AI chatbots Doubao and Dola/Cici gaining traction</h2>
      <a href="#ai-chatbots-doubao-and-dola-cici-gaining-traction">
        
      </a>
    </div>
    <p>ByteDance’s Doubao, launched in 2023, performed strongly despite one complication: it operates under a <a href="https://www.wired.com/story/bytedances-ai-chatbot-is-quietly-gaining-traction-around-the-world/"><u>different name internationally</u></a> — Dola (formerly Cici). While the international version uses its own domains, network patterns suggest they may still rely on some shared backend infrastructure with Doubao, including endpoints associated with doubao.com. This overlap helps explain why Doubao shows up in global rankings even in regions where Dola/Cici are the consumer-facing brands. Doubao ranks highly outside China — it is #7 in the GenAI category in Australia, #8 in New Zealand, and #9 in the UK, and climbs even higher in several African countries (#2 in Angola and Congo).</p><p>Among specialized AI services, Hugging Face, the open-source model repository, had some of the sharpest spikes of the year, reaching #3 on September 20-21, likely driven by model releases. Google’s dedicated AI properties showed more modest traction: DeepMind peaked at #12 in May, while AI Studio briefly entered the Top 20 in mid-September.</p><p>ElevenLabs (AI voice generation) reached #13-14 during peak periods, while Poe (Quora’s multi-bot aggregator) declined from #11 to #18. Meta AI remained outside the Top 10, appearing only sporadically in August and again in October–November.</p>
    <div>
      <h2>ChatGPT’s growth to the Top 40 of our Overall category</h2>
      <a href="#chatgpts-growth-to-the-top-40-of-our-overall-category">
        
      </a>
    </div>
    <p>When looking at trends for Generative AI services within our larger <b>Overall</b> ranking, some notable trends included:</p><ul><li><p>ChatGPT continued its steady ascent in the Overall domain ranking. After launching in late 2022, it hovered around #200 in early 2023, nearing the Top 100 by year-end. It then approached the Top 50 in late 2024, helped by back-to-school and return-to-work patterns. In 2025, it started between #51-60 and peaked at #33 on November 25, consistently ranking higher on weekdays.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GXwjNKnWii2NZXonVyPrb/12b76cd5174174393d494e65adfa2e6f/BLOG-3095_4_ChatGPT_growth.png" />
          </figure></li><li><p>By late November, ChatGPT sat just behind X (between #26-29) and ahead of Discord, Pinterest, and Reddit, a significant milestone for a service that didn’t exist three years earlier.</p></li><li><p>Other GenAI services also climbed the Overall rankings, though none matched ChatGPT’s momentum. Gemini rose quickly after entering the Top 500 in mid-March, peaking at #133 on November 24. Claude, barely inside the Top 500 in January, reached #155 on December 2 and held a Top 200 position from August onward. Perplexity surged from around #450 in early 2025 to peak at #155 on October 19, hovering near #160 in November. Grok reached #223 on November 18.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HmctomJlFSCHxXNb0RVJr/502deda8f5e0cc2f8f2dc283fd903257/BLOG-3095_5_Gemini_Claude.png" />
          </figure>
    <div>
      <h2>Social media: Instagram and Snapchat up, X down</h2>
      <a href="#social-media-instagram-and-snapchat-up-x-down">
        
      </a>
    </div>
    <p><a href="https://datareportal.com/social-media-users"><u>Reports</u></a> estimate that over 5 billion people worldwide use social media, and that number has been growing. Facebook remains the dominant global platform, but the biggest shift in our rankings was Instagram displacing TikTok to secure the #2 spot. These platforms, along with Facebook, all appear in the Top 10 most popular Internet services overall. </p>

<strong>Top 10 Social Media services in 2025</strong>
<ol>
    <li>Facebook</li>
    <li>Instagram <span>▲</span></li>
    <li>TikTok <span>▼</span></li>
    <li>Snapchat <span>▲</span></li>
    <li>Linkedin <span>▲</span></li>
    <li>X / Twitter <span>▼</span></li>
    <li>Kwai <span>▲</span></li>
    <li>Discord <span>▼</span></li>
    <li>Pinterest</li>
    <li>Reddit</li>
</ol>
<p>Instagram and TikTok swapped positions starting in May, with Instagram securing an uncontested #2 from late June onward. Snapchat moved into #4 in March, displacing X, which ended the year at #6, behind LinkedIn for the first time in our rankings. Discord and Reddit both briefly reached #7 before settling at #8 and around #9-10 respectively.</p>
    <div>
      <h2>Kwai’s rise in emerging markets</h2>
      <a href="#kwais-rise-in-emerging-markets">
        
      </a>
    </div>
    <p>Kwai (known as <a href="https://en.wikipedia.org/wiki/Kuaishou"><u>Kuaishou</u></a> in China) climbed from #8 in late 2024 to #7 in 2025, driven by <a href="https://www.chinadaily.com.cn/a/202503/02/WS67d0f077a310c240449da5b4.html"><u>growth</u></a> in Latin America and other emerging markets. The Chinese short-video platform now ranks #2 in Brazil’s social media category (behind Facebook) and #3 in Brazil’s overall ranking.</p><p>Kwai reached top 10 status in two major emerging markets — Brazil (#3) and Indonesia (#9). It also ranked #15 in Syria, #18 in Colombia, and #20 in Egypt. Beyond these, it showed meaningful presence in markets like the Dominican Republic (#25), Guyana (#26), Oman (#28), and Argentina (#30).</p><p>Our global ranking also highlights several non-Western platforms inside the Top 20. Douyin (the Chinese version of TikTok) held #11 for the second year in a row. VK (often described as Russia’s Facebook) remained at #12, and SnackVideo, a <a href="https://www.ipsos.com/en-id/uncovering-growth-short-video-indonesia"><u>Southeast Asian</u></a> TikTok rival also owned by Kuaishou, ranked #13. Xiaohongshu (<a href="https://en.wikipedia.org/wiki/Xiaohongshu"><u>RedNote</u></a>), which gained attention during the brief U.S. <a href="https://blog.cloudflare.com/tiktok-ban-traffic-decline-alternatives-rednote/"><u>TikTok ban</u></a> in January, ranked #14.</p><p>Looking at microblogging competitors to X, none gained significant traction. Meta’s microblogging app Threads did not enter the Top 20 at any point, and Bluesky only briefly appeared on January 30, during the U.S. TikTok ban. Tumblr was in the Top 20 for much of the year, and Mastodon servers appeared there through most of October.</p><p>OnlyFans, the subscription-based content platform, appeared consistently in the Top 20 between May and early August (around #19) but declined in the second half of the year. Here’s the Social Media Top 10 chart for 2024:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76e8qhIdmEr6VbUquIWWNH/f18cb25ff1fc07046b956837a8925175/BLOG-3095_6_Social_media_top_10.png" />
          </figure>
    <div>
      <h2>X alternatives in the Overall ranking</h2>
      <a href="#x-alternatives-in-the-overall-ranking">
        
      </a>
    </div>
    <p>Let’s go beyond the Social Media category to see how these platforms performed in our Overall ranking, where bigger shifts between services are evident.</p><p>X alternatives showed limited DNS presence. <a href="https://en.wikipedia.org/wiki/Mastodon_(social_network)"><u>Mastodon</u></a> (aggregated servers) performed best, consistently ranking between #208 and #248, with stronger weekend traffic. Bluesky peaked around #240 in May but declined through most of the year, with a notable spike as the U.S. <a href="https://en.wikipedia.org/wiki/2025_United_States_elections"><u>held off-year, state and local elections</u></a> on November 4 (#229). This mirrors the pattern seen after the 2024 U.S. presidential election, when Bluesky performed better around election day and peaked on November 14 at #193.</p><p>Threads trailed both platforms, peaking at #279 in June but generally ranking around #360. <i>(Note: Threads uses Meta’s shared infrastructure, so some images could load from Facebook/Instagram domains, which may reduce its standalone DNS footprint.)</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rp255ykzYIoFWgs2NaKVk/df3ad27ca91be18f7a8b5b0f55a7d71c/BLOG-3095_7_X_alternatives.png" />
          </figure><p>Usage patterns in the Overall ranking:</p><ul><li><p><b>Weekday vs. weekend trends</b>: X, LinkedIn, Snapchat, and Discord performed better on weekdays, while Kwai, Pinterest, Tumblr, and OnlyFans peaked on weekends. LinkedIn ranked highest Monday–Wednesday, and Tinder continued its pattern of Sunday peaks.</p></li><li><p><b>Growth stories</b>: Reddit stayed in the Top 50 throughout 2025 (an improvement over 2024), stabilizing in the #34-40 range after May and performing strongest Monday-Thursday. Kwai also had a strong second half of the year, peaking at #28 in September.</p></li><li><p><b>Declines</b>: Quora continued the downward trajectory seen in 2024, falling from around #160 to outside the Top 200. Tinder and Tumblr followed similar patterns, both dropping below #200. OnlyFans remained inside the Top 200 from April to June but declined in the second half of the year.</p></li><li><p><b>Event-driven spikes</b>: Instagram reached #4 for several days between mid-May and mid-June. X peaked at #15 on March 2 during the Oscars (compared with a #12 peak in 2024). Pinterest surged on November 30, the Sunday of Black Friday week.</p></li></ul>
    <div>
      <h2>E-commerce: Shopee and Temu rise</h2>
      <a href="#e-commerce-shopee-and-temu-rise">
        
      </a>
    </div>
    <p>Every Cyber Week and Black Friday season reminds us how central e-commerce has become to global Internet traffic. In this category, Amazon remained the undisputed leader in 2025, but the strongest momentum came from newer players that now round out the top three: Shopee (which launched in Singapore in 2015 and is popular in Southeast Asia) and China’s Temu (which expanded to the U.S. in 2022). Meanwhile, 2024’s top-three finishers Taobao and AliExpress both moved down the ranking to #5 and #10 respectively.</p>

<strong>Top 10 E-commerce services in 2025</strong>
<ol>
    <li>Amazon</li>
    <li>Shopee <span>▲</span></li>
    <li>Temu <span>▲</span></li>
    <li>Shopify</li>
    <li>Taobao <span>▼</span></li>
    <li>eBay <span>▲</span></li>
    <li>Alibaba <span>▼</span></li>
    <li>Shein</li>
    <li>Mercado Libre</li>
    <li>AliExpress <span>▼</span></li>
</ol>
<p>Shopee and Taobao began 2025 competing for the #2 position, but from mid-April to early July, Temu temporarily overtook both. From July onward, Shopee held #2 consistently, with Temu settling at #3. In 2024, Shopee was just outside the Top 10, while Temu finished at #5.</p><p>Shopify also strengthened its position. It opened the year at #6 and has remained steadily at #4 since July — the same finishing position as in 2024, but now ahead of Taobao and AliExpress and just behind Shopee and Temu.</p><p>eBay showed a clearer recovery: after ending 2024 at #7 (and 2023 at #3), it moved between #3 and #6 early in the year and ultimately held #6. Shein maintained #8, identical to 2024, and continued to outperform Mercado Libre (#9).</p><p>Just outside the Top 10 were Russia’s Wildberries, followed by Walmart and Japan’s Rakuten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nJKoPr94TSk2g6Gay4DZ7/df350a17261e5f4d8e7f0d0b43f2a92c/BLOG-3095_7_Ecommerce_Top_10.png" />
          </figure>
    <div>
      <h2>Black Friday impact in the Overall ranking</h2>
      <a href="#black-friday-impact-in-the-overall-ranking">
        
      </a>
    </div>
    <p>Looking at the broader Overall ranking, several patterns stood out:</p><ul><li><p><b>Amazon</b> followed a trajectory similar to 2024. It hovered between #9 and #10 after July, rose to #8 during Black Friday week, and peaked at #7 on November 29 (the day after Black Friday). It continued to perform better on Sundays.</p></li><li><p><b>Shopee</b> remained around #50 for most of the year, outperforming its Black Friday number on Singles' Day (November 11), when it reached #46 (vs. #48 on Black Friday). Shopify closed the gap in November: its best day was Black Friday, November 28, and it also hit #49 on November 6. Shopify continued to show stronger weekday performance.</p></li><li><p><b>Temu</b>, known for its low-cost marketplace model, peaked at #36 on May 18 (the day after the 2025 Eurovision final). It began the year near #60 (vs. outside the Top 100 in early 2024) and ended 2025 around #50. Black Friday did not visibly impact its ranking.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Ho9YjNC8Jq9u0QYMaiZiJ/6b647192c480d8c56ad5bad2e9689ebb/BLOG-3095_8_Temu_and_company.png" />
          </figure><p></p></li><li><p><b>Shein</b> remained more stable this year, holding between #80 and #90 after finishing just outside the Top 100 in 2024. It peaked at #78 on November 29. Temu, which had a similar performance to Shein in 2024, clearly outpaced it in 2025.</p></li><li><p><b>eBay</b> improved its consistency, ranking between #46 and #62 throughout the year (vs. remaining outside the Top 70 in 2024). It peaked at #42 on April 15. As with previous years, Black Friday had little impact, reflecting lower seasonal demand for second-hand marketplaces.</p></li><li><p><b>Mercado Libre</b> grew meaningfully in 2025, entering the Top 100 from September onward. Its best day, as in 2024, was Black Friday (November 28), when it reached #82 (vs. #100 in 2024).</p></li></ul><p>Other retail services also had a Black Friday week impact in the Overall category:</p><ul><li><p><b>Adidas</b> entered the top 250, reaching #229 on Cyber Monday and #249 on Black Friday (similar to 2024).</p></li><li><p><b>Nike</b> slipped slightly, peaking at #287 on Black Friday.</p></li><li><p><b>Target</b> hit #117 on Cyber Monday, improving on its 2024 high of #127. It performed best on Saturdays.</p></li><li><p><b>Walmart</b> performed slightly better than Target, peaking at #101 on the August 23-24 weekend and reaching #120 ahead of Thanksgiving.</p></li><li><p><b>Ikea</b> showed a nearly identical pattern to 2024, peaking at #242 on June 2-3.</p></li></ul>
    <div>
      <h2>Video streaming: YouTube and Netflix lead, HBO enters Top 10</h2>
      <a href="#video-streaming-youtube-and-netflix-lead-hbo-enters-top-10">
        
      </a>
    </div>
    <p>Video streaming remained one of the most stable categories of 2025, even as industry consolidation intensified. The Top 3 did not change for the third year in a row: YouTube held #1, followed by Netflix and Twitch.</p>

<strong>Top 10 Video streaming services 2025</strong>
<ol>
    <li>YouTube</li>
    <li>Netflix</li>
    <li>Twitch</li>
    <li>Roku</li>
    <li>Disney Plus</li>
    <li>Prime Video</li>
    <li>Vimeo</li>
    <li>Pluto TV <span>▲</span></li>
    <li>Plex TV <span>▼</span></li>
    <li>HBO Max <span>▲</span></li>
</ol>
<p>HBO Max was the year’s biggest climber, entering the Top 10 for the first time and reaching #8 on Cyber Monday (December 1), boosted by new episodes of <a href="https://en.wikipedia.org/wiki/It_%E2%80%93_Welcome_to_Derry"><u>IT: Welcome to Derry</u></a>. The only other shift in the Top 10 was Pluto TV, a free ad-supported service, moving ahead of Plex TV.</p><p>Among paid services, Netflix remained the clear leader, followed by Disney Plus (#5) and Prime Video (#6). Hulu (#11), Peacock (#15), Apple TV+ (#17), and Paramount Plus (#20) stayed outside the Top 10. Roku consistently held #4 and briefly overtook Twitch during Black Friday week. Disney Plus held #5 throughout the year but climbed to #4 on several weekends between March and June, around the time of the premieres of <a href="https://en.wikipedia.org/wiki/Daredevil:_Born_Again"><u>Daredevil: Born Again</u></a> and later <a href="https://en.wikipedia.org/wiki/Andor"><u>Andor</u></a> season 2.</p><p>The Top 10 over 2025:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HOB1C1kctSfTXMj1qKXmS/d958e749f6c0c01930a86b839455fb95/BLOG-3095_9_Video_streaming_top_10.png" />
          </figure>
    <div>
      <h2>
Content-driven weekend spikes in the Overall ranking</h2>
      <a href="#content-driven-weekend-spikes-in-the-overall-ranking">
        
      </a>
    </div>
    <p>Across the year, major premieres produced clear surges in the broader Overall ranking:</p><ul><li><p><b>YouTube</b> peaked at #5 on July 5, the day MrBeast released “<a href="https://www.youtube.com/watch?v=FWAdfuPpLOc"><u>World's Fastest Car Vs Cheetah!</u></a>”</p></li><li><p><b>Netflix</b> stayed near #11 on weekends from late June and peaked at #10 on November 30, following the release of Stranger Things season 5.</p></li><li><p><b>Disney Plus</b> ranged between #47 and #60, with its strongest spikes possibly tied to Daredevil: Born Again.</p></li><li><p><b>Prime Video</b> reached #53 after the launch of <a href="https://en.wikipedia.org/wiki/The_Family_Man_(Indian_TV_series)"><u>The Family Man</u></a> season 3 on November 22-23 and again on November 30.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YYOWLwl7ZUlLFVnDBs3ta/c79268f003c604bad66626976b5a0be9/BLOG-3095_10_Disney_Prime.png" />
          </figure><p></p></li><li><p><b>HBO Max</b> was consistently close to the Top 100 in our Overall ranking and peaked on November 23 during a release of IT: Welcome to Derry. Hulu showed similar Cyber Week behavior, reaching #132. Paramount Plus outperformed Peacock at the end of November on weekends, peaking at #197 on November 23 and 30.</p></li></ul><p>As with previous years, most paid streaming platforms were strongest on weekends, especially Sundays, reflecting global viewing habits.</p>
    <div>
      <h2>News: Globo and BBC global perspectives</h2>
      <a href="#news-globo-and-bbc-global-perspectives">
        
      </a>
    </div>
    <p>News organizations continue to inform the public, though their visibility and traffic appears increasingly <a href="https://digiday.com/media/google-ai-overviews-linked-to-25-drop-in-publisher-referral-traffic-new-data-shows/"><u>diminished</u></a> by AI-powered search and summarization tools (a trend we explored in our <a href="https://blog.cloudflare.com/crawlers-click-ai-bots-training/#google-referrals-fall-as-ai-overviews-expand"><u>August 2025 blog post</u></a>). This category, which includes traditional news outlets as well as aggregators, highlights several shifts in 2025.</p>

<strong>Top 10 News services in 2025</strong>
<ol>
    <li>Globo</li>
    <li>ESPN <span>▲</span></li>
    <li>BBC <span>▼</span></li>
    <li>NY Times <span>▼</span></li>
    <li>CNN <span>▼</span></li>
    <li>Fox News <span>▼</span></li>
    <li>Yahoo Finance</li>
    <li>Google News <span>▲</span></li>
    <li>NewsBreak <span>▲</span></li>
    <li>Times of India <span>▲</span></li>
</ol>
<p>Globo, the <a href="https://en.wikipedia.org/wiki/Grupo_Globo"><u>Brazilian media giant</u></a> spanning TV, radio, and print, held the #1 position for the third consecutive year. ESPN moved into #2, overtaking the BBC (#3), which operates globally in <a href="https://www.bbc.com/aboutthebbc/whatwedo/worldservice"><u>43 languages</u></a>. The New York Times (#4), CNN (#5), and Fox News (#6) each fell one place due to ESPN’s rise. </p><p>Google News rose to #8 (with a clear weekend bias) while NewsBreak, a U.S. local-news aggregator, surged late in the year and reached #7 on several days in November.</p><p>Outside the Top 10, The Guardian briefly reached #10 during Canada’s March <a href="https://en.wikipedia.org/wiki/2025_Liberal_Party_of_Canada_leadership_election"><u>leadership election</u></a>, while RT (Russian state media) declined from the Top 10 early in the year to around #20 by year-end. The Financial Times spiked to #4 between July 24-27 during high-stakes U.S.-EU tariffs-related trade negotiations.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HTIcD7BBkQd4VpTrQf0Nv/6b5f9bf237a9ed2e9090defa9e466fc1/BLOG-3095_11_News_Top_10.png" />
          </figure>
    <div>
      <h3>Israel–Iran escalation, and Trump’s inauguration and trade deals</h3>
      <a href="#israel-iran-escalation-and-trumps-inauguration-and-trade-deals">
        
      </a>
    </div>
    <p>Across the broader Overall ranking, major geopolitical, political, and sporting events produced surges in news traffic. <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/#us-elections-attacks-and-protests"><u>Last year</u></a>, the surge was election-driven.</p><ul><li><p><b>Trump inauguration</b> (January 20–21): CNN, New York Times (NYT), and Fox News all spiked prominently.</p></li><li><p><b>U.S.-UK trade deal</b> <b>announced &amp; VE Day 80th anniversary</b> (May 8): The year’s highest peaks: CNN (#126), NYT (#129), Fox News (#164), BBC (#106).</p></li><li><p><b>Israel-Iran conflict </b>(the conflict started on June 13, when Israel <a href="https://en.wikipedia.org/wiki/Iran%E2%80%93Israel_war"><u>launched</u></a> a bombing campaign against Iran, and ended on June 24): BBC reached its yearly peak (#101), with CNN (#125), NYT (#136), and Fox News (#160) showing parallel spikes.</p></li></ul><p>In the next chart we show rankings around the May and June peaks for BBC, CNN, NY Times, and Fox News.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LeLgCNCUCSScGhPctaTDd/93fa036b09e0efe77d0bb031d4f44d5d/BLOG-3095_12_News_peaks_Israel_war.png" />
          </figure><ul><li><p><b>U.S. off-year Election Day </b>(November 5): CNN (#157), NYT (#169), and Fox News (#191) all saw moderate increases.</p></li></ul><p>Regional dynamics also stood out. Globo peaked during Brazil’s Supercopa do Brasil final on February 2, moving within the #60-77 range. ESPN saw similar event-driven spikes, reaching #82 on April 26 during the NFL Draft and NBA playoffs; and then #79 on September 28, when NFL Week 4 overlapped with the dramatic final day of the MLB regular season; and also at #79 on October 26, as the F1 Mexico City Grand Prix coincided with NFL Week 8 and the first week of the new NBA season, pushing fans to track multiple leagues at once.</p><p>Across the second half of 2025, most major U.S. news outlets showed a gradual decline in the Overall ranking, moving from higher early-year positions toward the #200 range. This suggests shifting consumption patterns as AI tools and social platforms increasingly intermediate how users access news.</p>
    <div>
      <h2>Messaging: WhatsApp dominates, Signal rises</h2>
      <a href="#messaging-whatsapp-dominates-signal-rises">
        
      </a>
    </div>
    <p>Messaging remains a core part of Internet communication, and this category shows continued maturity with stable leaders at the top. WhatsApp remained the clear #1 for the fourth consecutive year, while the standout shift in 2025 was Signal’s move into #5, reflecting growing demand for privacy-focused tools.</p><p><i>(Note: Apple’s iMessage is excluded because it lacks distinct domains. Messaging features inside social platforms — Instagram DMs, X messages, Snapchat — are not measurable as distinct from the other features of their respective social media platforms.)</i></p>

<strong>Top Messaging services in 2025</strong>
<ol>
    <li>WhatsApp</li>
    <li>QQ</li>
    <li>Telegram</li>
    <li>Rakuten Viber</li>
    <li>Signal <span>▲</span></li>
    <li>WeChat <span>▼</span></li>
    <li>LINE</li>
    <li>Messenger <span>▲</span></li>
    <li>Zalo.me <span>▲</span></li>
    <li>KakaoTalk <span>▲</span></li>
</ol>
<p>Chinese service QQ (<a href="https://en.wikipedia.org/wiki/Tencent_QQ"><u>Tencent QQ</u></a>) held #2 for the third year, supported by its integrated ecosystem of games, mobile payments, and communication tools. Telegram (#3) and Rakuten Viber (#4) held steady, remaining key platforms across Eastern Europe, Asia, and the Middle East. </p><p>Signal, the open-source encrypted messaging service, overtook Chinese app WeChat to secure #5 from October onward, reversing the order seen in 2024. Its rise highlights growing interest in open-source, end-to-end encrypted messaging, especially among security-conscious communities. Asian apps also performed strongly: LINE from Japan remained #7, while Vietnam’s Zalo.me reached #9, and South Korea’s KakaoTalk dropped to #10 (it was #8 in late 2024). Meta’s Messenger reached #8 after June.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4UJ3QOTO9RKQV2sn9er8BK/0896fa15fc74d993e4441220398dcc63/BLOG-3095_13_Messaging_Top_10.png" />
          </figure><p>Patterns in the Overall ranking:</p><ul><li><p><b>WhatsApp</b> maintained its #9 Overall position and reached #8 in January and on several days in November.</p></li><li><p><b>Telegram</b> peaked at #56 on July 1, coinciding with major regional unrest in the Middle East.</p></li><li><p><b>WeChat</b> slipped from near the Top 100 early in the year to around #130 by December.</p></li></ul>
    <div>
      <h2>Metaverse &amp; Gaming: Roblox leads, PlayStation overtakes Xbox</h2>
      <a href="#metaverse-gaming-roblox-leads-playstation-overtakes-xbox">
        
      </a>
    </div>
    <p>Gaming continues to drive substantial Internet traffic, even as “metaverse” news fades from public attention. Roblox dominated this category for the third year in a row, while the biggest shift in 2025 was PlayStation overtaking Xbox to claim the #2 position from May onward.</p>

<strong>Top 10 Metaverse &amp; Gaming services in 2025</strong>
<ol>
    <li>Roblox</li>
    <li>PlayStation <span>▲</span></li>
    <li>Xbox / Xbox Live <span>▼</span></li>
    <li>Epic Games / Fortnite <span>▼</span></li>
    <li>Steam <span>▼</span></li>
    <li>Electronic Arts</li>
    <li>Blizzard</li>
    <li>Minecraft <span>▲</span></li>
    <li>Riot Games / League of Legends <span>▼</span></li>
    <li>Nintendo <span>▲</span></li>
</ol>
<p>Steam held #4, continuing its strong performance after its surprise rise in 2024. It performed best on weekdays and during key release periods, reaching #3 on several days in March, April, and July. Its best day was April 24, when it reached #2, coinciding with the release of <a href="https://en.wikipedia.org/wiki/Fatal_Fury:_City_of_the_Wolves"><u>Fatal Fury: City of the Wolves</u></a>. </p><p>Electronic Arts (#6) and Blizzard (#7) remained steady, while Minecraft climbed to #8 (from #9), showing consistent weekend strength. Riot Games/League of Legends dropped to #9, and Nintendo returned to the Top 10. Meta’s Oculus stayed outside the Top 10 for the second year in a row, slipping from around the Top 100 to closer to #130 in the Overall ranking.</p><p>Here’s the top chart across 2025:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/57PktZo0h1t7kCGDSPMWIs/9fbd2eefc63bfac328e5ddc1f08ee388/BLOG-3095_14_Metaverse_gaming_Top_10.png" />
          </figure><p>Usage patterns in the Overall ranking:</p><ul><li><p><b>Roblox</b> peaked at #15 on July 6 during its annual <a href="https://roblox.fandom.com/wiki/The_Hatch"><u>Hatch</u></a> event (July 2-12), and consistently was higher on weekends.</p></li><li><p><b>PlayStation</b> reached #30 during Black Friday week (November 22-23 and 29-30), its strongest performance of the year.</p></li><li><p><b>Minecraft</b> remained between #87 and #120, with predictable weekend spikes.</p></li><li><p><b>Oculus</b> declined across 2025, moving from around the Top 100 to roughly #130 by year-end, reflecting slower mainstream VR adoption.</p></li></ul><p>Gaming platforms such as Roblox, Xbox, Epic Games/Fortnite, Steam, and PlayStation, all displayed strong weekend effects, with most services ranking 20-40 positions higher on Saturdays and Sundays than during the workweek. This pattern reflects gaming’s role as a leisure-driven category.</p>
    <div>
      <h2>Financial services: Stripe keeps lead, with no changes on top</h2>
      <a href="#financial-services-stripe-keeps-lead-with-no-changes-on-top">
        
      </a>
    </div>
    <p>Digital-first financial services continued their dominance in 2025, even as traditional banks and tax tools remain present. Stripe, the Irish-American payment platform, kept its #1 spot for the third consecutive year after overtaking PayPal in 2023.</p>

<strong>Top 10 Financial Services in 2025</strong>
<ol>
    <li>Stripe</li>
    <li>TradingView</li>
    <li>Alipay</li>
    <li>PayPal</li>
    <li>Nubank</li>
    <li>Binance</li>
    <li>Banco do Brasil <span>▲</span></li>
    <li>Intuit <span>▲</span></li>
    <li>Google Pay <span>▲</span></li>
    <li>OKX <span>▲</span></li>
</ol>
<p>The first six positions in 2025 remained unchanged from late 2024. PayPal, usually #4, briefly reached #1 for a few days in late February and early March. TradingView, a platform for traders and investors, held a steady #2 (performing better on weekdays) and peaked at #1 on January 13, when U.S. markets <a href="https://www.nasdaq.com/articles/stock-market-news-jan-13-2025"><u>tumbled</u></a> after strong December jobs data renewed fears of persistent inflation. Alipay, the Chinese mobile and online payment platform, stayed at #3.</p><p>Brazil’s continued <a href="https://agenciabrasil.ebc.com.br/economia/noticia/2025-07/numero-de-pessoas-que-acessam-banco-online-cresce-22-milhoes-em-2-anos"><u>expansion</u></a> in online banking was clear again this year. Nubank, the world's <a href="https://qz.com/nubank-digital-bank-mexico-latin-america-1851096374"><u>largest</u></a> digital bank and a <a href="https://thefinancialbrand.com/news/banking-technology/latin-american-fintech-winner-nubank-taps-ai-for-expansion-muscle-193871"><u>major Latin American financial group</u></a>, held #5 for the second year in a row. Banco do Brasil entered the Top 10 for the first time, while fellow Brazilian bank Bradesco fell out.</p><p>Binance kept its #6 position, while Coinbase fell out of the Top 10. Intuit entered the Top 10 this year, peaking during the <a href="https://en.wikipedia.org/wiki/Tax_Day"><u>U.S. Tax Day</u></a> period (April 14-15) at #6. Google Pay and the cryptocurrency exchange OKX also reached the Top 10 for the first time, driven by strong end-of-year performance.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lSZMlEac7J1fk8IFYzLu7/a684f81183481a32c3d9b3e92de879ec/BLOG-3095_15_Financial_Top_10.png" />
          </figure><p>Other financial services trends in the Overall ranking:</p><ul><li><p>Stripe had its best days late in the year, reaching #70 the day after Singles Day (November 12) and #71 on Cyber Monday (December 1). It continued to perform better on weekends and showed a steady upward trend in the Overall ranking, moving from around #80 to near #70.</p></li><li><p>PayPal ranked higher during Black Friday week, spiking at #82 on November 29. Its overall peak, however, came earlier in the year on March 2, when it reached #73.</p></li><li><p>Nubank performed best a few days before Carnival in Brazil (February 28-March 5), reaching #85 on February 22. It also spiked on Black Friday, November 28, hitting #96.</p></li></ul>
    <div>
      <h2>Cryptocurrency: Binance leads, OKX shines at the end of the year</h2>
      <a href="#cryptocurrency-binance-leads-okx-shines-at-the-end-of-the-year">
        
      </a>
    </div>
    <p>Alongside our Financial Services category, we track cryptocurrency-focused services separately. After several volatile years, the crypto ecosystem was relatively stable in 2025. Binance continued to lead the category, while the strongest momentum came from OKX, which climbed steadily from September onward to finish the year at #2 — overtaking Coinbase, which held that position in 2024.</p>

<strong>Top 10 Cryptocurrency services in 2025</strong>
<ol>
    <li>Binance</li>
    <li>OKX <span>▲</span></li>
    <li>Coinbase <span>▼</span></li>
    <li>CoinGecko <span>▲</span></li>
    <li>2miners.com <span>▼</span></li>
    <li>CoinMarketCap <span>▼</span></li>
    <li>Bybit</li>
    <li>MEXC <span>▲</span></li>
    <li>Exodus <span>▲</span></li>
    <li>Bitget <span>▲</span></li>
</ol>
<p>CoinGecko, the cryptocurrency data platform, rose from #6 to #4, while 2miners.com slipped to #5. The final three entries were all newcomers to the Top 10:</p><ul><li><p>MEXC (#8): a global cryptocurrency exchange known for spot and futures trading.</p></li><li><p>Exodus (#9): a multi-asset crypto wallet focused on ease of use and self-custody.</p></li><li><p>Bitget (#10): a cryptocurrency exchange specializing in derivatives and copy-trading (where users automatically replicate the trades of experienced traders) features.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ueXqxiN2zjH2Y1xvsQYAT/4b0e82d7746f53a604479e9d48320d23/BLOG-3095_16_Crypto-Top10.png" />
          </figure>
    <div>
      <h2>Event-driven spikes in the Overall ranking</h2>
      <a href="#event-driven-spikes-in-the-overall-ranking">
        
      </a>
    </div>
    <p>The U.S. presidential inauguration of Donald Trump on January 20 produced noticeable traffic surges across crypto platforms, building on the elevated interest that followed the November 2024 election:</p><ul><li><p>Binance peaked at #95 on January 20.</p></li><li><p>Coinbase reached #121 the same day.</p></li><li><p>OKX peaked earlier, at #157 on January 19.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UrOr9uGNn8scOXn1qsuM9/5f8494db8300da2e93af34bfb3c82d9b/BLOG-3095_17_Binance_and_company-US-inauguration.png" />
          </figure><p>CoinGecko showed a clear downward trend in the Overall ranking, starting the year near the Top 200 and ending around #270. Binance and Coinbase remained relatively stable throughout 2025, while OKX showed clear growth beginning in September, rising toward the #150 range.</p>
    <div>
      <h2>Beyond the categories: notable spikes and seasonal patterns</h2>
      <a href="#beyond-the-categories-notable-spikes-and-seasonal-patterns">
        
      </a>
    </div>
    <p>Outside our primary categories, several services showed significant traffic spikes </p><p>tied to major events, cultural moments, and seasonal behaviors:</p><p><b>Crisis and real-time tracking</b></p><ul><li><p>FlightRadar24 spiked to #260 on June 13-15 during <a href="https://en.wikipedia.org/wiki/Iran%E2%80%93Israel_war"><u>Israeli airstrikes</u></a> on Iranian nuclear facilities, reflecting heightened global demand for real-time airspace disruption tracking.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/792yECKEvdNBjkcxil4MCO/b18044376cb44aabca7768f78bc2a980/BLOG-3095_18_FlightRadar.png" />
          </figure><p></p></li><li><p>NOAA Tides &amp; Currents reached #300 on October 27 as Hurricane Melissa — an extremely powerful Category 5 storm — intensified and threatened the Caribbean.</p></li></ul><p><b>Entertainment and media</b></p><ul><li><p>Spotify held a stable #16–19 range throughout 2025, similar to 2024. It performed strongest in September and November, spending most of those months at #16. (Our dataset ends December 2, so the impact of the December 3 Spotify Wrapped release was not captured.)</p></li><li><p>IMDb peaked on September 14, coinciding with the Primetime Emmy Awards.</p></li><li><p>Wikipedia typically ranked between #22 and #24 but peaked at #19 on July 5, the same day of this viral moment: a failed “<a href="https://en.wikipedia.org/wiki/July_2025_Japan_megaquake_prophecy"><u>July 5, 2025, disaster prophecy</u></a>” from a 1999 manga, which caused “Nothing happened in Japan” to trend #1 on China’s Sina Weibo.</p></li></ul><p><b>Sports</b></p><ul><li><p>The NBA reached #237 on April 19, the opening day of the NBA Playoffs, highlighted by a dramatic Nuggets-Clippers overtime game.</p></li><li><p>FIFA made a rare appearance in the Top 500, peaking at #373 on November 17 when FIFA and the U.S. State Department announced the FIFA Priority Appointment Scheduling System (<a href="https://inside.fifa.com/organisation/media-releases/world-cup-2026-ticket-holders-prioritised-visa-appointments-united-states"><u>FIFA PASS</u></a>) for World Cup 2026 ticket holders.</p></li></ul>
    <div>
      <h4>Developer tools</h4>
      <a href="#developer-tools">
        
      </a>
    </div>
    <ul><li><p>GitHub remained between #27 and #36 for most of the year, mirroring its 2024 performance and underscoring its status as core development infrastructure.</p></li></ul>
    <div>
      <h2>Insights by country/region</h2>
      <a href="#insights-by-country-region">
        
      </a>
    </div>
    <p>In our country and region-specific Popular Internet Services lists on the Year in Review <a href="https://radar.cloudflare.com/year-in-review/2025"><u>microsite</u></a>, we saw Google rank #1 in almost every location (Libya, dominated by Facebook, was a rare exception). In addition to our Overall list, this year we are sharing specific categories: Social Media, Generative AI, and Messaging. </p><p>Here are several other highlights worth noting from the Overall rankings in particular countries:</p><p><b>AI’s strength in emerging markets</b></p><p>ChatGPT performed unexpectedly well outside traditional tech hubs, reaching the Top 30 in countries such as Kyrgyzstan, Somalia, the United Arab Emirates, and Ethiopia  — evidence that AI adoption is spreading quickly in a wide range of markets.</p><p>Google Gemini also showed notable traction in emerging regions. It ranked highest in Ethiopia (#94), Sri Lanka (#105), Guatemala (#118), Rwanda (#122), and Thailand (#124), with similar patterns across Peru, Taiwan, Nepal, Vietnam, and Malawi (where Gemini ranked #128-137). </p>
    <div>
      <h4>Regional fragmentation in social platforms</h4>
      <a href="#regional-fragmentation-in-social-platforms">
        
      </a>
    </div>
    <p>Facebook held #1-2 in many countries, but regional players built strong footholds. Kwai reached #3 in Brazil and showed significant presence across Latin America and the Middle East. Instagram ranked highest in parts of Central Asia and the Gulf region, while TikTok dominated broad stretches of Latin America, Africa, and Southeast Asia.</p><p>Snapchat performed best in markets such as Iraq, Libya, Palestine, and Pakistan. LinkedIn showed a dual profile, ranking high in advanced economies like Australia and France as well as fast-growing markets including Bangladesh, Peru, and Saudi Arabia.</p>
    <div>
      <h4>Entertainment and messaging follow regional lines</h4>
      <a href="#entertainment-and-messaging-follow-regional-lines">
        
      </a>
    </div>
    <p>Netflix remained strongest in Latin America (#8-10 in multiple countries) but ranked lower in Asia and much of Europe, where Spotify performed best, especially in the Nordics and Southern Europe.</p><p>Messaging showed clear geographic divides. WhatsApp led across the Caribbean, Africa, and parts of Asia; Telegram ranked highest in Eastern Europe and Central Asia; Signal gained share in privacy-minded markets such as Ukraine and Switzerland; and Viber continued to dominate the Balkans.</p>
    <div>
      <h2>ChatGPT dominated everywhere, except Venezuela</h2>
      <a href="#chatgpt-dominated-everywhere-except-venezuela">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IZl2YISypOuqBOTXYAHJ4/d23f23e5927db4b752c90538e5591c3a/BLOG-3095_19_cloudflare-radar-dev_yir2025-internet-services-table_ve_20251203-20251210.png" />
          </figure><p>GenAI highlights by country/region include:</p><ul><li><p>ChatGPT ranked #1 in the Generative AI category across nearly every country, with one exception: Venezuela, where Google Gemini took the top spot.</p></li><li><p>Google Gemini secured #2 across Latin America (including Brazil, Mexico, and Colombia) and Southeast Asia (Thailand, Indonesia), reflecting Google's platform strength in mobile-first emerging markets.</p></li><li><p>Perplexity dominated as the #2 choice across Europe (Germany, France, Spain) and #3 in major English-speaking markets (U.S., UK, Australia), suggesting strong appeal among information-seeking users.</p></li><li><p>Claude showed selective strength at #3-5, performing best in Western Europe (Georgia, Switzerland) and developed markets like Germany, France or Japan, aligning with its enterprise and developer focus.</p></li><li><p>Lovable, the Swedish vibe coding platform, reached #10 in the GenAI category in one country: Angola. It reached #16 in Sweden and Slovenia, and #17 in Brazil.</p></li></ul><p>ChatGPT remains the clear global leader, yet the contest for second place is highly regional: Google Gemini in emerging markets, Perplexity across Europe, and Claude in more technologically advanced economies. It’s a reminder that the Internet contains a multitude of local behaviors shaped by culture, infrastructure, and economic context.</p>
    <div>
      <h2>2025 on the Internet: AI competition heated up as platforms saw fragmentation</h2>
      <a href="#2025-on-the-internet-ai-competition-heated-up-as-platforms-saw-fragmentation">
        
      </a>
    </div>
    <p>The Internet’s evolution in 2025 showed both stability and disruption. Google, Facebook, and Instagram remained dominant in our Overall rankings, but the year’s defining story was generative AI’s rapid maturation. ChatGPT climbed into the global Top 40, while Claude, Gemini, Perplexity, and DeepSeek became credible challengers in a category that barely existed three years ago. By late November, Gemini had secured the #2 spot in our GenAI rankings, directly contesting ChatGPT’s lead.</p><p>Social media continued to fragment: Instagram rose to #5 overall while X fell outside the Top 20, and emerging platforms like Kwai gained meaningful traction across Latin America, the Middle East, and Southeast Asia. In e-commerce, Shopee and Temu joined Amazon in the global top three, displacing long-established Chinese marketplaces. Cryptocurrency stabilized after earlier volatility, with traffic surging around events such as the U.S. presidential inauguration.</p><p>Global developments triggered coordinated spikes across news and other real-time information services, underscoring how quickly real-world events shape online behavior.</p><p>These rankings reflect continued data validation and methodological refinement by our team. We <a><u>welcome</u></a> your feedback and suggestions for categories to explore in future editions.</p><p><i>Thanks to data scientist Sabina Zejnilovic, who played a crucial role in gathering the Internet services data.</i></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Year in Review]]></category>
            <guid isPermaLink="false">7FGmUuKceINtevY1MTsBd1</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Online outages: Q3 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q3-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 28 Oct 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3 2025, we observed Internet disruptions around the world resulting from government directed shutdowns, power outages, cable cuts, a cyberattack, an earthquake, a fire, and technical problems, as well as several with unexplained causes. ]]></description>
            <content:encoded><![CDATA[ <p>In the third quarter, we observed Internet disruptions with a wide variety of known causes, as well as several with <a href="#no-definitive-cause"><u>no definitive or published cause</u></a>. Once again, we unfortunately saw a number of <a href="#government-directed-shutdowns"><u>government-directed shutdowns</u></a>, including exam-related shutdowns in <a href="#sudan"><u>Sudan</u></a>, <a href="#syria"><u>Syria</u></a>, and <a href="#iraq"><u>Iraq</u></a>. <a href="#fiber-optic-cable-damage"><u>Cable cuts</u></a>, both submarine and terrestrial, caused Internet outages, including one caused by a <a href="#texas-united-states"><u>stray bullet</u></a>. <a href="#gibraltar"><u>A rogue contractor</u></a>, among other events, caused power outages that impacted Internet connectivity. Damage from an <a href="#earthquake"><u>earthquake</u></a> and a <a href="#fire-causes-infrastructure-damage"><u>fire</u></a> caused service disruptions, as did a targeted <a href="#targeted-cyberattack"><u>cyberattack</u></a>. And a myriad of <a href="#technical-problems"><u>technical issues</u></a>, including issues with <a href="#china"><u>China’s Great Firewall</u></a>, resulted in traffic losses across multiple countries.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. These anomalies are detected through significant deviations from expected traffic patterns observed across our network. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric to include was generally made based on which better illustrated the impact of the disruption.</p>
    <div>
      <h2>Government-directed shutdowns</h2>
      <a href="#government-directed-shutdowns">
        
      </a>
    </div>
    
    <div>
      <h3>Sudan</h3>
      <a href="#sudan">
        
      </a>
    </div>
    <p>Regular drops in traffic from <a href="https://radar.cloudflare.com/sd"><u>Sudan</u></a> were observed between 12:00-15:00 UTC (14:00-17:00 local time) each day from July 7-10. Partial outages were observed at <a href="https://radar.cloudflare.com/traffic/as15706?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>Sudatel (AS15706)</u></a>, and near-complete outages at <a href="https://radar.cloudflare.com/traffic/as36998?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>SDN Mobitel (AS36998)</u></a> and <a href="https://radar.cloudflare.com/traffic/as36972?dateStart=2025-07-06&amp;dateEnd=2025-07-12#http-traffic"><u>MTN Sudan (AS36972)</u></a>. Similar drops were also seen in traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> from these impacted <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a>.</p><p>We have observed Sudan implementing government-directed Internet shutdowns in the past (<a href="https://blog.cloudflare.com/sudans-exam-related-internet-shutdowns/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/syria-sudan-algeria-exam-internet-shutdown/#sudan"><u>2022</u></a>), and given that the timing aligns with the last four days of <a href="https://www.suna-sd.net/posts/ministry-of-education-publishes-schedule-for-postponed-2024-secondary-school-certificate-examinations"><u>postponed 2024 secondary school certificate examinations</u></a>, in addition to fitting the pattern of short-duration disruptions repeating across multiple days, we believe that these drops in traffic were exam-related shutdowns as well. </p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>In our <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#syria"><u>second quarter post</u></a>, we covered the cellular connectivity-focused exam-related Internet shutdowns that <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> chose to implement this year in an effort to limit their impact. During the second quarter, the shutdowns associated with the “Basic Education Certificate” took place on June 21, 24, and 29 between 05:15 - 06:00 UTC (08:15 - 09:00 local time). Exams and associated shutdowns for the “Secondary Education Certificate” were scheduled to take place between July 12 and August 3, and during that period, we observed six additional Internet disruptions in Syria on July 12, 17, 21, 28, 31, and August 3, as shown in the graph below.</p><p>At the end of the exam period, the <a href="https://t.me/TrbyaGov/2352"><u>Syrian Ministry of Education posted a Telegram message</u></a> that was presumably intended to justify the shutdowns, and the focus on cellular connectivity. Translated, it said in part:</p><p>“<i>As part of its efforts to ensure the integrity of the examination process, and in coordination with relevant authorities, the Ministry of Education was able to uncover organized exam cheating networks in three examination centers in Lattakia Governorate. These networks used advanced electronic technologies and devices in their attempt to manipulate the exam process.</i></p><p><i>The network was seized in cooperation with the Lattakia Education Directorate, following close monitoring and detection of suspicious attempts. It was found that members of the network used small earphones, wireless communication devices, and mobile phones equipped with advanced transmission and reception technologies, which contradict educational values and violate the integrity of the examination process and the principle of justice.</i>”</p>
    <div>
      <h3>Venezuela </h3>
      <a href="#venezuela">
        
      </a>
    </div>
    <p>A slightly more unusual government directed shutdown took place in <a href="https://radar.cloudflare.com/ve"><u>Venezuela</u></a> on August 18 when Venezuelan provider <a href="https://radar.cloudflare.com/as22313"><u>SuperCable (AS22313)</u></a> ceased service. An <a href="https://x.com/vesinfiltro/status/1957601745321783746"><u>X post</u></a> from Venezuelan industry watcher <a href="https://vesinfiltro.org/"><u>VE sin Filtro</u></a> published a notification from <a href="https://conatel.gob.ve/"><u>CONATEL, the National Commission of Telecommunications in Venezuela</u></a>, that notified SuperCable that as of March 14, 2025, its authority to operate in the country had been revoked, and established a 60 day transition period so that users could find another provider. Another <a href="https://x.com/vesinfiltro/status/1957595268221632929"><u>X post from VE sin Filtro</u></a> shared an email that SuperCable subscribers received from the company announcing the end of the service and, and noted that half an hour after the email was sent, subscribers were left without Internet connectivity. Traffic began to fall at 15:00 UTC (11:00 local time), and was gone after 15:30 UTC (11:30 local time). Connectivity remained shut down through the end of the quarter.</p><p>Interestingly, we did not see a corresponding full loss of announced IP address space when traffic disappeared. However, such full losses did occur between <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-08-17&amp;dateEnd=2025-08-23"><u>August 19-21</u></a>, and again briefly on <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-09-14&amp;dateEnd=2025-09-20"><u>September 16</u></a>. The number of announced /24s (blocks of 256 IPv4 addresses) fell from 95 to 63 on <a href="https://radar.cloudflare.com/routing/as22313?dateStart=2025-09-24&amp;dateEnd=2025-09-30"><u>September 25</u></a>, and remained at that level through the end of the quarter.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>Similar to Syria, we covered the latest rounds of exam-related Internet shutdowns in <a href="https://radar.cloudflare.com/iq"><u>Iraq</u></a> in our <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#iraq"><u>second quarter blog post</u></a>. In that post, we noted that the shutdowns in the main part of the country ran until July 3 for <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid0a7VuMttRxdoGWwuaymy38LcZw9jscz3Dfxup4aUue2LeRBPuU2c7vnDsZKbgCkE2l"><u>preparatory school exams</u></a>, and through July 6 in the Kurdistan region. These can be seen in the graph below.</p><p>The <a href="https://pulse.internetsociety.org/en/shutdowns/exams-shutdown-kurdistan-iraq-25-august-2025/"><u>Kurdistan Regional Government in Iraq ordered Internet services to be suspended</u></a> on August 23 between 03:30 and 04:45 UTC (6:30-7:45 local time), and again every Saturday, Monday, and Wednesday until September 8 to prevent cheating on the <a href="https://www.kurdistan24.net/ckb/story/859388/%D9%88%DB%95%D8%B2%D8%A7%D8%B1%DB%95%D8%AA%DB%8C-%DA%AF%D9%88%D8%A7%D8%B3%D8%AA%D9%86%DB%95%D9%88%DB%95-%D9%84%DB%95-%DA%95%DB%86%DA%98%D8%A7%D9%86%DB%8C-%D8%AA%D8%A7%D9%82%DB%8C%DA%A9%D8%B1%D8%AF%D9%86%DB%95%D9%88%DB%95%DA%A9%D8%A7%D9%86%DB%8C-%D9%BE%DB%86%D9%84%DB%8C-12-%D9%87%DB%8E%DA%B5%DB%95%DA%A9%D8%A7%D9%86%DB%8C-%D8%A6%DB%8C%D9%86%D8%AA%DB%95%D8%B1%D9%86%DB%8E%D8%AA-%DA%95%D8%A7%D8%AF%DB%95%DA%AF%DB%8C%D8%B1%DB%8E%D9%86"><u>second round of grade 12 exams</u></a>. Similar to last quarter, <a href="https://radar.cloudflare.com/as206206"><u>KNET (AS206206)</u></a>, <a href="https://radar.cloudflare.com/as21277"><u>Newroz Telecom (AS21277)</u></a>, <a href="https://radar.cloudflare.com/as48492"><u>IQ Online (AS48492)</u></a>, and <a href="https://radar.cloudflare.com/as59625"><u>KorekTel (AS59625)</u></a> were impacted by the ordered shutdowns.</p><p>In the main part of the country, starting on August 26, the latest round of <a href="https://pulse.internetsociety.org/en/shutdowns/internet-shutdown-for-iraq-exam-26-august-2025/"><u>Internet shutdowns for high school exams</u></a> began, scheduled through September 13, taking place between 03:00-05:00 UTC (06:00-08:00 local time). Networks impacted by these shutdowns included <a href="https://radar.cloudflare.com/traffic/as199739"><u>Earthlink (AS199739)</u></a>, <a href="https://radar.cloudflare.com/traffic/as51684"><u>Asiacell (AS51684)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59588"><u>Zainas (AS59588)</u></a>, <a href="https://radar.cloudflare.com/traffic/as58322"><u>Halasat (AS58322)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as203214"><u>HulumTele (AS203214)</u></a>.</p>
    <div>
      <h3>Afghanistan</h3>
      <a href="#afghanistan">
        
      </a>
    </div>
    <p>In mid-September, the Taliban <a href="https://amu.tv/200798/"><u>ordered the shutdown of fiber optic Internet connectivity</u></a> in multiple provinces across <a href="https://radar.cloudflare.com/af"><u>Afghanistan</u></a>, as part of a drive to “prevent immorality”. It was the first such ban issued since the Taliban took full control of the country in August 2021. As many as <a href="https://amu.tv/200798/"><u>15 provinces</u></a> experienced shutdowns, and these regional shutdowns <a href="https://www.afghanstudiescenter.org/taliban-internet-shutdown-blocks-thousands-of-afghan-students-from-online-classes/"><u>blocked</u></a> Afghani students from attending online classes, <a href="https://theweek.com/world-news/afghanistan-taliban-high-speed-internet-women-education"><u>impacted</u></a> commerce and banking, and <a href="https://www.dw.com/en/afghanistan-whats-at-stake-as-taliban-cut-internet/a-74043564"><u>limited access</u></a> to government agencies and institutions such as passport and registration offices, customs offices.</p><p>Less than two weeks later, just after 11:30 UTC (16:00 local time) on Monday, September 29, 2025, subscribers of wired Internet providers in <a href="https://radar.cloudflare.com/traffic/af"><u>Afghanistan</u></a> experienced a <a href="https://x.com/CloudflareRadar/status/1972649804821057727"><u>brief service interruption</u></a>, lasting until just before 12:00 UTC (16:30 local time). Mobile providers <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=&amp;dt=1d&amp;asn=as131284&amp;compAsn=as38742&amp;timeCompare=2025-09-21"><u>Afghan Wireless (AS38472) and Etisalat (AS131284)</u></a> remained available during that period. However, just after 12:30 UTC (17:00 local time), the Internet was <a href="https://x.com/CloudflareRadar/status/1972682041759076637"><u>completely shut down</u></a>, taking the country completely offline.</p><p>These shutdowns are reviewed in more detail in our September 30 blog post, <a href="https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/"><i><u>Nationwide Internet shutdown in Afghanistan extends localized disruptions</u></i></a>. Connectivity was restored around 11:45 UTC (16:15 local time) on October 1.</p>
    <div>
      <h2>Fiber optic cable damage</h2>
      <a href="#fiber-optic-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Dominican Republic</h3>
      <a href="#dominican-republic">
        
      </a>
    </div>
    <p>On July 7, a <a href="https://x.com/ClaroRD/status/1942286349006168091"><u>post on X from Claro</u></a> alerted subscribers to a service disruption caused by damage to two fiber optic cables. According to a <a href="https://x.com/ClaroRD/status/1942368212160516305"><u>subsequent post</u></a>, one was damaged by work being done by <a href="http://coraavega.gob.do"><u>CORAAVEGA</u></a> (La Vega Water And Sewerage Corporation) and the other by work being done by the Dominican Electric Transmission Company. As a result of the damage, traffic from <a href="https://radar.cloudflare.com/as6400"><u>Claro (AS6400)</u></a> began to drop just before 16:00 UTC (12:00 local time), falling just over two-thirds compared to the prior week. Claro’s technicians were able to quickly locate the faults and repair them, with traffic recovering around 18:00 UTC (14:00 local time).</p>
    <div>
      <h3>Angola</h3>
      <a href="#angola">
        
      </a>
    </div>
    <p>Between 12:45-15:45 UTC (13:45-16:45 local time) on July 19, users in <a href="https://radar.cloudflare.com/ao"><u>Angola</u></a> experienced an Internet disruption, with <a href="https://radar.cloudflare.com/as37119"><u>Unitel Angola (AS37119)</u></a> experiencing <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=as37119&amp;dt=2025-07-19_2025-07-19&amp;timeCompare=2025-07-12#query"><u>as much as a 95% drop in traffic</u></a> as compared to the previous week, and <a href="https://radar.cloudflare.com/traffic/as327932?dateStart=2025-07-19&amp;dateEnd=2025-07-19"><u>Connectis (AS327932)</u></a> suffering a complete outage. According to an <a href="https://x.com/unitelao/status/1946644209370358120"><u>X post from Unitel Angola</u></a>, it “<i>was caused by a disruption at our partner Angola Cables, resulting from public road works that affected the national fiber optic interconnections.</i>”</p><p>However, the timing of the disruption coincided with protests over the rise in diesel fuel prices, and local non-governmental organizations <a href="https://www.verangola.net/va/en/072025/Society/45242/Angolan-NGOs-consider-internet-shutdown-during-Saturday%27s-protests-a-dictatorial-measure.htm"><u>disputed</u></a> Unitel Angola’s explanation, <a href="https://myemail.constantcontact.com/STATEMENT-OF-REPUDIATION--ON-THE-INTERNET-SHUTDOWN-DURING-THE-DEMONSTRATIONS-OF-JULY-19-.html"><u>claiming</u></a> that it was actually due to a government-directed Internet shutdown. Multiple Angolan network providers experienced a drop in announced IP address space during the period the Internet disruption occurred, and analysis of routing information for these networks finds that they share <a href="https://radar.cloudflare.com/as37468"><u>Angola Cables (AS37468)</u></a> as an upstream provider, lending some credence to the explanation from Unitel Angola.</p>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> is no stranger to Internet disruptions caused by damage to both terrestrial and submarine cables, experiencing such problems during the <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/#haiti"><u>first</u></a> and <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#digicel-haiti"><u>second</u></a> quarters of 2025, as well as <a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary/#digicel-haiti"><u>first</u></a>, <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/#haiti"><u>second</u></a>, and <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#haiti"><u>third</u></a> quarters of 2024. The most recent such disruption occurred on August 26, when they experienced two different cuts on their fiber optic infrastructure, <a href="https://x.com/jpbrun30/status/1960437559558869220"><u>according to an X post</u></a> from the company’s Director General. Traffic <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as27653&amp;dt=2025-08-26_2025-08-26&amp;timeCompare=2025-08-19#result"><u>dropped by approximately 80%</u></a> during the disruption, which lasted from 19:30-23:00 UTC (15:30-19:00 UTC).</p>
    <div>
      <h3>Pakistan &amp; United Arab Emirates</h3>
      <a href="#pakistan-united-arab-emirates">
        
      </a>
    </div>
    <p>Telegeography’s <a href="https://www.submarinecablemap.com/"><u>Submarine Cable Map</u></a> shows that the Red Sea has a high density of submarine cables that carry data between Europe, Africa, and Asia. Cuts to these cables <a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/"><u>can significantly impact connectivity</u></a>, ranging from increased latency on international connections to complete outages. The impacts may only affect a single country, or they may disrupt multiple countries connected to a damaged cable. On September 6, <a href="https://radar.cloudflare.com/as17557"><u>Pakistan Telecom (AS17557)</u></a> <a href="https://x.com/PTCLOfficial/status/1964203180876521559"><u>posted a message on X</u></a> that stated “<i>We would like to inform that submarine cable cuts have occurred in Saudi waters near Jeddah, impacting partial bandwidth capacity on </i><a href="https://www.submarinecablemap.com/submarine-cable/seamewe-4"><i><u>SMW4</u></i></a><i> and </i><a href="https://www.submarinecablemap.com/submarine-cable/imewe"><i><u>IMEWE</u></i></a><i> systems. As a result, internet users in Pakistan may experience some service degradation during peak hours.</i>” (Initial reporting that the cable cuts occurred near Jeddah were apparently incorrect, as the <a href="https://www.linkedin.com/feed/update/urn:li:activity:7379509758598406144?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7379509758598406144%2C7379684775701245952%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287379684775701245952%2Curn%3Ali%3Aactivity%3A7379509758598406144%29"><u>damage occurred in Yemeni waters</u></a>.)</p><p>Looking at the impact in Pakistan, we observed traffic drop by 25-30% in Sindh and Punjab between 12:00-20:00 UTC (17:00 - 01:00 local time).</p><p>In the <a href="https://radar.cloudflare.com/ae"><u>United Arab Emirates</u></a>, Etisalat alerted customers via <a href="https://x.com/eAndUAE/status/1964655864117346578"><u>a post on X</u></a> that they “<i>may experience slowness in data services due to an interruption in the international submarine cables.</i>” Between 11:00-22:00 UTC (15:00-02:00 local time) on September 6, traffic from <a href="https://radar.cloudflare.com/as8966"><u>AS8966 (Etisalat)</u></a> <a href="https://x.com/CloudflareRadar/status/1964727360764469339"><u>dropped as much as 28%</u></a>.</p><p>Also in the UAE, service provider <a href="https://radar.cloudflare.com/as15802"><u>du (AS15802)</u></a> told their customers via a post on X that “<i>You may experience some slowness in our data services due to an International submarine cable cut.</i>” This slowness is visible in Radar’s Internet quality metrics for the network between 11:00-22:00 UTC (15:00-02:00 local time) on September 6, with <a href="https://radar.cloudflare.com/quality/as15802?dateStart=2025-09-06&amp;dateEnd=2025-09-06#bandwidth"><u>median bandwidth</u></a> dropping by more than half, from 25 Mbps to as low as 9.8 Mbps, and <a href="https://radar.cloudflare.com/quality/as15802?dateStart=2025-09-06&amp;dateEnd=2025-09-06#latency"><u>median latency</u></a> doubling from 30 ms to over 60 ms.</p><p>The graphs below provide <a href="https://x.com/CloudflareRadar/status/1964817678541205758"><u>another view of the impact</u></a> of the cable cuts, based on Cloudflare network probes between New Delhi (del-c) to London (lhr-a) and Bombay (bom-c) to Frankfurt (fra-a). For the former pair of data centers, mean latency grew by approximately 20%, and for the latter pair, by approximately 30%, starting around 23:00 UTC on September 5. (The stable latency line at the bottom of both graphs represents probes going over the Cloudflare backbone, which was not impacted by the cable cuts.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MqZmljASqeJlMQO4UFUDw/eb067e32492eecb151eb3d8f4db89bf4/image24.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5C9XAWuaBwASAibBbN5HV4/778c2ad24adaea37f3e0e04c59250fc3/image32.png" />
          </figure>
    <div>
      <h3>Texas, United States</h3>
      <a href="#texas-united-states">
        
      </a>
    </div>
    <p>Fiber optic cables are frequently damaged by errant ship anchors (submarine) or construction equipment (terrestrial), but on September 26, <a href="https://www.wfaa.com/article/tech/stray-bullet-caused-major-spectrum-outages-north-texas/287-e72cdefc-6a0a-4a1e-b181-6d02bc60b732"><u>a stray bullet damaged a cable</u></a> in the Dallas, Texas area, disrupting Internet connectivity for <a href="https://radar.cloudflare.com/as11427"><u>Spectrum (AS11427)</u></a> customers. Spectrum <a href="https://x.com/Ask_Spectrum/status/1971651914283851975"><u>acknowledged the service interruption</u></a> in a post on X, followed by <a href="https://x.com/Ask_Spectrum/status/1971722840279077229"><u>another post</u></a> four and a half hours later stating that the issue had been resolved. Although neither post cited the bullet as the cause of the disruption, <a href="https://www.wfaa.com/article/tech/stray-bullet-caused-major-spectrum-outages-north-texas/287-e72cdefc-6a0a-4a1e-b181-6d02bc60b732"><u>news reports</u></a> attributed the claim to a Spectrum spokesperson. Overall, the disruption was fairly nominal, lasting for just two hours between 18:00-20:00 UTC (13:00-15:00 local time), with traffic dropping less than 25% as compared to the prior week.</p>
    <div>
      <h3>South Africa</h3>
      <a href="#south-africa">
        
      </a>
    </div>
    <p>“Major cable breaks” disrupted Internet connectivity for customers of <a href="https://radar.cloudflare.com/as37457"><u>Telkom (AS37457)</u></a> in <a href="https://radar.cloudflare.com/za"><u>South Africa</u></a> on September 27. Although Telkom acknowledged the <a href="https://x.com/TelkomZA/status/1971901592413913294"><u>initial service disruption</u></a> and its <a href="https://x.com/TelkomZA/status/1971921589316080109"><u>subsequent resolution</u></a> in posts on X, it didn’t provide any information about the cause in these posts. However, it apparently later <a href="https://mybroadband.co.za/news/cellular/612245-telkom-network-suffers-national-outage.html"><u>issued a statement</u></a>, stating “<i>Telkom confirms that mobile voice and data services, which were disrupted earlier on Saturday due to major cable breaks, have now been fully restored nationwide.</i>” The disruption lasted six hours, from 08:00-14:00 UTC (10:00-16:00 local time), with traffic dropping as much as 50% as compared to the previous week.</p>
    <div>
      <h2>Power outages cause Internet disruptions</h2>
      <a href="#power-outages-cause-internet-disruptions">
        
      </a>
    </div>
    
    <div>
      <h3>Tanzania</h3>
      <a href="#tanzania">
        
      </a>
    </div>
    <p>A reported <a href="https://x.com/airtel_tanzania/status/1940072844446359845"><u>power outage at one of Airtel Tanzania's data centers</u></a> on July 1 resulted in a multi-hour disruption in connectivity for its mobile customers. The service interruption occurred between 11:30-18:00 UTC (14:30-21:00 local time), with traffic dropping on <a href="https://radar.cloudflare.com/as37133"><u>Airtel Tanzania (AS37133)</u></a> by as much as 40% as compared to the previous week.</p>
    <div>
      <h3>Czech Republic</h3>
      <a href="#czech-republic">
        
      </a>
    </div>
    <p>According to the Industry and Trade Ministry in the <a href="https://radar.cloudflare.com/cz"><u>Czech Republic</u></a>, <a href="https://www.reuters.com/world/europe/czech-republic-hit-by-major-power-outage-2025-07-04/"><u>a fallen power cable caused a widespread power outage</u></a> on July 4. This power outage impacted Internet connectivity within the country, with <a href="https://x.com/CloudflareRadar/status/1941237676730089797"><u>traffic dropping</u></a> by as much as 32%. Traffic fell just after the power outage began at 10:00 UTC (12:00 local time), and although it was <a href="https://www.reuters.com/world/europe/czech-republic-hit-by-major-power-outage-2025-07-04/"><u>“nearly fully resolved”</u></a> by 16:00 UTC (18:00 local time), traffic did not return to expected levels until closer to 20:00 UTC (22:00 local time). This trailing traffic recovery aligns with a <a href="https://www.expats.cz/czech-news/article/czechia-picks-up-the-pieces-after-power-outage-why-it-happened-and-what-the-future-holds"><u>published report</u></a> that noted “<i>While ČEPS, the national transmission system operator, restored full grid functionality by mid-afternoon, tens of thousands remained without electricity into the evening.</i>”</p>
    <div>
      <h3>St. Vincent and the Grenadines</h3>
      <a href="#st-vincent-and-the-grenadines">
        
      </a>
    </div>
    <p>On <a href="https://radar.cloudflare.com/vc"><u>St. Vincent and the Grenadines</u></a>, the St Vincent Electricity Services Limited (VINLEC) <a href="https://www.facebook.com/VINLECSVG/posts/st-vincent-electricity-services-limited-vinlec-experienced-a-system-failure-at-a/1308214567765820/"><u>stated in a Facebook post</u></a> that a “system failure” caused a power outage that affected customers on mainland St. Vincent. According to <a href="https://www.vinlec.com/"><u>VINLEC</u></a>, the system failed at approximately 11:30 local time on August 16 (03:30 UTC on August 17), and power was restored to all customers just after 04:00 local time on August 17 (08:00 UTC). During the four-hour power outage, which also disrupted Internet connectivity, traffic dropped by as much as 80% below expected levels.</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>In <a href="https://radar.cloudflare.com/cw"><u>Curaçao</u></a>, a series of Facebook posts from <a href="https://www.aqualectra.com/"><u>Aqualectra</u></a>, the island’s water and power company, <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid02wBV7CqovjuSTX52NCpYVqKAjzGkgoAurCUVnrVDCqKEA8hNpyRoh96SaGTUQ7C8Ll"><u>confirmed</u></a> that there was a power outage, and provided updates on the <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid017xNQW9sbLnmXEHo3y8mU22cbKtdzYXoKfVL7fFJ1pomMTHitty5wg5ZjN1YnMDgl"><u>progress</u></a> towards <a href="https://www.facebook.com/AqualectraUtilityCuracao/posts/pfbid021MAkFoaSVZiN8inieUxryV3ACVhZy1bjkSmp5MgG5PgceSWZ1X6i6SJAD7z1gM32l"><u>restoration</u></a>. The impact of the power outage to Internet connectivity was visible in traffic disruptions across several Internet service providers, including <a href="https://radar.cloudflare.com/as52233"><u>Flow (AS52233)</u></a> and <a href="https://radar.cloudflare.com/as11081"><u>UTS (AS11081)</u></a>. The observed disruptions lasted for most of the day, with traffic dropping around 06:45 UTC (02:45 local time) and recovering to expected levels around 23:45 UTC (19:45 local time). During the disruption, <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lxf4cn53cv2p"><u>the country's traffic dropped by over 80%</u></a> as compared to the previous week, with Flow experiencing a near complete outage.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>Wide-scale power outages occur all too frequently in <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>, and when power is lost, Internet connectivity follows. We have <a href="https://www.google.com/search?q=cuba+power+outage+site%3Ablog.cloudflare.com"><u>covered many such events in this series of blog posts</u></a> over the last several years, and the latest occurred on September 10. That morning, <a href="https://x.com/OSDE_UNE/status/1965770929675608214"><u>an X post</u></a> from the <a href="https://www.unionelectrica.cu/"><u>Unión Eléctrica de Cuba</u></a> reported the collapse of the national electric power system at 09:14 local time (13:14 UTC) following the unexpected shutdown of the <a href="https://www.gem.wiki/Antonio_Guiteras_Thermoelectric_Power_Plant_(CTE)"><u>Antonio Guiteras Thermoelectric Power Plant (CTE)</u></a>. The island’s Internet traffic dropped by nearly 60% (as compared to expected levels) almost immediately, and remained lower than normal for over a day, returning to expected levels around 17:15 UTC on September 11 (13:15 local time) when the Ministerio de Energía y Minas de Cuba <a href="https://x.com/EnergiaMinasCub/status/1966191043952410754"><u>posted on X</u></a> that the national electric system had been restored.</p>
    <div>
      <h3>Gibraltar</h3>
      <a href="#gibraltar">
        
      </a>
    </div>
    <p>A contractor cutting through three high voltage cables caused a nationwide power outage in <a href="https://radar.cloudflare.com/gi"><u>Gibraltar</u></a> on September 16, according to a <a href="https://www.facebook.com/gibraltargovernment/posts/pfbid0ZDLtEtVEYwSgKGn6J3eWgvneMo1mhB6cTrhHpTgLKhguL9ZqB5qfT4ijrUDsqFhrl"><u>Facebook post from the Gibraltar government</u></a>. This power outage resulted in a disruption to Internet traffic between 11:15-18:30 UTC (13:15-20:30 local time), <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lyykvuty7c2s"><u>falling as low as 80%</u></a> below the previous week.</p>
    <div>
      <h2>Earthquake</h2>
      <a href="#earthquake">
        
      </a>
    </div>
    
    <div>
      <h3>Kamchatka Peninsula, Russia</h3>
      <a href="#kamchatka-peninsula-russia">
        
      </a>
    </div>
    <p>A <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us6000qw60/executive"><u>magnitude 8.8 earthquake</u></a> struck the <a href="https://radar.cloudflare.com/traffic/2125072"><u>Kamchatka Peninsula</u></a> in <a href="https://radar.cloudflare.com/ru"><u>Russia</u></a> at 23:24 UTC on July 29 (11:24 local time on July 30), and was powerful enough to trigger <a href="https://www.reuters.com/business/environment/huge-quake-russia-triggers-tsunami-warnings-around-pacific-2025-07-30/"><u>tsunami warnings</u></a> for <a href="https://radar.cloudflare.com/jp"><u>Japan</u></a>, <a href="https://radar.cloudflare.com/traffic/5879092"><u>Alaska</u></a>, <a href="https://radar.cloudflare.com/traffic/5855797"><u>Hawaii</u></a>, <a href="https://radar.cloudflare.com/gu"><u>Guam</u></a>, and other Russian regions. The graphs below show that there was an immediate impact to Internet traffic across several networks in the region, including <a href="https://radar.cloudflare.com/as12389"><u>Rostelecom (AS12389)</u></a> and <a href="https://radar.cloudflare.com/as42742"><u>InterkamService (AS42742)</u></a>, where traffic dropped by 75% or more. While traffic started to recover almost immediately across both providers, traffic on Rostelecom approached expected levels much more quickly than on InterkamService.</p>
    <div>
      <h2>Targeted cyberattack</h2>
      <a href="#targeted-cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Yemen</h3>
      <a href="#yemen">
        
      </a>
    </div>
    <p>A <a href="https://www.yemenmonitor.com/en/Details/ArtMID/908/ArticleID/147420"><u>cyberattack targeting Houthi-controlled YemenNet</u></a> <a href="https://radar.cloudflare.com/as30873"><u>(AS30873)</u></a> on August 11 briefly disrupted connectivity across the network in <a href="https://radar.cloudflare.com/ye"><u>Yemen</u></a>. A significant drop in traffic occurred at around 14:15 UTC (17:15 local time), recovering by 15:00 UTC (18:00 local time). This observed drop in traffic aligns with the reported timing and duration of the attack, which was focused on YemenNet’s ADSL infrastructure.</p><p>The attack also apparently impacted YemenNet’s routing, as announced IPv4 address space began to decline as the attack commenced. Although the attack ended within an hour after it started, announced address space remained depressed for approximately an additional hour, reaching as low as 510 /24s (blocks of 256 IPv4 addresses) being announced, down from a “steady state” of 870 /24s.</p>
    <div>
      <h2>Fire causes infrastructure damage</h2>
      <a href="#fire-causes-infrastructure-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Egypt</h3>
      <a href="#egypt">
        
      </a>
    </div>
    <p>A <a href="https://english.alarabiya.net/News/north-africa/2025/07/07/a-fire-at-a-telecom-company-in-cairo-injures-14-and-temporarily-disrupts-service"><u>fire at the Ramses Central Exchange in Cairo, Egypt</u></a> on July 7 disrupted telecommunications services for a number of providers with infrastructure in the facility. The fire broke out in a Telecom Egypt equipment room, and impacted connectivity across multiple providers, including <a href="https://radar.cloudflare.com/as36992"><u>Etisalat (AS36992)</u></a>, <a href="https://radar.cloudflare.com/as37069"><u>Mobinil (AS37069)</u></a>, <a href="https://radar.cloudflare.com/as24863"><u>Orange Egypt (AS24863)</u></a>, and <a href="https://radar.cloudflare.com/as24835"><u>Vodafone Egypt (AS24835)</u></a>. Internet traffic across these providers initially dropped at 14:30 UTC (17:30 local time). Recovery to expected levels varied across the providers, with Etisalat recovering by July 9, Vodafone and Mobinil by July 10, and Orange Egypt on July 11.</p><p>On July 10, Telecom Egypt <a href="https://www.zawya.com/en/economy/north-africa/telecom-egypt-restores-services-after-ramses-central-fire-s2msr114"><u>announced</u></a> that services affected by the fire had been restored, after operations were transferred to alternative exchanges.</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Starlink</h3>
      <a href="#starlink">
        
      </a>
    </div>
    <p>Global satellite Internet service provider <a href="https://radar.cloudflare.com/as14593"><u>Starlink (AS14593)</u></a> acknowledged a July 24 network outage through a <a href="https://x.com/Starlink/status/1948474586699571518"><u>post on X</u></a>. The Vice President of Network Engineering at SpaceX explained, in a <a href="https://x.com/michaelnicollsx/status/1948509258024452488"><u>subsequent X post</u></a>, that “<i>The outage was due to failure of key internal software services that operate the core network.</i>”</p><p>Traffic initially dropped around 19:15 UTC, and the disruption lasted approximately 2.5 hours. The impact of the Starlink outage was particularly noticeable in countries including <a href="https://x.com/CloudflareRadar/status/1948491791574986771"><u>Yemen and Sudan</u></a>, where traffic dropped by approximately 50%, as well as in <a href="https://x.com/CloudflareRadar/status/1948497510235820236"><u>Zimbabwe, South Sudan, and Chad</u></a>.</p>
    <div>
      <h3>China</h3>
      <a href="#china">
        
      </a>
    </div>
    <p>At around 16:30 UTC on August 19 (00:30 local time on August 20), we observed an anomalous 25% drop in <a href="https://radar.cloudflare.com/cn"><u>China’s</u></a> Internet traffic. Our analysis of related metrics found that this disruption caused a drop in the share of IPv4 traffic, as well as a spike in the share of HTTP traffic (meaning that HTTPS traffic share had fallen), as shown in the graphs below.</p><p>Further analysis also found the share of <a href="https://blog.cloudflare.com/tcp-resets-timeouts/#sources-of-anomalous-connections"><u>TCP connections terminated in the Post SYN stage</u></a> doubled during the observed outage, from 39% to 78%, as shown below. The cause of these unusual observations was ultimately uncovered by a <a href="https://gfw.report/blog/gfw_unconditional_rst_20250820/en/"><u>Great Firewall Report blog post</u></a>, which stated, in part: “<i>Between approximately 00:34 and 01:48 (Beijing Time, UTC+8) on August 20, 2025, the Great Firewall of China (GFW) exhibited anomalous behavior by unconditionally injecting forged TCP RST+ACK packets to disrupt all connections on TCP port 443. This incident caused massive disruption of the Internet connections between China and the rest of the world. … The responsible device does not match the fingerprints of any known GFW devices, suggesting that </i><b><i>the incident was caused by either a new GFW device or a known device operating in a novel or misconfigured state</i></b><i>.</i>” This explanation is consistent with the anomalies visible in the Radar graphs.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Subscribers of <a href="https://radar.cloudflare.com/as23674"><u>Nayatel (AS23674)</u></a> experienced an approximately 90 minute disruption to Internet connectivity on September 24, due to a <a href="https://x.com/nayatelpk/status/1970791157404954809"><u>reported outage at an upstream provider</u></a>. Traffic dropped as much as 57% between around 09:15-10:45 UTC (14:15-15:45 local). <a href="https://radar.cloudflare.com/as38193"><u>Transworld (AS38193)</u></a> is one of several <a href="https://radar.cloudflare.com/routing/as23674?dateStart=2025-09-24&amp;dateEnd=2025-09-24#connectivity"><u>upstream providers</u></a> to Nayatel, and a more significant drop in traffic is visible for that network, lasting from around 09:15-12:15 UTC (14:15-17:15 local time). The Nayatel disruption was likely less significant than the one seen at Transworld because Transworld is upstream of only a portion of the prefixes originated by Nayatel — traffic from other Nayatel prefixes was carried by other providers that remained available.</p>
    <div>
      <h2>No definitive cause</h2>
      <a href="#no-definitive-cause">
        
      </a>
    </div>
    
    <div>
      <h3>Iran</h3>
      <a href="#iran">
        
      </a>
    </div>
    <p>Several weeks after experiencing a <a href="https://blog.cloudflare.com/q2-2025-internet-disruption-summary/#iran"><u>full Internet shutdown</u></a>, <a href="https://radar.cloudflare.com/ir"><u>Iran</u></a> again experienced a sudden drop in Internet traffic around 21:00 UTC on July 5 (00:30 local time on July 6), with <a href="https://x.com/CloudflareRadar/status/1941640046005617038"><u>traffic falling 80%</u></a> as compared to the prior week. While most of the “unknown” disruptions covered in this series of posts are observed but have no associated acknowledgement or explanation, this disruption had multiple competing explanations.</p><p>A <a href="https://www.iranintl.com/en/202507067645"><u>published report</u></a> noted “<i>IRNA, Iran’s official news agency, cited the state-run Telecommunications Infrastructure Company, reporting a national-level disruption in international connectivity that affected most internet service providers Saturday night. Yet government officials have not publicly addressed the cause.</i>” However, posts from civil society groups that follow Internet connectivity in Iran (<a href="https://github.com/net4people/bbs/issues/497"><u>net4people</u></a>, <a href="https://x.com/filterbaan/status/1941628644125724793"><u>FilterWatch</u></a>) suggested that the disruption was again due to an intentional shutdown. And a <a href="https://x.com/filterbaan/status/1941628644125724793"><u>post thread on X</u></a> referenced, and disputed, a claim that the disruption was due to a DDoS attack. Unfortunately, no definitive root cause for this disruption could be found.</p>
    <div>
      <h3>Colombia</h3>
      <a href="#colombia">
        
      </a>
    </div>
    <p>Customers of Claro Colombia experienced an Internet disruption that lasted just over 30 minutes on August 6, with <a href="https://x.com/CloudflareRadar/status/1953168943423864954"><u>traffic falling two-thirds or more</u></a> as compared to the prior week between 16:45 - 17:20 UTC. The disruption affected multiple ASNs owned by Claro, including <a href="https://radar.cloudflare.com/as10620"><u>AS10620</u></a>, <a href="https://radar.cloudflare.com/as14080"><u>AS14080</u></a>, and <a href="https://radar.cloudflare.com/as26611"><u>AS26611</u></a>. (The Telmex Colombia and Comcel names shown in the graphs below are historical – Telmex and Comcel <a href="https://es.wikipedia.org/wiki/Claro_(Colombia)"><u>merged in 2012</u></a> and have operated under the Claro brand since then.) Claro did not acknowledge the disruption on social media, nor did it provide any explanation for it.</p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>A near-complete outage at <a href="https://radar.cloudflare.com/pk"><u>Pakistani</u></a> backbone provider <a href="https://radar.cloudflare.com/as17557"><u>PTCL (AS17557)</u></a> caused traffic from the network provider to drop 90% at 16:10 UTC (21:10 local time) on August 19. PTCL acknowledged the issue in a <a href="https://x.com/PTCLOfficial/status/1957873019084255347"><u>post on X</u></a>, noting “<i>We are currently facing data connectivity challenges on our PTCL and Ufone services.</i>” Although they <a href="https://x.com/PTCLOfficial/status/1957977425377391076"><u>published a subsequent post</u></a> several hours later after service was restored, they did not provide any additional information about the cause of the outage. However, <a href="https://bloompakistan.com/nationwide-internet-disruption-hits-pakistan-ptcl-ufone-nayatel-services-severely-affected/"><u>one published report</u></a> claimed “<i>The disruption was primarily caused by a technical fault in PTCL’s fiber optic infrastructure.</i>” while <a href="https://bloompakistan.com/nationwide-internet-disruption-hits-pakistan-ptcl-ufone-nayatel-services-severely-affected/"><u>another report</u></a> claimed “<i>According to industry sources, the internet disruption in Pakistan may be connected to a technical fault in the fiber optic backbone or issues with main internet providers responsible for international online traffic.</i></p><p>Interestingly, <a href="https://radar.cloudflare.com/dns/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19#dns-query-volume"><u>traffic from PTCL to Cloudflare’s 1.1.1.1 DNS resolver</u></a> spiked as the outage began, and the <a href="https://radar.cloudflare.com/dns/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19#dns-transport-protocol"><u>share of requests made over UDP</u></a> grew from 94% to 99%. In addition, <a href="https://radar.cloudflare.com/routing/as17557?dateStart=2025-08-19&amp;dateEnd=2025-08-19"><u>routing data</u></a> shows that there was also a small drop in announced IPv4 address space coincident with the outage. However, these additional observations do not necessarily confirm a “technical fault in PTCL’s fiber optic infrastructure” as the ultimate cause of the disruption.</p>
    <div>
      <h3>South Africa</h3>
      <a href="#south-africa">
        
      </a>
    </div>
    <p>To their credit, <a href="https://radar.cloudflare.com/za"><u>South African</u></a> provider <a href="https://radar.cloudflare.com/as37053"><u>RSAWEB (AS37053)</u></a> <a href="https://netnotice.rsaweb.co.za/cmfe4mzqc0001ngqrbyfq0waj"><u>quickly acknowledged an issue</u></a> with their FTTx and Enterprise connectivity on September 10, but neither their initial post nor subsequent updates provided any information on the cause of the problem. Whatever the cause, it resulted in a near-complete loss of Internet traffic from RSAWEB between 15:00 and 16:30 UTC (17:00 - 18:30 local time).</p>Routing data also shows a loss of just two announced /24 address blocks concurrent with the outage, dropping from 470 to 468. Unless all of RSAWEB’s outbound traffic was flowing through this limited amount of IP address space, it seems unusual that the withdrawal of just 512 IPv4 addresses from the=e routing table would have such a significant impact on the network’s traffic.<p></p>
    <div>
      <h3>SpaceX Starlink</h3>
      <a href="#spacex-starlink">
        
      </a>
    </div>
    <p>After experiencing a <a href="#starlink"><u>brief disruption in July</u></a> due to a software failure, <a href="https://radar.cloudflare.com/as14593"><u>Starlink (AS14593)</u></a> suffered another short disruption between 04:00-05:00 UTC on September 15. Although Starlink generally acknowledges disruptions to their global network on <a href="https://x.com/Starlink"><u>their X account</u></a>, and often providing a root cause, in this case they <a href="https://www.datacenterdynamics.com/en/news/starlink-suffers-brief-monday-outage-globally/"><u>apparently published an acknowledgement</u></a> on X, but deleted it after the issue was resolved. In addition to the drop in traffic, we observed a concurrent drop in announced IPv4 address space and spike in BGP announcements (likely withdrawals), suggesting that the disruption may have been caused by a network-related issue.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The recent <a href="https://blog.cloudflare.com/new-regional-internet-traffic-and-certificate-transparency-insights-on-radar/"><u>launch of regional traffic insights</u></a> on Radar brings yet another perspective to our ability to investigate observed Internet traffic anomalies. We can now drill down at regional and network levels, as well as exploring the impact across DNS traffic, connection bandwidth and latency, TCP connection tampering, and announced IP address space, helping us understand the impact of such events. And while these blog posts feature graphs from <a href="https://radar.cloudflare.com/"><u>Radar</u></a> and the <a href="https://radar.cloudflare.com/explorer"><u>Radar Data Explorer</u></a>, the underlying data is available from our <a href="https://developers.cloudflare.com/api/resources/radar/"><u>rich API</u></a>. You can use the API to retrieve data to do your own local monitoring or analysis, or the <a href="https://github.com/cloudflare/mcp-server-cloudflare/tree/main/apps/radar#cloudflare-radar-mcp-server-"><u>Radar MCP server</u></a> to incorporate Radar data into your AI tools.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <category><![CDATA[Internet Trends]]></category>
            <guid isPermaLink="false">6d4g6SeHoMoMsnUve0rdrq</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Nationwide Internet shutdown in Afghanistan extends localized disruptions]]></title>
            <link>https://blog.cloudflare.com/nationwide-internet-shutdown-in-afghanistan/</link>
            <pubDate>Tue, 30 Sep 2025 10:05:00 GMT</pubDate>
            <description><![CDATA[ On September 29, 2025, Internet connectivity was completely shut down across Afghanistan, impacting business, education, finance, and government services. ]]></description>
            <content:encoded><![CDATA[ <p>Just after 11:30 UTC (16:00 local time) on Monday, September 29, 2025, subscribers of wired Internet providers in <a href="https://radar.cloudflare.com/traffic/af"><u>Afghanistan</u></a> experienced a <a href="https://x.com/CloudflareRadar/status/1972649804821057727"><u>brief service interruption</u></a>, lasting until just before 12:00 UTC (16:30 local time). Cloudflare <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=&amp;dt=1d&amp;asn=as131284&amp;compAsn=as38742&amp;timeCompare=2025-09-21"><u>traffic data for AS38472 (Afghan Wireless) and AS131284 (Etisalat)</u></a> shows that traffic from these mobile providers remained available during that period.</p><p>However, just after 12:30 UTC (17:00 local time), the Internet was <a href="https://x.com/CloudflareRadar/status/1972682041759076637"><u>completely shut down</u></a>, with Afghani news outlet TOLOnews initially <a href="https://x.com/TOLONewsEnglish/status/1972641017745588605"><u>reporting in a post on X</u></a> that “<i>Sources have confirmed to TOLOnews that today (Monday), afternoon, fiber-optic Internet will be shut down across the country.</i>” This shutdown is likely an extension of the regional shutdowns of fiber optic connections that took place earlier in September, and it will <a href="https://www.dw.com/en/afghanistan-taliban-shuts-down-internet-indefinitely/a-74181089"><u>reportedly</u></a> remain in force “until further notice”. (The earlier regional shutdowns are discussed in more detail below.)</p><p>While Monday’s first shutdown was only partial, with mobile connectivity apparently remaining available, the graphs below show that the second event took the country completely offline, with <a href="https://radar.cloudflare.com/traffic/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#traffic-trends"><u>web</u></a> and <a href="https://radar.cloudflare.com/dns/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#dns-query-volume"><u>DNS</u></a> traffic dropping to zero at a national level, as seen in the graphs below.</p><p>While the shutdown will impact subscribers to fixed and mobile Internet services, it also “<a href="https://www.turkiyetoday.com/world/afghanistan-descends-into-total-communications-blackout-under-taliban-order-3207737"><u>threatens to paralyze critical services including banking, customs operations and emergency communications</u></a>” across the country. The <a href="https://x.com/TOLONewsEnglish/status/1972641017745588605"><u>X post from TOLOnews</u></a> also noted that television and radio networks would face disruptions.</p><p>HTTP request traffic is traffic coming from web browsers, applications, and automated tools, and is a clear signal of the availability of Internet connectivity. The graph below shows this request volume dropping sharply as the shutdown was implemented.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6x0Wdv7U6SzS7jXrfQuETT/135e0e512741c79e969e4e34800f02d7/image9.png" />
          </figure><p><sup><i>HTTP request traffic from Afghanistan, September 29, 2025</i></sup></p><p>Cloudflare sends bytes back in response to those HTTP requests (“HTTP bytes”), as well as sending bytes back in response to traffic associated with other services, such as our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a>, <a href="https://www.cloudflare.com/application-services/products/dns/"><u>authoritative DNS</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"><u>WARP</u></a>, etc. (“total bytes”). Cloudflare stopped receiving client traffic from the services when the shutdown began, causing the bytes transferred in response to drop to zero.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qDezs9ngevvCWvDiCAG2C/1c21c568ca730fa0f5fc15964c619c2b/image6.png" />
          </figure><p><sup><i>Internet traffic from Afghanistan, September 29, 2025</i></sup></p><p><a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a> is Cloudflare’s privacy-focused DNS resolver, and processes DNS lookup requests from clients. As connectivity was cut, traffic to the service disappeared.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pSshBSiJVVwJs8Ro8DAv0/eb77f8e08299c58155ffb4dccad8ac01/image10.png" />
          </figure><p><sup><i>DNS query traffic to Cloudflare’s 1.1.1.1 resolver from Afghanistan, September 29, 2025</i></sup></p><p>At a <a href="https://radar.cloudflare.com/traffic/af?dateStart=2025-09-29&amp;dateEnd=2025-09-29#traffic-volume-by-region"><u>regional</u></a> level, it appears that traffic from Kabul fell slightly later than traffic from the other regions, trailing them by approximately a half hour.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5l9bImRqxgDdWGOHXCKgYC/b4c6e0eae1b314ce750c4aa6581c3321/image12.png" />
          </figure><p><sup><i>HTTP request traffic from the top five provinces in Afghanistan, September 29, 2025</i></sup></p><p>The delay in traffic loss seen in Kabul may be associated with a more gradual loss of traffic seen at <a href="https://radar.cloudflare.com/AS38742"><u>AS38742 (Afghan Wireless)</u></a>, which saw traffic approach zero just after 13:00 UTC (17:30 local time). This conjecture is supported by a <a href="https://kabulnow.com/2025/09/taliban-order-nationwide-shutdown-of-internet-and-mobile-services-in-afghanistan/"><u>published report</u></a> that noted “Residents across Kabul and several provincial cities reported on Monday that fiber-optic services were no longer available, with only limited mobile data functioning briefly before signal towers stopped working altogether.”</p><p>Interestingly, it appears that as of 00:00 UTC (04:30 local time) on September 30, we continue to see a very small amount of traffic from this network. (This is in contrast to other networks, whose lines disappeared from the graph around 12:30 UTC (17:00 local time)).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MMrOcXD5yg4GSDT9Y1p08/31de2f6c92043241db214e982a89556c/image7.png" />
          </figure><p><sup><i>HTTP request traffic from the top 10 ASNs in Afghanistan, September 29, 2025</i></sup></p><p>Network providers announce IP address space that they are responsible for to other networks, enabling the routing of traffic to and from those IP addresses. When these announcements are withdrawn, the resources in that address space, whether clients or servers, can no longer reach, or are no longer reachable from, the rest of the Internet.</p><p>In Afghanistan, announced IPv4 address space dropped rapidly as the shutdown was implemented, falling by two-thirds from 604 to 197 announced /24s (blocks of 256 IPv4 addresses) in the first 20 minutes, and then dropping further over the next 90 minutes. Through the end of the day, several networks continued to announce a small amount of IPv4 address space: four /24s from <a href="https://radar.cloudflare.com/AS38742"><u>AS38742 (Afghan Wireless)</u></a>, two from <a href="https://radar.cloudflare.com/AS149024"><u>AS149024 (Afghan Bawar ICT Services)</u></a>, and one each from <a href="https://radar.cloudflare.com/AS138322"><u>AS138322 (Afghan Wireless)</u></a> and <a href="https://radar.cloudflare.com/AS136479"><u>AS136479 (Cyber Telecom)</u></a>.</p><p>Afghan Wireless is a mobile connectivity provider, and <a href="http://afghanbawar.com/"><u>Afghan Bawar</u></a> and <a href="https://cts.af/about-us/"><u>Cyber Telecom</u></a> appear to offer wireless/mobile services as well. The <a href="https://radar.cloudflare.com/routing/prefix/152.36.203.0/24"><u>prefixes</u></a> still visible from Afghan Wireless appear to be routed through <a href="https://radar.cloudflare.com/as17557"><u>AS17557 (Pakistan Telecom)</u></a>, while the prefixes from the other two providers (<a href="https://radar.cloudflare.com/routing/prefix/163.223.180.0/23"><u>Afghan Bawar</u></a>, <a href="https://radar.cloudflare.com/routing/prefix/103.126.5.0/24"><u>Cyber Telecom</u></a>) appear to be routed through <a href="https://radar.cloudflare.com/as40676"><u>AS40676 (Psychz Networks)</u></a>, a US-based solutions provider.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11yzruult8bJD7p15lEwiG/e19f71e771f8c1162717b75675ecf94e/image5.png" />
          </figure><p><sup><i>Announced IPv4 address space from Afghanistan, September 29, 2025</i></sup></p><p>Announced IPv6 address space fell as well, though not quite as catastrophically, dropping by three-fourths almost immediately, from 262,407 /48s (blocks of over 1.2 septillion IPv6 addresses) to 65,542.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1s5p2v84LAyw1igdAKuaNT/4c597dca9a55c4f4a8a9c69c60e8a022/image1.png" />
          </figure><p><sup><i>Announced IPv6 address space from Afghanistan, September 29, 2025</i></sup></p>
    <div>
      <h3>Regional shutdowns by the Taliban to prevent “immoral activities”</h3>
      <a href="#regional-shutdowns-by-the-taliban-to-prevent-immoral-activities">
        
      </a>
    </div>
    <p>In mid-September, the Taliban <a href="https://amu.tv/200798/"><u>ordered the shutdown of fiber optic Internet connectivity</u></a> in multiple provinces across Afghanistan, as part of a drive to “prevent immorality”. It was the first such ban issued since the Taliban took full control of the country in August 2021.</p><p>These regional shutdowns <a href="https://www.afghanstudiescenter.org/taliban-internet-shutdown-blocks-thousands-of-afghan-students-from-online-classes/"><u>blocked</u></a> Afghani students from attending online classes, <a href="https://theweek.com/world-news/afghanistan-taliban-high-speed-internet-women-education"><u>impacted</u></a> commerce and banking, and <a href="https://www.dw.com/en/afghanistan-whats-at-stake-as-taliban-cut-internet/a-74043564"><u>limited access</u></a> to government agencies and institutions such as passport and registration offices, customs offices. As many as <a href="https://amu.tv/200798/"><u>15 provinces</u></a> experienced shutdowns, and we review the observed impacts across several of them below, using the regional traffic data <a href="https://blog.cloudflare.com/new-regional-internet-traffic-and-certificate-transparency-insights-on-radar/"><u>recently made available</u></a> on Cloudflare Radar.</p><p><a href="https://radar.cloudflare.com/traffic/1147288?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Balkh</u></a> appeared to be one of the earliest targeted provinces, with traffic dropping midday (UTC) on September 15. While some nominal recovery occurred on September 23, traffic remained well below pre-shutdown levels.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1t0mFLkPjixHM9m7NWnMha/d855d9dc8301dae33e3ec7abb4f9232c/image2.png" />
          </figure><p><sup><i>Internet traffic from Balkh, Afghanistan, September 1-28, 2025</i></sup></p><p>After several days of peak traffic levels double those seen in previous weeks, traffic in <a href="https://radar.cloudflare.com/traffic/1123230?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Takhar</u></a> fell on September 16, remaining near zero until September 21, when a small amount of connectivity was apparently restored.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3l7wfMGBMt8pOVxFb3NvvX/b99ad045b8a2eb0a55f25d3f448fe29e/image8.png" />
          </figure><p><sup><i>Internet traffic from Takhar, Afghanistan, September 1-28, 2025</i></sup></p><p>In <a href="https://radar.cloudflare.com/traffic/1138335?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Kandahar</u></a>, lower peak traffic volumes are visible between September 17 and September 21. The partial restoration of traffic is coincident with the restoration of Internet services highlighted in a <a href="https://menafn.com/1110093436/Internet-Services-Restored-in-Some-Areas-of-Afghanistans-Kandahar"><u>published report</u></a>, though it notes that “The restoration of services is limited to point-to-point connections for key government offices, including banks, customs offices, and the Directorate for National ID Cards.”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lzuyfuIoH76wzw8wpNR7n/e3d2baf026e9ab9d3fa0ecd7926fc127/image11.png" />
          </figure><p><sup><i>Internet traffic from Kandahar, Afghanistan, September 1-28, 2025</i></sup></p><p><a href="https://radar.cloudflare.com/traffic/1147537?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Baghlan</u></a> experienced an anomalous spike in traffic on September 16, with total traffic spiking 3x higher than peaks seen during the previous weeks. However, on September 17, traffic dropped to a fraction of pre-shutdown levels. Except for a return to near-normal levels on September 21 &amp; 22, the disruption remained in place through the end of the month.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OuHHfoiGIbcUP7qWhM6Mb/cc3da98c3127c7d27a416d02adc716fd/image14.png" />
          </figure><p><sup><i>Internet traffic from Baghlan, Afghanistan, September 1-28, 2025</i></sup></p><p>Traffic in <a href="https://radar.cloudflare.com/traffic/1132366?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Nangarhar</u></a> was disrupted between September 19-22, but quickly recovered to pre-shutdown levels once restored.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FYwcwHLwlj5VC9HIyB5tX/a6c047b3fe0f1a909b8e38452405a7eb/image13.png" />
          </figure><p><sup><i>Internet traffic from Nangarhar, Afghanistan, September 1-28, 2025</i></sup></p><p>After experiencing an apparent issue at the start of the month, Internet traffic in <a href="https://radar.cloudflare.com/traffic/1131461?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Oruzgan</u></a>, again fell on September 19. After an apparent complete shutdown, on September 23, a small amount of traffic was again visible.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QoIbIy0hbaKhWq7Mb8WAD/44cb159f930ed2328ceff1e4197d4d12/image4.png" />
          </figure><p><sup><i>Internet traffic from Oruzgan, Afghanistan, September 1-28, 2025</i></sup></p><p>Internet connectivity was also disrupted in the province of <a href="https://radar.cloudflare.com/traffic/1140025?dateStart=2025-09-01&amp;dateEnd=2025-09-28"><u>Herat</u></a>, although differently. From September 22-25, partial Internet outages were implemented between 16:30-03:30 UTC (21:00-08:00 local time), with traffic volumes dropping to approximately half of those seen at the same time the prior weeks. The intent of these “Internet curfew” shutdowns is unclear, but Herat residents <a href="https://tolonews.com/afghanistan-195915"><u>noted</u></a> that they “severely disrupted their business and educational activities”.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1C94mQTOp9CxMJAH0qxp8T/fb2a9456f09d67125e505963254a1080/image3.png" />
          </figure><p><sup><i>Internet traffic from Herat, Afghanistan, September 16-29, 2025</i></sup></p><p>While <a href="https://blog.cloudflare.com/tag/internet-shutdown/"><u>Internet shutdowns</u></a> remain all too common around the world, most (though not all) are comparatively short-lived, and are generally in response to a local event, such as exams, unrest/riots, elections, etc. Given the broad impact of this shutdown across all facets of daily personal, social, and professional life in Afghanistan, <a href="https://amu.tv/201377/"><u>analysts state</u></a> that it "could deepen Afghanistan’s digital isolation, further damage its struggling economy and drive more Afghans out of work at a time when humanitarian needs are already severe."</p>
    <div>
      <h3>Where can I learn more?</h3>
      <a href="#where-can-i-learn-more">
        
      </a>
    </div>
    <p>You can follow the latest state of <a href="https://radar.cloudflare.com/traffic/af"><u>Internet connectivity in Afghanistan</u></a> on Cloudflare Radar. The Cloudflare Radar team will continue to monitor traffic from Afghanistan as well, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <guid isPermaLink="false">7MCAuGOYyNejN3pChXzmW7</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing new regional Internet traffic and Certificate Transparency insights on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/new-regional-internet-traffic-and-certificate-transparency-insights-on-radar/</link>
            <pubDate>Fri, 26 Sep 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar now offers a Certificate Transparency dashboard for monitoring TLS certificate activity,  and new regional traffic insights for a sub-national perspective on Internet trends. ]]></description>
            <content:encoded><![CDATA[ <p>Since <a href="https://blog.cloudflare.com/introducing-cloudflare-radar/"><u>launching during Birthday Week in 2020</u></a>, Radar has announced significant new capabilities and data sets during subsequent Birthday Weeks. We continue that tradition this year with a two-part launch, adding more dimensions to Radar’s ability to slice and dice the Internet.</p><p>First, we’re adding <a href="#introducing-regional-internet-traffic-insights-on-radar"><u>regional traffic insights</u></a>. Regional traffic insights bring a more localized perspective to the traffic trends shown on Radar.</p><p>Second, we’re adding detailed <a href="#introducing-certificate-transparency-insights-on-radar"><u>Certificate Transparency (CT) data</u></a>, too. The new CT data builds on the <a href="https://blog.cloudflare.com/tag/certificate-transparency/"><u>work that Cloudflare has been doing around CT</u></a> since 2018, including <a href="https://blog.cloudflare.com/a-tour-through-merkle-town-cloudflares-ct-ecosystem-dashboard/"><u>Merkle Town</u></a>, our initial CT dashboard.</p><p>Both features extend Radar's mission of providing deeper, more granular visibility into the health and security of the Internet. Below, we dig into these new capabilities and data sets.</p>
    <div>
      <h2>Introducing regional Internet traffic insights on Radar</h2>
      <a href="#introducing-regional-internet-traffic-insights-on-radar">
        
      </a>
    </div>
    <p>Cloudflare Radar initially launched with visibility into Internet traffic trends at a national level: want to see how that Internet shutdown impacted <a href="https://radar.cloudflare.com/traffic/iq?dateStart=2025-08-28&amp;dateEnd=2025-09-03#traffic-trends"><u>traffic in Iraq</u></a>, or what <a href="https://radar.cloudflare.com/adoption-and-usage/in#ipv4-vs-ipv6"><u>IPv6 adoption looks like in India</u></a>? It’s visible on Radar. Just a year and a half later, in March 2022, <a href="https://blog.cloudflare.com/asn-on-radar/"><u>we launched Autonomous System (ASN) pages on Radar</u></a>. This has enabled us to bring more granular visibility to many of our metrics: What’s network performance like on <a href="https://radar.cloudflare.com/quality/as701"><u>AS701 (Verizon Fios)</u></a>? How thoroughly has <a href="https://radar.cloudflare.com/routing/as812#routing-statistics"><u>AS812 (Rogers Communications)</u></a> implemented routing security? Did <a href="https://radar.cloudflare.com/traffic/as58322?dateStart=2025-08-28&amp;dateEnd=2025-09-03"><u>AS58322 (Halasat)</u></a> just go offline? It’s all visible on Radar.</p><p>However, sometimes Internet usage shifts on a more local level — maybe a sporting event in a particular region drives people online to find out more information. Or maybe a storm or other natural disaster causes infrastructure damage and power outages in a given state, impacting Internet traffic.</p><p>For the last few years, the Radar team relied on internal data sets and <a href="https://jupyter.org/"><u>Jupyter</u></a> notebooks to visualize these “sub-national” traffic shifts. But today, we are bringing that insight to Cloudflare Radar, and to you, with the launch of regional traffic insights. With this new capability, you’ll be able to see traffic trends at a more local level, including bytes and requests, as well as breakouts of desktop/mobile device and bot/human traffic shares. And for even more granular visibility, within the Data Explorer, you’ll also be able to select an autonomous system to join with the regional selection — for example, <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=6254926&amp;dt=7d&amp;asn=as7922"><u>looking at AS7922 (Comcast) in Massachusetts (United States)</u></a>.</p>
    <div>
      <h3>Geographic guidance</h3>
      <a href="#geographic-guidance">
        
      </a>
    </div>
    <p>In line with common industry practice, the region names displayed on Radar are sourced in data from GeoNames (<a href="http://geonames.org"><u>geonames.org</u></a>), a crowdsourced geographical database. Specifically, we are using the “<a href="https://www.geonames.org/export/codes.html"><u>first-order administrative divisions</u></a>” listed for each country — for example, the states of America, the departments of Honduras, or the provinces of Canada. Those geographical names reflect data provided by GeoNames; for more information, please refer to their <a href="https://www.geonames.org/about.html"><u>About</u></a> page.</p><p>Requests logged by Cloudflare’s services include the IP address of the device making the request. The address range (“prefix”) that includes this address is associated with a GeoNames ID within our IP address geolocation data, and we then match that GeoNames ID with the associated country and “first order administrative division” found in the GeoNames dataset. (For example: 155.246.1.142 → 155.246.0.0/16 → GeoNames ID 5101760 → United States &gt; New Jersey) </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DfCm0p0xIwNdgaXd5y1UF/ce843c0714c7b490fd757dc1d0d60b6c/image9.png" />
          </figure>
    <div>
      <h3>Drilling down into Radar traffic data</h3>
      <a href="#drilling-down-into-radar-traffic-data">
        
      </a>
    </div>
    <p>Within Cloudflare Radar, there are several ways to get to this regional data. If you know the name of the region of interest, you can type it into the search bar at the top of the page, and select it from the results. For example, beginning to type <b>Massachusetts</b> returns the U.S. state, linked to its regional traffic page. Typing the region name into the <b>Traffic in</b> dropdown at the top of a <b>Traffic</b> page will also return the same set of results.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CX1gUqYX6VCpxhzI1YoIs/54977900f36dab7697f08813f6fd06be/image11.png" />
          </figure><p>Radar’s country-level pages now have a new <b>Traffic characteristics by region</b> card that includes both summary and time series views of regional traffic. The summary view is presented as a map and table, similar to the <b>Traffic characteristics</b> card in the Worldwide traffic view. After selecting a metric from the dropdown at the top right of the card, the table and map are updated to reflect the relevant summary values for the chosen time period. Within the paginated table, the region names are linked, and clicking one will take you to the relevant page. Within the map, the summary values are represented by circles placed in the centroid of each region, sized in relation to their value. Clicking a circle will take you to the relevant page.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jJwcTEjoJfMPLuah6i1DB/aece30541e70850d52369a7997bbe064/image8.png" />
          </figure><p>Below the summary map and table, the card also includes a time series graph of traffic at a regional level for the top five highest traffic regions within the country. These graphs can reveal interesting regional differences in traffic patterns. For example, the <a href="https://radar.cloudflare.com/traffic/iq?dateStart=2025-09-02&amp;dateEnd=2025-09-08#traffic-volume-by-region"><b><u>Traffic volume by region in Iraq</u></b></a> graph for HTTP request traffic shown below highlights the differing Internet shutdown schedules (<a href="https://x.com/CloudflareRadar/status/1960324662740529354"><u>Kurdistan Region</u></a>, <a href="https://x.com/CloudflareRadar/status/1960329607892066370"><u>central and southern Iraq</u></a>) across the different governorates. On days when the schedules do not overlap, such as September 2 and 7, traffic from the Erbil and Sulaymaniyah governorates, which are located in the Kurdistan Region, does not drop concurrent with the loss in traffic observed in Baghdad and Basra.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6cW34uKtkKqMdky0RIVRia/03a961f1e39dfaad04cffe06f368bdea/image18.png" />
          </figure>
    <div>
      <h3>Mobile vs. desktop device traffic trends</h3>
      <a href="#mobile-vs-desktop-device-traffic-trends">
        
      </a>
    </div>
    <p>Over the past several years, a number of Radar blog posts have explored how human activity impacts Internet traffic, including <a href="https://blog.cloudflare.com/offline-celebrations-how-christmas-nye-and-lunar-new-year-festivities-shape-online-behavior/"><u>holiday celebrations</u></a>, <a href="https://blog.cloudflare.com/elections-2024-internet/"><u>elections</u></a>, and the <a href="https://blog.cloudflare.com/paris-2024-summer-olympics-impacted-internet-traffic/"><u>Paris 2024 Summer Olympics</u></a>. With the new regional views, this impact now becomes even clearer at a more local level. For instance, mobile devices account for, on average, just over half of the request traffic seen from <a href="https://radar.cloudflare.com/traffic/184742?dateStart=2025-08-22&amp;dateEnd=2025-09-04#mobile-vs-desktop"><u>Nairobi Country in Kenya</u></a>. A clear diurnal pattern is seen on weekdays, where mobile device usage drops during workday hours, and then rises again in the evening. However, during the weekends, mobile traffic remains elevated, presumably due to fewer people using desktop computers in office environments, as well as fewer desktop computers in use at home, in line with Kenya’s <a href="https://www.ca.go.ke/mobile-data-and-digital-services-rise-ca-report-shows"><u>mobile-first</u></a> culture.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QgT4OGpdgvXiQJX8GbzEP/62947e34d96bdf85a863f3396f95b094/image17.png" />
          </figure>
    <div>
      <h3>Bot vs human traffic trends</h3>
      <a href="#bot-vs-human-traffic-trends">
        
      </a>
    </div>
    <p>Similar to how the mobile vs. desktop view exposes shifts in human activity, bot vs. human traffic insights do as well. One interpretation of the graph below is that <a href="https://radar.cloudflare.com/traffic/2267056?dateStart=2025-08-29&amp;dateEnd=2025-09-04#bot-vs-human"><u>overnight bot activity from Lisbon</u></a> increased significantly during the first few days of September. However, since the graph shows traffic shares, and given the timing of the apparent increases, the more likely cause is increasingly larger drops in human-driven traffic – users in Lisbon appear to begin logging off around 23:00 UTC (midnight local time), and start getting back online around 05:00 UTC (06:00 local time). The shares and shifts will obviously vary by country and region, but they can provide a perspective on the nocturnal habits of users in a region.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36GundkM2BKTWvCq7T7On2/a5028340a0e8b3a55f85df8116a6a7fe/image16.png" />
          </figure>
    <div>
      <h3>Customize regional analysis with Radar’s Data Explorer</h3>
      <a href="#customize-regional-analysis-with-radars-data-explorer">
        
      </a>
    </div>
    <p>Within the Data Explorer, you can use the breakdown options and filters to customize your analysis of regional traffic data.</p><p>At a country level, choosing to breakdown by regions generates a stacked area graph that shows the relative traffic shares of the top 20 regions in the selected country, along with a bar graph showing summary share values. For example, the <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=US&amp;dt=7d&amp;groupBy=adm1"><u>graph below</u></a> shows that in aggregate, Virginia and California are responsible for just over a quarter of the HTTP request volume in the United States.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2AVUcmEpxse9cAKx16qH07/5ad9be3e7bcaef3dedeb33ef90f95184/image27.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vJKLjUpKGupoPB6kkmavv/5a988c99fd99324060cbdf97054f7f28/image3.png" />
          </figure><p>You can also use Data Explorer to drill down on traffic at a network (ASN) level in a given region, in both summary and timeseries views. For example, <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=6254926&amp;dt=7d&amp;groupBy=ases"><u>looking at HTTP request traffic for Massachusetts by ASN</u></a>, we can see that <a href="https://radar.cloudflare.com/as7922"><u>AS7922</u></a> (Comcast), accounts for a third, followed by <a href="https://radar.cloudflare.com/as701"><u>AS701</u></a> (Verizon Fios, 15%), <a href="https://radar.cloudflare.com/as21928"><u>AS21928</u></a> (T-Mobile, 8.8%), <a href="https://radar.cloudflare.com/as6167"><u>AS6167</u></a> (Verizon Wireless, 5.1%), <a href="https://radar.cloudflare.com/as7018"><u>AS7018</u></a> (AT&amp;T, 4.7%), and <a href="https://radar.cloudflare.com/as20115"><u>AS20115</u></a> (Charter/Spectrum, 4.5%). Over 70% of the request traffic is concentrated in these six providers, with nearly half of that from one provider.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qdfiHtKJ32IDX1loKqCvK/238d47750ab4aa13ae1c80b1b2f16e27/image2.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qsEetiInP5TwYEBoQvWum/0c4a9d01417e67633de5f69d5c98f53f/image19.png" />
          </figure><p>Going a level deeper, you can also look at traffic trends over time for an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN</u></a> within a given region, and even compare it with another time period. The <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=6254926&amp;dt=7d&amp;asn=as7922&amp;timeCompare=1"><u>graph below</u></a> shows traffic for AS7922 (Comcast) in Massachusetts over a seven-day period, compared with the prior week. While the traffic volumes on most days were largely in line with the previous week, Saturday and Sunday were noticeably higher. These differences may reflect a shift in human activity, as September 6 &amp; 7 were quite rainy in Massachusetts, so people may have spent more time indoors and online. (The prior weekend was Labor Day weekend, but those Saturday and Sunday traffic levels were in line with the preceding weekend.) You can also add another ASN to the traffic trends comparison. <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=6254926&amp;dt=2025-09-04_2025-09-10&amp;timeCompare=1&amp;compAsn=as701&amp;asn=as7922&amp;compareWith=6254926"><u>Selecting Massachusetts (</u><b><u>Location</u></b><u>) and AS701 (</u><b><u>ASN)</u></b><u> (Verizon Fios)</u></a> in the <b>Compare</b> section finds that traffic on that network was higher on Saturday and Sunday as well, lending credence to the rainy weekend theory.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yB2jNi8gqRkS4IaaqwH8c/17f74f7e9f84b0cbe2200651f32053cb/image5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4u2EsKhCmm9QS6B7iYEXu2/7f2b626f30fc29489bf551c5c7be4623/image4.png" />
          </figure><p>Regional comparisons, whether within the same country or across different countries, are also possible in Data Explorer. For instance, if the Kansas City Chiefs and Philadelphia Eagles were to meet yet again in the Super Bowl, the configuration below could be used to <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=4398678&amp;dt=1d&amp;timeCompare=1&amp;compareWith=6254927"><u>compare traffic patterns in the teams’ respective home states</u></a>, as well as comparing the trends with the previous week, showing how human activity impacted it over the course of the game.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15OLkOMtK5I1YlK9uredOz/3f71d3e25a3f2f4065e9b9ac8896409a/image26.png" />
          </figure><p>As always, the data powering the visualizations described above are also available through the Radar API. The <code>timeseries_groups</code> and <code>summary</code> methods for the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/netflows/"><u>NetFlows</u></a> and <a href="https://developers.cloudflare.com/api/resources/radar/subresources/http/"><u>HTTP</u></a> endpoints now have an <code>ADM1</code> dimension, allowing traffic to be broken down by first-order administrative divisions. In addition, the new <code>geoId</code> filter for the NetFlows and HTTP endpoints allows you to filter the results by a specific geolocation, using its GeoNames ID. And finally, there are new <a href="https://developers.cloudflare.com/api/resources/radar/subresources/geolocations/methods/get/"><code><u>get</u></code></a> and <a href="https://developers.cloudflare.com/api/resources/radar/subresources/geolocations/methods/list/"><code><u>list</u></code></a> endpoints for fetching geolocation details.</p>
    <div>
      <h3>A note regarding data quantity and quality</h3>
      <a href="#a-note-regarding-data-quantity-and-quality">
        
      </a>
    </div>
    <p>As you’d expect, the more traffic we see from a given geography, the better the “signal”, and the clearer the associated graph is — this is generally the case when traffic is aggregated at a country level. However, for some smaller or less populous regions, especially in developing countries or countries with poor Internet connectivity, lower traffic will likely cause the signal to be weaker, resulting in graphs that appear spiky or incomplete. (Note that this will also be true for region+ASN views.) An illustrative example is shown below, for <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=408666&amp;dt=2025-08-29_2025-09-04&amp;timeCompare=1#result"><u>Northern Darfur State in Sudan</u></a>. Traffic is observed somewhat inconsistently, resulting in the spikes seen in the graph. Similarly, the “Previous 7 days” line is largely incomplete, indicating a lack of traffic data for that period. In these cases, it will be hard to draw definitive conclusions from such graphs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76nx7WvxtkJZUQcwjQ1zT8/fb8f119576eff87219d2e6f2867225dc/image23.png" />
          </figure><p>Although the Internet arguably transcends geographical boundaries, the reality is that usage patterns can vary by location, with traffic trends that reflect more localized human activity. The new regional insights on Cloudflare Radar traffic pages, and in the Data Explorer, provide a perspective at a sub-national level. We are exploring the potential to go a level deeper in the future, providing traffic data for “second-order administrative divisions” (such as counties, cities, etc.).</p><p>If you share our regional traffic graphs on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). If you have questions or comments, you can reach out to us on social media, or contact us via <a><u>email</u></a>.</p>
    <div>
      <h2>Introducing Certificate Transparency insights on Radar</h2>
      <a href="#introducing-certificate-transparency-insights-on-radar">
        
      </a>
    </div>
    <p>Just as we're bringing more granular detail to traffic patterns, we're also shedding more light on the very foundation of trust on the Internet: TLS certificates. <a href="https://en.wikipedia.org/wiki/Certificate_authority"><u>Certificate Authorities (CAs)</u></a> serve as trusted gatekeepers for the Internet: any website that wants to prove its identity to clients must present a certificate issued by a CA that the client trusts. But how do we know that CAs themselves are trustworthy and only issue certificates they are authorized to issue?</p><p>That’s where <a href="https://blog.cloudflare.com/azul-certificate-transparency-log/#what-is-certificate-transparency"><u>Certificate Transparency (CT)</u></a> comes in. Clients that enforce CT (most major browsers) will only trust a website certificate if it is both signed by a trusted CA <i>and</i> has proof that the certificate has been added to a public, append-only CT log, so that it can be publicly audited. Only recently, CT played a key role in detecting the <a href="https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/"><u>unauthorized issuance of certificates for 1.1.1.1</u></a>, a <a href="https://one.one.one.one/"><u>public DNS resolver service</u></a> that Cloudflare operates.</p><p>In addition to its role as a vital safety mechanism for the Internet, CT has proven to be invaluable in other ways, as it provides publicly-accessible lists of <i>all website certificates used on the Internet</i>. This dataset is a treasure trove of intelligence for researchers measuring the Internet, security teams detecting malicious activity like phishing campaigns, or penetration testers mapping a target’s external attack surface.</p><p>The sheer amount of data (multiple terabytes) available in CT makes it difficult for regular Internet users to download and explore themselves. Instead, services like <a href="https://crt.sh"><u>crt.sh</u></a>, <a href="https://www.censys.com/"><u>Censys</u></a>, and <a href="https://www.merklemap.com/"><u>Merklemap</u></a> provide easy search interfaces to allow discoverability for specific domain names and certificates. We <a href="https://blog.cloudflare.com/a-tour-through-merkle-town-cloudflares-ct-ecosystem-dashboard/"><u>launched</u></a> <a href="https://ct.cloudflare.com/"><u>Merkle Town</u></a> in 2018 to share broad insights into the CT ecosystem using data from our own CT monitoring service.</p><p><a href="https://radar.cloudflare.com/certificate-transparency"><u>Certificate Transparency on Cloudflare Radar</u></a> is the next evolution of Merkle Town, providing integration with security and domain information already on Radar and more interactive ways to explore and analyze CT data. (For long-time Merkle Town users, we’re keeping it around until we’ve reached full feature parity.)</p><p>In the sections below, we’ll walk you through the features available in the new dashboard.</p>
    <div>
      <h3>Certificate volume and characteristics</h3>
      <a href="#certificate-volume-and-characteristics">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/certificate-transparency"><u>CT page</u></a> leads with a view of how many certificates are being issued and logged over time. Because the same certificate can appear multiple times within a single log or be submitted to several logs, the total count can be inflated. To address this, two distinct lines are shown: one for total entries and another for unique entries. Uniqueness, however, is calculated only within the selected time range — for example, if certificate C is added to log A in one period and to log B in another, it will appear in the unique count for both periods. It is also important to note that the CT charts and date filters use the log timestamp, which is the time a certificate was added to a CT log. Additionally, the data displayed on the page was collected from the logs monitored by Cloudflare — delays, backlogs, or other inconsistencies may exist, so <a href="https://radar.cloudflare.com/about"><u>please report</u></a> any issues or discrepancies.</p><p>Alongside this chart is a comparison between <a href="https://radar.cloudflare.com/certificate-transparency#entry-type"><u>certificates and pre-certificates</u></a>. A <a href="https://datatracker.ietf.org/doc/html/rfc6962#section-3.1"><u>pre-certificate</u></a> is a special type of certificate used in CT that allows a CA to publicly log a certificate before it is officially issued. CAs are not required to log full certificates if corresponding pre-certificates have already been logged (although many CAs do anyway), so typically there are more pre-certificates logged than full certificates, as seen in the chart.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QslYrX5Ao6PI6QVXECXeW/a640c1f7959ed1bff834acdcf375fb34/image10.png" />
          </figure><p>While certificate issuance trends are interesting on their own, analyzing the <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=7d#certificate-characteristics"><u>characteristics</u></a> of issued certificates provides deeper insight into the state of the web’s trust infrastructure. Starting with the <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=7d#public-key-algorithm"><u>public key algorithm</u></a>, which defines how secure connections are established between clients and servers, we found that more than 65% of certificates still use <a href="https://en.wikipedia.org/wiki/RSA_cryptosystem"><u>RSA</u></a>, while the remainder use <a href="https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm"><u>ECDSA</u></a>. RSA remains dominant due to its long-standing compatibility with a wide range of clients, while ECDSA is increasingly adopted for its efficiency and smaller key sizes, which can improve performance and reduce computational overhead. In the coming years, we expect <a href="https://blog.cloudflare.com/another-look-at-pq-signatures/"><u>post-quantum signature algorithms</u></a> like ML-DSA to appear when public CAs begin to offer support.</p><p>Next, a breakdown of certificates by <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=7d#signature-algorithm"><u>signature algorithm</u></a> reveals how Certificate Authorities (CAs) sign the certificates they issue. Most certificates (over 65%) use RSA with SHA-256, followed by ECDSA with SHA-384 at 19%, ECDSA with SHA-256 at 12%, and a small fraction using other algorithms. The choice of signature algorithm reflects a balance between widespread support, security, and performance, with stronger algorithms like ECDSA gradually gaining traction for modern deployments.</p><p>Certificates are also categorized by <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=7d#validation-level"><u>validation level</u></a>, which reflects the degree to which the CA has verified the identity of the certificate requester. The <a href="https://www.cloudflare.com/learning/ssl/types-of-ssl-certificates/"><u>main validation types</u></a> are Domain Validation (DV), Organization Validation (OV), and Extended Validation (EV). DV certificates verify only control of the domain, OV certificates verify both domain control and the organization behind it, and EV certificates involve more rigorous checks and display additional identity information in browsers. The industry trend is toward simpler, automated issuance, with DV certificates now making up almost 98% of issued certificates, while EV issuance has become largely obsolete.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77Vz97OhHE5Aoz9qBKDk88/36f419262376870592198f0348d77106/image22.png" />
          </figure><p>Finally, the chart on <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=7d#certificate-duration"><u>certificate duration</u></a> shows the difference between the NotBefore and NotAfter dates embedded in each certificate, which define the period during which the certificate is valid. Currently, the majority (92%) of issued certificates have durations between 47 and 100 days. Shorter certificate lifetimes improve security by limiting exposure if a certificate is compromised, and the industry is <a href="https://cabforum.org/working-groups/server/baseline-requirements/requirements/#632-certificate-operational-periods-and-key-pair-usage-periods"><u>moving toward even shorter durations</u></a>, driven by browser policies and automated renewal systems.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2i4oiEIAarzTDIG4x7dT9o/fe00dd0ce8770c05dbf7689367e2d957/image15.png" />
          </figure>
    <div>
      <h3>Certificate issuance</h3>
      <a href="#certificate-issuance">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/certificate-transparency#certificate-issuance"><u>Certificate issuance</u></a> is the process by which CAs generate certificates for domain owners. Many CAs are operated by larger organizations that manage multiple subordinate CAs under a single corporate umbrella. The CT page highlights the distribution of certificate issuance across the <a href="https://radar.cloudflare.com/certificate-transparency#certificate-authority-owners"><u>top CA owners</u></a>. At the moment, the Internet Security Research Group (ISRG), also known as <a href="https://letsencrypt.org/"><u>Let’s Encrypt</u></a>, issues more than 66% of all certificates, followed by other widely used CA owners including Google Trust Services, Sectigo, and GoDaddy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1wmj8AYvZIfjpzVehR72t4/73eec7d37fae4793e2303cc7ccb51944/image6.png" />
          </figure><p>The impact of events like the <a href="https://letsencrypt.status.io/pages/incident/55957a99e800baa4470002da/687e8d62b8a4e804fad85799"><u>July 21-22 Let’s Encrypt API outage</u></a> due to internal DNS failures that significantly reduced certificate issuance rates are visible in this visualization, as issuance rates dropped significantly during the two-day period.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vUk1k5aiZghiNg6jYS0HD/497a81ff097861dc1617ac9122c675ad/image12.png" />
          </figure><p>In addition to CA owners, the page provides a breakdown of certificate issuance by <a href="https://radar.cloudflare.com/certificate-transparency#certificate-authorities"><u>individual CA certificates</u></a>. Among the top five CAs, Let’s Encrypt’s four intermediate CAs — R12, R13, E7, and E8 — represent the bulk of its issuance. The bar chart can also be filtered by CA owner to display only the certificates associated with a specified organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6L8Q56bPtAt593qWT7qOh3/dbf4a1a2165a7ea867c4e0d2b9184469/image13.png" />
          </figure><p>The CT section also offers dedicated CA-specific pages. By searching for a CA name or fingerprint in the top search bar, you can reach a page showing all insights and trends available on the main CT page, filtered by the selected CA. The page also includes an additional CA information card, which provides details such as the CA’s owner, revocation status, parent certificate, validity period, country, inclusion in public root stores, and a list of all CAs operated by the same owner. All of this information is derived from the <a href="https://www.ccadb.org/"><u>Common CA Database (CCADB)</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UgeS0wen7kY2tqYIdMyEW/e43096ad73311ed66135e753ed4933de/image24.png" />
          </figure>
    <div>
      <h3>Certificate Transparency logs</h3>
      <a href="#certificate-transparency-logs">
        
      </a>
    </div>
    <p>Next on the CT page is a section focused on <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#certificate-transparency-logs"><u>CT logs</u></a>. This section shows the distribution of certificates across <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#ct-log-operators"><u>CT log operators</u></a>, identifying the organizations that manage the infrastructure behind the logs. Over the last three months, Sectigo operated the logs containing the largest number of certificates (2.8 billion), followed by Google (2.5 billion), Cloudflare (1.6 billion), and Let’s Encrypt (1.4 billion). Note that the same certificate can be logged multiple times across CT logs, so organizations that operate multiple CT logs with overlapping acceptance criteria may log certificates at an elevated rate. As such, the relative rank of the operators in this graph should not be construed as a measure of how load-bearing the logs are within the ecosystem.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XcKb0WNUsDvTWO3PEFcRz/78d6199e415c5ac5f587dfe348de0c10/image21.png" />
          </figure><p>Below this, a bar chart displays the distribution of certificates across <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#ct-log-usage"><u>individual CT logs</u></a>. Among the top five logs are Google’s <a href="https://radar.cloudflare.com/certificate-transparency/log/xenon2025h2"><u>xenon2025h1</u></a> and <a href="https://radar.cloudflare.com/certificate-transparency/log/argon2025h2"><u>argon2025h2</u></a>, Cloudflare’s <a href="https://radar.cloudflare.com/certificate-transparency/log/nimbus2025"><u>nimbus2025</u></a>, and Let’s Encrypt’s <a href="https://radar.cloudflare.com/certificate-transparency/log/oak2025h2"><u>oak2025h2</u></a>. This chart can also be filtered by operator to show only the logs associated with a specific owner. Next to the chart, another view shows the distribution of certificates by <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#ct-log-api"><u>log API</u></a>, distinguishing between logs following the original <a href="https://datatracker.ietf.org/doc/html/rfc6962"><u>RFC 6962</u></a> API versus those compatible with the newer and more efficient <a href="https://c2sp.org/static-ct-api"><u>static CT API</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/582GIIREPmMXZULgwPPo4g/46db84cbd3cae894eb61f5014a0a942f/image14.png" />
          </figure><p>Similar to the dedicated CA pages, the CT section also provides log-specific pages. By searching for a log name in the top search bar, you can access a page showing all insights and trends available on the main CT page, filtered by the selected log. Two additional cards are included: one showing information about the log, derived from <a href="https://googlechrome.github.io/CertificateTransparency/log_lists.html"><u>Google Chrome’s log list</u></a>, including details such as the operator, API type, documentation, and a list of other logs operated by the same organization; and another displaying performance metrics with two <a href="https://en.wikipedia.org/wiki/Radar_chart"><u>radar charts</u></a> tracking uptime and response time over the past 90 days, as observed by Cloudflare’s CT monitor. These metrics are useful to determine if logs are meeting the ongoing requirements for inclusion in CT programs like <a href="https://googlechrome.github.io/CertificateTransparency/log_policy.html#ongoing-requirements-of-included-logs"><u>Google's</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5I7hFPCrkslctFyAc7OqIQ/d63881a27edd892900eb82841f63176e/image1.png" />
          </figure>
    <div>
      <h3>Certificate coverage</h3>
      <a href="#certificate-coverage">
        
      </a>
    </div>
    <p>Last but not least, the CT page includes a section on <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#certificate-coverage"><u>certificate coverage</u></a>. Certificates can cover multiple top-level domains (TLDs), include wildcard entries, and support IP addresses in <a href="https://developers.cloudflare.com/ssl/origin-configuration/origin-ca/#hostname-and-wildcard-coverage"><u>Subject Alternative Names (SANs)</u></a>.</p><p>The <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#certificate-tld-distribution"><u>distribution of pre-certificates across the top 10 TLDs</u></a> highlights the domains most commonly covered. <code>.com</code> leads with 45% of certificates, followed by other popular TLDs such as <code>.dev</code> and <code>.net</code>.</p><p>Next to this view, two half-donut charts provide further insights into certificate coverage: one shows the share of certificates that <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#wildcard-usage"><u>include wildcard entries</u></a> — almost 25% of certificates use wildcards to cover multiple subdomains — while the other shows certificates that <a href="https://radar.cloudflare.com/certificate-transparency?dateRange=12w#ip-address-inclusion"><u>include IP addresses</u></a>, revealing that the vast majority of certificates do not contain IPs in their SAN fields</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wRxEpgJ1Of8Rw1O9LoQvE/badaa97eaa2017b07d617e06651e7283/image7.png" />
          </figure>
    <div>
      <h3>Expanded domain certificate data </h3>
      <a href="#expanded-domain-certificate-data">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/domains/domain"><u>domain information</u></a> page has also been updated to provide richer details about certificates. The certificates table, which displays certificates recorded in active CT logs for the specified domain, now includes expandable rows. Expanding a row reveals further information, including the certificate’s SHA-256 fingerprint, subject and issuer details — Common Name (CN), Organization (O), and Country (C) — the validity period (<code>NotBefore</code> and <code>NotAfter</code>), and the CT log where the certificate was found.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/nqIVexwwCgY0WE0X8JAJk/6df280953ab4fdcce3bd34f476915242/image20.png" />
          </figure><p>While the charts above highlight key insights in the CT ecosystem, all underlying data is accessible via the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/ct/"><u>API</u></a> and can be explored interactively across time periods, CAs, logs, and additional filters and dimensions using <a href="https://radar.cloudflare.com/explorer?dataSet=ct"><u>Radar’s Data Explorer</u></a>. And as always, Radar charts and graphs can be downloaded for sharing or embedded directly into blogs, websites, and dashboards for further analysis. Don’t hesitate to <a href="https://radar.cloudflare.com/about"><u>reach out to us</u></a> with feedback, suggestions, and feature requests — we’re already working through a list of early feedback from the CT community!</p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Mobile]]></category>
            <category><![CDATA[Certificate Transparency]]></category>
            <guid isPermaLink="false">6Ye6iffpYFZnLxuwqVQDL</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>André Jesus</dc:creator>
            <dc:creator>Luke Valenta</dc:creator>
        </item>
        <item>
            <title><![CDATA[Shutdown season: the Q2 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q2-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 22 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q2 2025, we observed Internet disruptions around the world resulting from government-directed shutdowns, power outages, cable damage, a cyberattack, and technical problems. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/"><u>network</u></a> currently spans more than 330 cities in over 125 countries, and we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric was generally made based on which better illustrated the impact of the disruption.</p><p>In our <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/"><u>Q1 2025 summary post</u></a>, we noted that we had not observed any government-directed Internet shutdowns during the quarter. Unfortunately, that forward progress was short-lived — in the second quarter of 2025, we observed <a href="#government-directed-shutdowns"><u>shutdowns</u></a> in Libya, Iran, Iraq, Syria, and Panama. The Internet’s reliance on a stable electric grid was made abundantly clear during the quarter, with a massive <a href="#power-outages-lead-to-internet-outages"><u>power outage</u></a> impacting Spain and Portugal disrupting connectivity within those countries. Fiber optic <a href="#fiber-optic-cable-damage"><u>cable cuts</u></a> impacted providers in Haiti and Malawi, major North American providers saw <a href="#technical-problems"><u>technical problems</u></a> disrupt Internet traffic, and a Russian provider was once again targeted by a significant <a href="#cyberattack-impact"><u>cyberattack</u></a>, knocking the network offline. Unfortunately, official attribution of an Internet outage’s root cause isn’t always available — and we observed several significant, yet <a href="#unexplained-disruptions"><u>unexplained</u></a>, Internet outages during the quarter.</p>
    <div>
      <h2>Government-directed shutdowns</h2>
      <a href="#government-directed-shutdowns">
        
      </a>
    </div>
    
    <div>
      <h3>Libya</h3>
      <a href="#libya">
        
      </a>
    </div>
    <p>On May 16, Internet disruptions were observed across multiple <a href="https://radar.cloudflare.com/traffic/ly"><u>Libyan</u></a> network providers, with connectivity reportedly shut down in response to <a href="https://libyareview.com/55698/protestors-face-internet-shutdown-in-libyan-capital/"><u>public protests</u></a> against the Government of National Unity. Starting at 13:30 UTC (15:30 local time), traffic dropped by more than 50% as compared to the prior week at <a href="https://radar.cloudflare.com/traffic/as329129?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Libyan International Company for Technology (AS329129)</u></a>, <a href="https://radar.cloudflare.com/traffic/as328539?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Giga Communication (AS328539)</u></a>, <a href="https://radar.cloudflare.com/traffic/as37284?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Aljeel Aljadeed for Technology (AS37284)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as328733?dateStart=2025-05-16&amp;dateEnd=2025-05-17#traffic-trends"><u>Awal Telecom (AS328733)</u></a>, with the latter experiencing a complete outage. Lower traffic volumes were observed until around 00:00 UTC (02:00 local time), with traffic restoration occurring within an hour or so on either side. Giga Communication (AS328539) experienced a second disruption on May 17 between 02:00 - 11:30 UTC (04:00 - 13:30 local time).</p>
    <div>
      <h3>Iran</h3>
      <a href="#iran">
        
      </a>
    </div>
    <p>Multiple Internet shutdowns occurred in <a href="https://radar.cloudflare.com/traffic/ir"><u>Iran</u></a> in June following Israel’s initial <a href="https://apnews.com/article/iran-explosions-israel-tehran-00234a06e5128a8aceb406b140297299"><u>attacks on the country’s nuclear sites</u></a>. The first, on June 13, occurred between 07:15 - 09:45 UTC (10:45 - 13:15 local time). Iran’s Ministry of Communications <a href="https://x.com/itiransite/status/1933475023244648514"><u>issued a statement</u></a> that announced the shutdown: “<i>In light of the country's special circumstances and based on the measures taken by the competent authorities, temporary restrictions have been imposed on the country's Internet. It is obvious that these restrictions will be lifted once normal conditions are restored.</i>” This shutdown order impacted network providers including <a href="https://radar.cloudflare.com/traffic/as24631?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>FanapTelecom (AS24631)</u></a>, Rasana (<a href="https://radar.cloudflare.com/traffic/as205647?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>AS205647</u></a> and <a href="https://radar.cloudflare.com/traffic/as31549?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>AS31549</u></a>), <a href="https://radar.cloudflare.com/traffic/as197207?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>MCCI (AS197207)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as58224?dateStart=2025-06-13&amp;dateEnd=2025-06-13#http-traffic"><u>TCI (AS58224)</u></a>, as well as others.</p><p>On June 17, Internet connectivity was again restricted, this time <a href="https://x.com/Digiato/status/1934561401185432046"><u>reportedly in an effort to “ward off cyber attacks”</u></a>, according to a government spokesperson. This second round of shutdowns began at 17:30 local time (14:00 UTC), impacting multiple networks. Traffic recovered at 15:30 UTC (19:00 local time) on <a href="https://radar.cloudflare.com/traffic/as24631?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>FanapTelecom (AS24631)</u></a> and <a href="https://radar.cloudflare.com/traffic/as16322?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>Pars Online (AS16322)</u></a>, at 20:00 UTC (23:30 local time) on <a href="https://radar.cloudflare.com/traffic/as197207?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>MCCI (AS197207)</u></a> and <a href="https://radar.cloudflare.com/traffic/as44244?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>IranCell (AS44244)</u></a>, at 22:00 UTC on June 17 (01:30 on June 18 local time) on <a href="https://radar.cloudflare.com/traffic/as57218?dateStart=2025-06-17&amp;dateEnd=2025-06-17#http-traffic"><u>RighTel (AS57218)</u></a>, and at 06:00 UTC on June 18 (09:30 local time) on Rasana (<a href="https://radar.cloudflare.com/traffic/as31549?dateStart=2025-06-17&amp;dateEnd=2025-06-18#http-traffic"><u>AS31549</u></a> and <a href="https://radar.cloudflare.com/traffic/as205647?dateStart=2025-06-17&amp;dateEnd=2025-06-18#http-traffic"><u>AS205647</u></a>).</p><p>During these initial Internet shutdowns, incoming Internet traffic was <a href="https://filter.watch/english/2025/06/19/network-monitoring-june-iran-internet-status-week-1-of-israel-iran-war/"><u>reportedly</u></a> also blocked, and user access was limited to Iran’s domestic <a href="https://en.wikipedia.org/wiki/National_Information_Network"><u>“National Information Network” (NIN)</u></a>.</p><p>Just a day later, on June 18, an extended third shutdown was put into place, this one lasting from 12:50 UTC (16:20 local time) through 05:00 UTC (08:30 local time) on June 25. Once again, the shutdown was <a href="https://techcrunch.com/2025/06/20/irans-government-says-it-shut-down-internet-to-protect-against-cyberattacks/"><u>reportedly implemented as a means of protecting against cyberattacks</u></a>, with a government spokesperson commenting “<i>We have previously stated that if necessary, we will certainly switch to a national internet and restrict global internet access. Security is our main concern, and we are witnessing cyberattacks on the country’s critical infrastructure and disruptions in the functioning of banks. Many of the enemy’s drones are managed and controlled via the internet, and a large amount of information is exchanged this way. A cryptocurrency exchange was also hacked, and considering all these issues, we have decided to impose Internet restrictions.</i>” This shutdown resulted in a near-complete loss of traffic through 02:00 UTC (05:30 local time) on June 21, when some traffic recovery was observed, though at levels remaining well-below pre-shutdown volumes. Traffic from this partial recovery settled into a consistent cycle for several days, until returning to expected levels on June 25. The same network providers impacted by the previous shutdowns were affected by this one as well.</p>
    <div>
      <h3>Iraq</h3>
      <a href="#iraq">
        
      </a>
    </div>
    <p>Consistent with measures taken over the past several years (<a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown/"><u>2024</u></a>, <a href="https://blog.cloudflare.com/exam-internet-shutdowns-iraq-algeria/"><u>2023</u></a>, <a href="https://blog.cloudflare.com/q2-2022-internet-disruption-summary/#schools-in-internets-out"><u>2022</u></a>), governments in <a href="https://radar.cloudflare.com/traffic/iq"><u>Iraq</u></a> again implemented regular Internet shutdowns in an effort to prevent cheating on national exams. (We say “governments” here because the shutdowns took place both in the main part of the country and in the Iraqi Kurdistan region in the northern part of the country.)</p><p>Occurring between 03:00 - 05:00 UTC (<a href="https://www.moc.gov.iq/?article=1015"><u>06:00 - 08:00 local time</u></a>) at the request of the Ministry of Education, the shutdowns in the main part of the country started on May 20 and ran through June 4 for middle school exams, and from June 14 until July 3 for <a href="https://www.facebook.com/Iraq.Ministry.of.Education/posts/pfbid0a7VuMttRxdoGWwuaymy38LcZw9jscz3Dfxup4aUue2LeRBPuU2c7vnDsZKbgCkE2l"><u>preparatory school exams</u></a>. Network providers that implemented the shutdowns included <a href="https://radar.cloudflare.com/traffic/as199739"><u>Earthlink (AS199739)</u></a>, <a href="https://radar.cloudflare.com/traffic/as51684"><u>Asiacell (AS51684)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59588"><u>Zainas (AS59588)</u></a>, <a href="https://radar.cloudflare.com/traffic/as58322"><u>Halasat (AS58322)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as203214"><u>HulumTele (AS203214)</u></a>.</p><p>In the Kurdistan region, the shutdowns began June 1, and ran through July 6, <a href="https://x.com/TwanaOth/status/1930380416374002119"><u>taking place between 03:30 - 04:30 UTC (06:30 - 07:30 local time)</u></a> on Wednesdays and Sundays. Network providers that implemented the shutdowns included <a href="https://radar.cloudflare.com/traffic/as48492"><u>IQ Online (AS48492)</u></a>, <a href="https://radar.cloudflare.com/traffic/as59625"><u>KorekTel (AS59625)</u></a>, <a href="https://radar.cloudflare.com/traffic/as21277"><u>Newroz Telecom (AS21277)</u></a>, and <a href="https://radar.cloudflare.com/traffic/as206206"><u>KNET (AS206206)</u></a>.</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>As Iraq does, <a href="https://radar.cloudflare.com/traffic/sy"><u>Syria</u></a> also implements nationwide Internet shutdowns to prevent cheating on exams, and has been doing so for several years (<a href="https://blog.cloudflare.com/syria-exam-related-internet-shutdowns/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/syria-sudan-algeria-exam-internet-shutdown/"><u>2022</u></a>, <a href="https://blog.cloudflare.com/q2-2023-internet-disruption-summary/#syria"><u>2023</u></a>, <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown/"><u>2024</u></a>). However, in contrast to previous years, in 2025, the government only ordered the cutoff of cellular connectivity, with a <a href="https://t.me/TrbyaGov/1869"><u>published statement</u></a> noting (translated) “<i>As part of our commitment to ensuring the integrity of public examinations and safeguarding the future of our dear students, and based on our national responsibility to secure a fair and transparent examination environment, </i><b><i>a temporary cellular communications blackout will be implemented in areas near examination centers across the Syrian Arab Republic</i></b><i>. … The cellular communications blackout will be implemented exclusively within the narrowest possible geographical and timeframe, during the time students are in exam halls.</i>”</p><p>During the second quarter, the shutdowns associated with the “Basic Education Certificate” took place on June 21, 24, and 29 between 05:15 - 06:00 UTC (08:15 - 09:00 local time). Exams and associated shutdowns for the “Secondary Education Certificate” are scheduled to take place between July 12 and August 3.</p><p>Because these shutdowns only impacted mobile connectivity, they only resulted in a partial drop in announced IP address space, as opposed to a more complete loss <a href="https://radar.cloudflare.com/routing/sy?dateStart=2024-05-19&amp;dateEnd=2024-06-15#announced-ip-address-space"><u>as seen in previous years</u></a>.</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>On June 21, an <a href="https://x.com/AsepPanama/status/1936462415278854469"><u>X post</u></a> from <a href="https://asep.gob.pa/"><u>ASEP Panamá</u></a> (the telecommunications regulating agency) announced that (translated) “<i>...in compliance with Cabinet Decree No. 27 of June 20, 2025, and by formal instruction from the Ministry of Government, the temporary suspension of mobile telephony and residential internet services in the province of Bocas del Toro has been coordinated.</i>” The suspension, according to the post, was supposed to be in place until June 25, however a <a href="https://x.com/AsepPanama/status/1937982698624057637"><u>subsequent X post</u></a> noted that it would be extended until Sunday, June 29, 2025.</p><p>The suspension of Internet connectivity was <a href="https://www.ipandetec.org/panama/panama-debe-restablecer-internet-bocas/"><u>implemented in response to</u></a> protests and demonstrations against reforms to the Social Security Fund, retirement, and pensions, specifically in the province of Bocas del Toro.</p><p>The graph below shows an effective loss of traffic from <a href="https://radar.cloudflare.com/traffic/as18809"><u>Cable Onda (AS18809)</u></a> in Bocas Del Toro, <a href="https://radar.cloudflare.com/traffic/pa"><u>Panama</u></a> around 03:30 UTC on June 21 (22:30 local time on June 20), recovering around 06:00 UTC (01:00 local time) on June 30. The recovery is in line with the <a href="https://x.com/AsepPanama/status/1939682983440421070"><u>final related X post</u></a> from ASEP, which noted (translated) “<i>... Internet and cellular telephone services in the province of Bocas del Toro have been restored as of 12:01 a.m. on Monday, June 30…</i>”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hqsqe4t1DRZHzqWXiMzZr/a1186cdc13145745fafb4e9869b4481e/Jun_30_-_Panama_-_Bocas_del_Toro_-_AS18809-_1200px.png" />
            
            </figure>
    <div>
      <h2>Power outages lead to Internet outages</h2>
      <a href="#power-outages-lead-to-internet-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Portugal &amp; Spain</h3>
      <a href="#portugal-spain">
        
      </a>
    </div>
    <p>The big power outage story during the second quarter was the massive outage across much of <a href="https://radar.cloudflare.com/traffic/pt"><u>Portugal</u></a> and <a href="https://radar.cloudflare.com/traffic/es"><u>Spain</u></a> on April 28. The impact of the event was covered in detail in the <a href="https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/"><i><u>How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity</u></i><u> blog post</u></a>, which explored shifts in traffic at a country/network/regional level, as well as how the power outage impacted network quality and announced IP address space.</p><p>In Portugal, Internet traffic dropped as the power grid failed — when compared with the previous week, traffic fell ~50 % immediately and within five hours it was ~90% below the week before.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67Ep5vwyVnCunhfFHqlIGI/ec1d3eacdddc905bfa3a0aedf714c82f/BLOG-2817_2.png" />
          </figure><p>In Spain, Internet traffic dropped as the power grid failed, with traffic immediately dropping by around 60% as compared to the previous week, falling to approximately 80% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5mo4BDO1G0U42ibybDKwVY/857b84436db9db2aa5a7f46f17293923/Screenshot_2025-07-18_at_10.45.07%C3%A2__AM.png" />
          </figure><p>In both countries, traffic returned to expected levels around 01:00 local time (midnight UTC) on April 29. More details about the outage can be found in the blog post linked above.</p>
    <div>
      <h3>Morocco</h3>
      <a href="#morocco">
        
      </a>
    </div>
    <p>It appears that <a href="https://radar.cloudflare.com/traffic/ma"><u>Morocco</u></a> may have also been impacted in some fashion by the Portugal/Spain power outage, or at least Orange Maroc was. In a <a href="https://x.com/OrangeMaroc/status/1916866583047147690"><u>post on X</u></a>, the provider stated (translated) “<i>Internet traffic has been disrupted following a massive power outage in Spain and Portugal, which is affecting international connections.</i>” <a href="https://radar.cloudflare.com/traffic/as36925?dateStart=2025-04-28&amp;dateEnd=2025-04-29"><u>Traffic from the network (AS36925)</u></a> fell sharply around 12:00 UTC (13:00 local time), 90 minutes after the power outage began, with a full outage beginning around 15:00 UTC (16:00 local time). Traffic returned to expected levels around 23:30 UTC on April 28 (00:30 local time on April 29).</p>
    <div>
      <h3>Puerto Rico</h3>
      <a href="#puerto-rico">
        
      </a>
    </div>
    <p><a href="https://genera-pr.com/sobre-nosotros"><u>Genera PR</u></a>, a power company in <a href="https://radar.cloudflare.com/traffic/pr"><u>Puerto Rico</u></a>, <a href="https://x.com/Genera_PR/status/1912562399741100112"><u>posted on X</u></a> on April 16 that they had (translated) <i>“...experienced a massive power outage across the island due to the unexpected shutdown of all generating plants, including those of Genera PR and other private generators. This situation has caused a significant disruption to electrical service…</i>” <a href="https://lumapr.com/"><u>Luma Energy</u></a>, the private power company that is responsible for power distribution and power transmission in Puerto Rico, <a href="https://x.com/lumaenergypr/status/1912554580400812243"><u>published their own X post</u></a> that stated (translated) “<i>Approximately at 12:40pm, an event was recorded that affects the service island-wide.</i>”</p><p>Although the reported power outage was “massive” and “island-wide”, it did not have an outsized impact on <a href="https://radar.cloudflare.com/traffic/pr?dateStart=2025-04-13&amp;dateEnd=2025-04-19#traffic-trends">Puerto Rico’s Internet traffic</a>, which <a href="https://bsky.app/profile/radar.cloudflare.com/post/3lmxq2gfxtg2c"><u>initially dropped by about 40%</u></a>. Over the next several days, both companies published multiple updates to their X accounts detailing the progress being made in restoring service. By 15:00 UTC (11:00 local time) on April 18, traffic had returned to expected levels, in line with a post from Luma Energy that noted (translated) “<i>As of 10:00 a.m. on April 18, and thanks to LUMA’s extraordinary response and the tireless efforts of the island’s workforce—in coordination with the Puerto Rico government and generating companies—LUMA has restored electric service to 1,450,367 customers, representing 98.8% of total customers, in less than 38 hours since the island-wide outage began.</i>”</p><p>As seen in the graphs below, the power outage not only impacted end-user connectivity, driving the observed drop in traffic, but also had some impact on local Internet infrastructure, with some disturbance visible to <a href="https://radar.cloudflare.com/routing/pr?dateStart=2025-04-13&amp;dateEnd=2025-04-19#announced-ip-address-space">announced IP address space</a>.</p>
    <div>
      <h3>Saint Kitts and Nevis</h3>
      <a href="#saint-kitts-and-nevis">
        
      </a>
    </div>
    <p>A <a href="https://www.facebook.com/skelecltd/posts/pfbid09PDXSuw7U9X3V83rvUSz7kLGnL77bqwstYgKXbkRZQQPeGDCw2pffiP1nRkRsEAxl"><u>Facebook post</u></a> from <a href="https://www.skelec.kn/"><u>SKELEC (The St. Kitts Electricity Company)</u></a> on May 9 alerted customers on <a href="https://radar.cloudflare.com/traffic/kn?dateStart=2025-05-09&amp;dateEnd=2025-05-09#traffic-trends"><u>St. Kitts and Nevis</u></a> that “<i>...a fault developed at our Needsmust Power Plant resulting in an island wide outage. Restoration has begun, and complete restoration will be in two hours.</i>” The post was published at 17:31 UTC (13:31 local time), approximately 30 minutes after the island’s Internet traffic initially dropped. Traffic recovery initially began around 17:45 UTC (13:45 local time), well within the two-hour estimate for complete power restoration. However, Internet traffic did not fully return to expected levels until 20:15 UTC (16:15 local time).</p>
    <div>
      <h3>North Macedonia</h3>
      <a href="#north-macedonia">
        
      </a>
    </div>
    <p>On May 18, it was <a href="https://seenews.com/news/voltage-spike-causes-power-outage-in-north-macedonia-1275427"><u>reported</u></a> that “<i>High voltages in the regional 400 kV network amid low consumption caused a short-term outage in </i><a href="https://radar.cloudflare.com/traffic/mk?dateStart=2025-05-18&amp;dateEnd=2025-05-18#traffic-trends"><i><u>North Macedonia</u></i></a><i>'s 110 kV transmission network…</i>”, according to state-owned power company <a href="https://en.wikipedia.org/wiki/MEPSO"><u>MEPSO</u></a>. While the outage reportedly impacted most of the country, MEPSO also noted that the country’s power supply was normalized within an hour after the outage began. Although brief, the power outage caused the country’s Internet traffic to drop by nearly 60% as compared to the previous week during the disruption, which occurred between 03:00 - 04:45 UTC (05:00 - 06:45 local time).</p>
    <div>
      <h3>Maldives</h3>
      <a href="#maldives">
        
      </a>
    </div>
    <p>On June 1, Internet traffic in the <a href="https://radar.cloudflare.com/traffic/mv?dateStart=2025-06-01&amp;dateEnd=2025-06-01#traffic-trends"><u>Maldives</u></a> dropped by nearly half as compared to the previous week when a <a href="https://mvrepublic.com/news/widespread-power-outage-causes-disruptions-across-greater-male/"><u>widespread power outage</u></a> affected the Greater Malé region. Local Internet service providers including <a href="https://x.com/OoredooMaldives/status/1929108987187970176"><u>Ooredoo</u></a> and <a href="https://x.com/Dhiraagu/status/1929095794659103186"><u>Dhiraagu</u></a> took to social media to warn subscribers of potential interruptions to both fixed and mobile broadband connections. At a country level, Internet traffic was disrupted between 07:30 - 13:00 UTC (12:30 - 18:00 local time).</p><p>The power outage also had a nominal impact on Internet infrastructure, as <a href="https://radar.cloudflare.com/routing/mv?dateStart=2025-06-01&amp;dateEnd=2025-06-01#announced-ip-address-space">announced IPv4 address space</a> saw a nominal drop (from 355 to 350 /24s) that began shortly after the initial drop in traffic was observed, but returned to normal as the disruption ended.</p>
    <div>
      <h3>Curaçao</h3>
      <a href="#curacao">
        
      </a>
    </div>
    <p>A near-complete Internet outage at provider <a href="https://radar.cloudflare.com/traffic/as52233?dateStart=2025-06-14&amp;dateEnd=2025-06-15"><u>Flow Curaçao (AS52233)</u></a> on June 14-15 <a href="https://www.curacaochronicle.com/post/opinion/flows-internet-outage-sparks-outrage-and-urgent-call-for-infrastructure-reform/"><u>sparked outrage</u></a> and <a href="https://www.curacaochronicle.com/post/local/curacaos-telecom-regulator-demands-answers-from-flow-after-major-internet-outage/"><u>demands for answers</u></a> by the country’s telecommunications regulator. Flow’s Internet traffic dropped significantly at 18:00 UTC (14:00 local time) on June 14, falling further in the following hours. Signs of recovery became visible around 11:00 UTC (07:00 local time) on June 15, with more complete recovery occurring at 14:00 UTC (10:00 local time). A <a href="https://www.facebook.com/FlowBarbados/posts/pfbid02iGV1LYdNajMprF8Anvgh3KzMZbc2k9BVbVdN4C8mrVZDdcoUEhiib23TQYgisrAxl"><u>Facebook post from Flow Barbados</u></a>, posted on June 18, referenced a local disruption that began on June 14, but pointed at a commercial power outage at one of their key regional network facilities in Curaçao, which was likely the driver of this Internet outage.</p>
    <div>
      <h2>Fiber optic cable damage</h2>
      <a href="#fiber-optic-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Two instances of damage to its fiber optic infrastructure caused a complete Internet outage at <a href="https://radar.cloudflare.com/traffic/as27653?dateStart=2025-05-28&amp;dateEnd=2025-05-29#http-traffic"><u>Digicel Haiti (AS27653)</u></a> as of 21:00 UTC (17:00 local time) on May 28, according to a (translated) <a href="https://x.com/jpbrun30/status/1927845676408258762"><u>X post</u></a> from the company’s Director General. The cable damage took the network completely off the Internet, as <a href="https://radar.cloudflare.com/routing/as27653?dateStart=2025-05-28&amp;dateEnd=2025-05-29#announced-ip-address-space">announced IPv4 and IPv6 address space</a> also dropped to zero. Digicel Haiti remained offline until 00:45 on May 29 (20:45 local time on May 28), when both traffic and announced IP address space returned to expected levels.</p>
    <div>
      <h3>Airtel Malawi</h3>
      <a href="#airtel-malawi">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/traffic/as37440?dateStart=2025-06-24&amp;dateEnd=2025-06-24#traffic-trends"><u>Airtel Malawi (AS37440)</u></a> experienced a 90-minute Internet outage on June 24, <a href="https://x.com/AirtelMalawiPlc/status/1937591557684916436"><u>caused by ongoing vandalism on their fiber network</u></a>. Although traffic effectively disappeared between 12:30 - 14:00 UTC (14:30 - 16:00 local time), the network remained at least partially online as at least some of the network’s <a href="https://radar.cloudflare.com/routing/as37440?dateStart=2025-06-24&amp;dateEnd=2025-06-24#announced-ip-address-space">IPv4 address space</a> continued to be announced to the Internet.  Announced IPv6 address space, however, fell to zero during the duration of the outage.</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Bell Canada</h3>
      <a href="#bell-canada">
        
      </a>
    </div>
    <p>A <a href="https://x.com/Bell_Support/status/1925225503507591222"><u>router update</u></a> gone awry disrupted Internet service for <a href="https://radar.cloudflare.com/traffic/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#http-traffic"><u>Bell Canada (AS577)</u></a> customers in Ontario and Quebec on May 21. An <a href="https://x.com/Bell_Support/status/1925187984543883486"><u>initial X post from the provider</u></a>, posted at 13:52 UTC (09:52 local time), alerted customers to the service interruption. The post trailed the start of the disruption by approximately a half hour, as traffic dropped around 13:15 UTC (09:15 local time), falling by as much as 70% as compared to the same time a week prior. Request traffic to Cloudflare’s <a href="https://radar.cloudflare.com/dns/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#dns-query-volume"><u>1.1.1.1 DNS Resolver</u></a> also saw a significant drop. A negligible decline in <a href="https://radar.cloudflare.com/routing/as577?dateStart=2025-05-21&amp;dateEnd=2025-05-21#announced-ip-address-space"><u>announced IPv4 address space</u></a> was also observed.</p><p>The disruption was fairly short-lived, with traffic returning to expected levels just an hour later. A subsequent <a href="https://x.com/Bell_Support/status/1925225503507591222"><u>X post</u></a> confirmed that services had been fully restored by 15:00 UTC (11:00 local time), with <a href="https://x.com/Bell_Support/status/1925225526198776050"><u>another post</u></a> noting that the initial update had been rolled back quickly to restore service. </p>
    <div>
      <h3>Lumen/CenturyLink </h3>
      <a href="#lumen-centurylink">
        
      </a>
    </div>
    <p>Across parts of the <a href="https://radar.cloudflare.com/traffic/us"><u>United States</u></a>, <a href="https://radar.cloudflare.com/traffic/as209?dateStart=2025-06-19&amp;dateEnd=2025-06-20#traffic-trends"><u>Lumen/CenturyLink (AS209)</u></a> customers experienced a widespread Internet service disruption on June 19. Traffic volumes dropped by over 50% as compared to the prior week starting around 21:45 UTC. The disruption only lasted a couple of hours, with traffic returning to normal by 00:00 UTC on June 20.</p><p>Social media posts from affected subscribers suggested that the problem might have been DNS related, as those that switched their DNS resolver to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1</u></a> were once again able to access the Internet. The graph below shows that <a href="https://radar.cloudflare.com/explorer?dataSet=dns&amp;loc=as209&amp;dt=2025-06-19_2025-06-20&amp;timeCompare=2025-06-12#result">traffic to 1.1.1.1 from Lumen/CenturyLink</a> exceeded levels seen the previous week as the disruption began, and remained elevated through June 20. Problems with an Internet service provider’s DNS resolver can appear to subscribers like an Internet outage, as they become unable to access anything requiring a DNS lookup (effectively, all Internet resources), ultimately resulting in a drop in traffic to those resources (from the affected user base), as seen in the graph above.</p>
    <div>
      <h2>Cyberattack impact</h2>
      <a href="#cyberattack-impact">
        
      </a>
    </div>
    
    <div>
      <h3>ASVT (Russia)</h3>
      <a href="#asvt-russia">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/traffic/ru"><u>Russian</u></a> Internet provider <a href="https://radar.cloudflare.com/traffic/as8752?dateStart=2025-05-28&amp;dateEnd=2025-06-05#traffic-trends"><u>ASVT (AS8752)</u></a> was <a href="https://therecord.media/moscow-internet-provider-asvt-ddos-attack"><u>reportedly</u></a> targeted by a major DDoS attack that resulted in a multi-day complete Internet outage. This attack followed one <a href="https://blog.cloudflare.com/q1-2025-internet-disruption-summary/#russia"><u>targeting Russian provider Nodex</u></a> (<a href="https://radar.cloudflare.com/traffic/AS29329"><u>AS29329</u></a>) in March, which also caused a complete service outage. <a href="https://tadviser.com/index.php/Company:ASVT"><u>Reaching</u></a> 70.07 Gbps/6.92 million packets/second, the attack caused traffic to drop to near zero around 05:00 UTC on May 28 (08:00 Moscow time), with the effective outage lasting for approximately 10 hours. Although traffic began to return around 15:00 UTC (18:00 Moscow time), it remained below expected levels throughout the following week.</p><p>Interestingly, <a href="https://radar.cloudflare.com/dns/as8752?dateStart=2025-05-28&amp;dateEnd=2025-06-05#dns-query-volume">query volume to Cloudflare’s 1.1.1.1 DNS Resolver from ASVT</a> saw a rapid increase as traffic began to return after the initial outage, and remained elevated throughout the duration of the disruption. It isn’t clear whether the increase could be related to problems with ASVT’s native DNS resolver during the attack, forcing users to seek alternative resolvers, or if it could be related to ASVT subscribers seeking ways around damage from the attack.</p>
    <div>
      <h2>Unexplained disruptions</h2>
      <a href="#unexplained-disruptions">
        
      </a>
    </div>
    
    <div>
      <h3>Telia Finland (April 1)</h3>
      <a href="#telia-finland-april-1">
        
      </a>
    </div>
    <p>According to a (now unavailable) <a href="https://www.telia.fi/asiakastuki/hairiotiedote?id=sabre_858055150&amp;lang=fi"><u>“Disturbance bulletin”</u></a> and an <a href="https://x.com/teliafinland/status/1906966248790868230"><u>associated X post</u></a> from <a href="https://radar.cloudflare.com/traffic/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#traffic-trends"><u>Telia Finland (AS1759)</u></a>, the company acknowledged that “<i>A widespread disruption has been detected in the operation of mobile network data connections and fixed broadband.</i>” The widespread disruption resulted in a brief near-complete outage for subscribers between 06:30 - 07:15 UTC (09:30 - 10:15 local time).</p><p>Telia Finland did not disclose the cause of the disruption, but it is clear that it impacted IPv4 connectivity, as seen in the graph below showing <a href="https://radar.cloudflare.com/routing/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#announced-ip-address-space">announced IPv4 address space</a>. (<a href="https://radar.cloudflare.com/routing/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#announced-ip-address-space"><u>Announced IPv6 address space</u></a> did not see any change.) This loss of IPv4 connectivity resulted in a concurrent spike in the share of traffic from Telia Finland over IPv6 — normally below 5%, it spiked above 30% during the disruption. Request traffic <a href="https://radar.cloudflare.com/dns/as1759?dateStart=2025-04-01&amp;dateEnd=2025-04-01#dns-query-volume"><u>to Cloudflare’s 1.1.1.1 resolver from Telia Finland</u></a> also spiked at that time.</p>
    <div>
      <h3>SkyCable</h3>
      <a href="#skycable">
        
      </a>
    </div>
    <p>Around 19:15 UTC on May 7 (03:15 local time on May 8), subscribers of <a href="https://radar.cloudflare.com/traffic/as23944?dateStart=2025-05-07&amp;dateEnd=2025-05-08#traffic-trends"><u>SkyCable (AS23944)</u></a> in the <a href="https://radar.cloudflare.com/traffic/ph"><u>Philippines</u></a> experienced a complete Internet outage. Internet traffic from the network dropped to zero, as did <a href="https://radar.cloudflare.com/routing/as23944?dateStart=2025-05-07&amp;dateEnd=2025-05-08#announced-ip-address-space">announced IPv4 address space</a>. The disruption lasted until 03:00 UTC on May 8 (11:00 local time), and SkyCable did not publish any information regarding the cause of the eight-hour service outage.</p>
    <div>
      <h3>TrueMove H</h3>
      <a href="#truemove-h">
        
      </a>
    </div>
    <p>On May 22, <a href="https://radar.cloudflare.com/traffic/th"><u>Thai</u></a> mobile provider <a href="https://radar.cloudflare.com/traffic/as132061?dateStart=2025-05-22&amp;dateEnd=2025-05-22#http-traffic"><u>TrueMove H (AS132061)</u></a> <a href="https://www.kaohooninternational.com/markets/558192"><u>suffered a nationwide outage</u></a>, impacting connectivity for subscribers. The provider <a href="https://www.nationthailand.com/news/general/40050305"><u>acknowledged and apologized</u></a> for the disruption, but did not provide an official reason for the outage. (An <a href="https://www.nationthailand.com/news/general/40050309"><u>article</u></a> in the local press reported “<i>that the outage was caused by technical errors on True’s computer servers</i>” and also stated that others suggested that “<i>the problem might have been caused by an error on True’s DNS servers</i>”.)</p><p>At 03:00 UTC (10:00 local time), traffic initially dropped by over 80% as compared to the prior week. Almost immediately, traffic began to slowly recover, and returned to expected levels around 08:00 UTC (15:00 local time). A brief <a href="https://radar.cloudflare.com/routing/as132061?dateStart=2025-05-22&amp;dateEnd=2025-05-22#announced-ip-address-space"><u>partial drop in announced IPv4 address space was also observed</u></a> during the first hour of the disruption.</p>
    <div>
      <h3>Digicel Haiti</h3>
      <a href="#digicel-haiti">
        
      </a>
    </div>
    <p>Two days after experiencing <a href="#fiber-optic-cable-damage"><u>an outage due to cable damage</u></a>, <a href="https://radar.cloudflare.com/traffic/as27653?dateStart=2025-05-30&amp;dateEnd=2025-05-30#traffic-trends"><u>Digicel Haiti (AS27653)</u></a> experienced another complete outage on May 30. In contrast to the previous outage, no additional information about this one was published on social media by <a href="https://x.com/DigicelHT"><u>Digicel Haiti</u></a> or its <a href="https://x.com/jpbrun30"><u>Director General</u></a>. The network effectively disappeared from the Internet at 14:15 UTC (10:15 local time), with both traffic and <a href="https://radar.cloudflare.com/routing/as27653?dateStart=2025-05-30&amp;dateEnd=2025-05-30#announced-ip-address-space">announced IP address space</a> (IPv4 &amp; IPv6) dropping to zero. The outage lasted nearly three hours, with traffic and announced IP space all returning around 17:00 UTC (13:00 local time).</p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>On June 10, an Internet outage in <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#traffic-trends"><u>Syria</u></a> <a href="https://www.profilenews.com/en/breaking-internet-outage-in-syria/"><u>reportedly</u></a> affected the ADSL landline network across multiple provinces. Traffic dropped by as much as two-thirds below the same time the previous week at 08:15 UTC (11:15 local time), with the disruption lasting two hours. <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#announced-ip-address-space">Announced IPv4 address space</a> also fell during the course of the outage, indicating a potential infrastructure issue. However, as seen below, <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-06-10&amp;dateEnd=2025-06-10#dns-query-volume">request volume from Syria to Cloudflare’s 1.1.1.1 DNS resolver</a> was also elevated during the outage. This behavior has been observed in the past during government-directed shutdowns of Internet connectivity in Syria, when traffic can leave the country, but not return. There was no other indication that this outage was due to an intentional shutdown, but no official explanation for the disruption was available.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Government-directed Internet shutdowns returned with a vengeance in the second quarter, and that trend continues into the third quarter, though the latest ones have been exam-related, and not driven by protests. And while power-outage related Internet disruptions have frequently been observed in the past, often in smaller countries with less stable infrastructure, the massive outage in Spain and Portugal on April 28 reminds us that much like the Internet, electrical infrastructure is often interconnected across countries, meaning that problems in one can potentially cause significant problems in others.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">37sa5eHdRj16s4vvvhEDGY</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Hyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/</link>
            <pubDate>Tue, 15 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the second quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. One notable target was an independent Eastern European news outlet protected by Cloudflare, which reported being attacked following its coverage of a local Pride parade during LGBTQ Pride Month.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks continue to break records. During 2025 Q2, Cloudflare automatically blocked the largest ever reported DDoS attacks, peaking at <a href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/"><u>7.3 terabits per second (Tbps)</u></a> and 4.8 billion packets per second (Bpps).</p></li><li><p>Overall, in 2025 Q2, hyper-volumetric DDoS attacks skyrocketed. Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, an average of 71 per day. </p></li><li><p>Although the overall number of DDoS attacks dropped compared to the previous quarter — which saw an unprecedented surge driven by a large-scale campaign targeting Cloudflare’s network and critical Internet infrastructure protected by Cloudflare — the number of attacks in 2025 Q2 were still 44% higher than in 2024 Q2. <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">Critical infrastructure</a> continues to face sustained pressure, with the Telecommunications, Service Providers, and Carriers sector jumping again to the top as the most targeted industry.</p></li></ul><p>All the attacks in this report were automatically detected and blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4D7sY9wWyZAarqgEOuudjL/4a1a424dd002a85cd65ebd2678deeb9b/image11.png" />
          </figure><p>To learn more about DDoS attacks and other types of cyber threats, refer to our <a href="https://www.cloudflare.com/learning/"><u>Learning Center</u></a>. Visit <a href="https://radar.cloudflare.com/reports?q=DDoS"><u>Cloudflare Radar</u></a> to view an interactive version of this report where you can drill down further. Radar also offers a <a href="https://developers.cloudflare.com/radar/"><u>free API</u></a> for those interested in investigating Internet trends. You can also learn more about the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><u>methodologies</u></a> used in preparing these reports.</p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare mitigated 7.3 million DDoS attacks — down sharply from 20.5 million in Q1, when an 18-day campaign against Cloudflare’s own and other critical infrastructure protected by Cloudflare, drove 13.5 million of those attacks. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66gdansdUZd0UgyFW8bQQu/8e1cde9766c737d0f33354cab8425a9f/image13.png" />
          </figure><p><sup>DDoS attacks by quarter</sup></p><p>We’ve just crossed halfway through 2025, and so far Cloudflare has already blocked 27.8 million DDoS attacks, equivalent to 130% of all the DDoS attacks we blocked in the full calendar year 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zwR5A7JjeS1yH37j0VRlM/2bbc86d197f6bb53de5f86c2fa975b0a/image7.png" />
          </figure><p><sup>DDoS attacks by year</sup></p><p>Breaking it down further, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3/Layer 4 (L3/4) DDoS attacks</u></a> plunged 81% quarter-over-quarter to 3.2 million, while HTTP DDoS attacks rose 9% to 4.1 million. Year-over-year changes remain elevated. Overall attacks were 44% higher than 2024 Q2, with HTTP DDoS attacks seeing the largest increase of 129% YoY.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dxz1L4L4Y8ihvTxdKZRZf/7294397a7957d4f186ac80b43eabb5a0/image8.png" />
          </figure><p><sup>DDoS attacks by month</sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, averaging 71 hyper-volumetric attacks per day. Hyper-volumetric attacks include L3/4 DDoS attacks exceeding 1 Bpps or 1 Tbps, and HTTP DDoS attacks exceeding 1 million requests per second (Mrps).</p><p>The number of hyper-volumetric DDoS attacks exceeding 100 million packets per second (pps) surged by 592% compared to the previous quarter, and the number exceeding 1 billion pps and 1 terabits per second (Tbps) doubled compared to the previous quarter. The number of HTTP DDoS attacks exceeding 1 million rps (rps) remained the same at around 20 million in total, an average of almost 220,000 attacks every day.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2yDy1OKIjVSssQrxTuHoLx/452dcdd5d2aacc936cb4a6b4ec7f9317/image4.png" />
          </figure><p><sup>Hyper-volumetric DDoS attacks in 2025 Q2</sup></p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When asked who was behind the DDoS attacks they experienced in 2025 Q2, the majority (71%) of respondents said they didn’t know who attacked them. Of the remaining 29% of respondents that claimed to have identified the threat actor, 63% pointed to competitors, a pattern especially common in the Gaming, Gambling and Crypto industries. Another 21% attributed the attack to state-level or state-sponsored actors, while 5% each said they’d inadvertently attacked themselves (self-DDoS), were targeted by extortionists, or suffered an assault from disgruntled customers/users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1rGHPX3t7S9KpTde5udYKi/ba0e11669b7d38520c221f190f500e14/image5.png" />
          </figure><p><sup>Top threat actors reported in 2025 Q2</sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>The percentage of attacked Cloudflare customers that reported being targeted by a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attack</u></a> or that were threatened increased by 68% compared to the previous quarter, and by 6% compared to the same quarter in 2024. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78PZiUidGYsY2qS9KY7eFl/0e132812ede418be620a48c882ba37b2/image6.png" />
          </figure><p><sup>Ransom DDoS attacks by quarter 2025 Q2</sup></p><p>Diving deeper, Ransom DDoS attacks soared in June 2025. Around a third of respondents reported being threatened or subjected to Ransom DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Urv9538LpsEoZFNNfha7o/871c9d30431df06b2c0962729191b482/image9.png" />
          </figure><p><sup>Ransom DDoS attacks by month 2025 Q2</sup></p>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked locations in 2025 Q2 shifted significantly. China climbed two spots to reclaim first place, Brazil jumped four spots to second place, Germany slipped two spaces to third place, India edged up one to fourth, and South Korea rose four to fifth. Turkey fell four places to sixth, Hong Kong dropped three to seventh, and Vietnam vaulted an astonishing fifteen spots into eighth. Meanwhile, Russia rocketed forty places to ninth, and Azerbaijan surged thirty-one to round out the top ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HNdD7VgymVfuJBZtV5bII/ed6eed8f676ba0a0d7cec9a595521903/image19.png" />
          </figure><p><sup>The locations most targeted by DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these attacked locations are determined by the billing country of the Cloudflare customer whose services were targeted — not that those nations themselves are under attack. In other words, a high rank simply means more of our registered customers in that billing jurisdiction were targeted by DDoS traffic, rather than implying direct geopolitical targeting.</p>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked industries in 2025 Q2 also saw notable movement. Telecommunications, Service Providers and Carriers climbed one spot to claim first place, while the Internet sector jumped two spots to second place. Information Technology &amp; Services held its placement as third most attacked, and Gaming rose one spot to fourth place. Gambling &amp; Casinos slipped four spots to fifth place, and the Banking &amp; Financial Services industry remained in sixth place. Retail inched up one spot to seventh place, and Agriculture made a dramatic 38-place leap into eighth. Computer Software climbed two spots to ninth place, and Government hopped two places to round out the top ten most attacked industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YTWU2MwLdGg5SumDgAogC/ec6e812c894cbe14490f74b90fa4da94/image20.png" />
          </figure><p><sup>The top attacked industries of DDoS attacks for 2025 Q2</sup></p>
    <div>
      <h2>Top sources of DDoS attacks</h2>
      <a href="#top-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>The ranking of the top 10 largest sources of DDoS attacks in 2025 Q2 also saw several shifts compared to the previous quarter. Indonesia climbed one spot to claim the first place, Singapore jumped two places to second place, Hong Kong dropped two places to third, Argentina slipped one space as fourth and Ukraine held on as the fifth-largest source of DDoS attacks. Russia surged six spots as the sixth-largest source, followed by Ecuador who jumped seven places. Vietnam inched up one place as the eighth-largest source. The Netherlands moved up four places as the ninth-largest source, and Thailand fell three places as the tenth-largest source of DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6X8C3xPqQ08FYLCe7BE0Sm/997ae266e8ddfa19c8d320a2448cb793/image10.png" />
          </figure><p><sup>The top sources of DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these “source” rankings reflect where botnet nodes, proxy or VPN endpoints reside — not the actual location of threat actors. For L3/4 DDoS attacks, where <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>IP spoofing</u></a> is rampant, we geolocate each packet to the Cloudflare data center that first ingested and blocked it, drawing on our presence in over 330 cities for truly granular accuracy.</p>
    <div>
      <h2>Top source networks of DDoS attacks</h2>
      <a href="#top-source-networks-of-ddos-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>For the first time in about a year, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> network dropped from the first place as the largest source of HTTP DDoS attack to the third place. In its place, German-based <a href="https://radar.cloudflare.com/as200373"><u>Drei-K-Tech-GmbH (AS200373)</u></a>, also known as 3xK Tech, jumped 6 places as the number one largest source of HTTP DDoS attacks. The US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> hopped one spot to the second place. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hfTFpswSIsQwpZVoKlvUs/0897717483b4dcefa02fbce1fa8b6b48/image22.png" />
          </figure><p><sup>The top 10 ASN sources of HTTP DDoS attacks</sup></p><p>As can be seen in the chart above, 9 out of 10 ASNs listed offer <a href="https://www.cloudflare.com/learning/cloud/what-is-a-virtual-machine/"><u>virtual machines (VMs)</u></a>, hosting, or cloud services which indicate the common use of VM-based botnets. These botnets are <a href="https://blog.cloudflare.com/ddos-threat-report-2023-q2/#the-rise-of-the-virtual-machine-botnets"><u>estimated to be 5,000x stronger</u></a> than IoT-based botnets. Only <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> is primarily an ISPs/telecom carriers without significant public VM/cloud offerings.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17jMjLVEx0puvK14GOozDo/7a12fbb2816ace763098d0ef86203740/image2.png" />
          </figure><p><sup>IoT-based botnets versus VM-based botnets</sup></p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed, and we’ve already seen great collaboration across the community to take down botnet nodes. This is possible thanks to the threat feed which provides these service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p><p>With a simple API call, service providers can get a list of offending IPs from within their network. An example response is provided below.</p>
            <pre><code>{
  "result": [
    {
      "cidr": "127.0.0.1/32",
      "date": "2024-05-05T00:00:00Z",
      "offense_count": 10000
    },
    // ... other entries ...
  ],
  "success": true,
  "errors": [],
  "messages": []
}</code></pre>
            <p><sup>Example response from the free ISP DDoS Botnet Threat Feed API</sup></p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h3>Defending against DDoS Botnets</h3>
      <a href="#defending-against-ddos-botnets">
        
      </a>
    </div>
    <p>In Q2 2025, the majority (71%) of HTTP DDoS attacks were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/"><u>botnets</u></a>. Rapid detection and blocking of these attacks was possible as a result of operating a massive network and seeing many different types of attacks and botnets. By leveraging real-time threat intelligence, our systems are able to incriminate DDoS botnets very fast, contributing to a more effective mitigation. Even if a DDoS botnet has been incriminated while targeting only one website or IP address, our entire network and customer base is immediately protected against it. This real-time threat intelligence system adapts with botnets as they morph and change nodes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PtgDqHMGY52nVPAoBy6o2/f51af7ded6817ff568ad22701a17a47e/image1.png" />
          </figure><p><sup>The top HTTP DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h2>L3/4 attack vectors</h2>
      <a href="#l3-4-attack-vectors">
        
      </a>
    </div>
    <p>In Q2 2025, <a href="#dns-flood-attack">DNS flood</a> attacks were the top L3/4 attack vector accounting for almost a third of all L3/4 DDoS attacks. <a href="#syn-flood-attack">SYN floods</a> was the second most common attack vector, dipping from 31% in Q1 to 27% in Q2. </p><p>In third place, <a href="#udp-ddos-attack">UDP floods</a> also grew meaningfully, rising from 9% in Q1 to 13% in Q2. RST floods, another form of TCP-based DDoS attacks, accounting for 5% of all L3/4 attacks, was the fourth most common vector. Rounding out the top five, <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP floods</u></a> edged into fifth place at 3% despite a decline from 4.3% last quarter, but enough to push the previously prevalent <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai attacks</u></a> (which fell from 18% in Q1 to just 2% in Q2) out of the top five altogether.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QzJzqm583fTd4r5fGiz3q/af7aad3201ccee3004c18d9a8c326b76/image15.png" />
          </figure><p><sup>The top L3/4 DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top 3 L3/4 DDoS attack vectors</h3>
      <a href="#breakdown-of-the-top-3-l3-4-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Below are details about the top 3 most common L3/4 DDoS attacks. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>DNS Flood Attack</h4>
      <a href="#dns-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> A DNS flood aims to overwhelm a DNS server with a high volume of DNS queries—either valid, random, or malformed—to exhaust CPU, memory, or bandwidth. Unlike amplification attacks, this is a direct flood aimed at degrading performance or causing outages, often over UDP port 53, but sometimes over TCP as well (especially for DNS-over-TCP or <a href="https://www.cloudflare.com/learning/dns/dnssec/how-dnssec-works/"><u>DNSSEC</u></a>-enabled zones). Learn more about <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#dns-flood-attack">DNS attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/dns/"><u>Cloudflare DNS</u></a> as primary or secondary, <a href="https://www.cloudflare.com/dns/dns-firewall/"><u>Cloudflare DNS Firewall</u></a> and/or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and mitigate query floods before they reach your origin. Cloudflare’s global network handles tens of millions of DNS queries per second with built-in DDoS filtering and query caching, blocking malformed or excessive traffic while answering legitimate requests.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid blocking all DNS traffic or disabling UDP port 53, which would break normal resolution. Rely on Cloudflare’s DNS-specific protection such as the <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/"><u>Advanced DNS Protection system</u></a>, and deploy DNSSEC-aware protection to handle TCP-based query floods safely.</p></li></ul>
    <div>
      <h4>SYN Flood Attack</h4>
      <a href="#syn-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> In a SYN flood, threat actors send a large volume of TCP SYN packets—often with spoofed IP addresses—to initiate connections that are never completed. This leaves the target system with half-open connections, consuming memory and connection tracking resources, potentially exhausting server limits and preventing real clients from connecting. Learn more about <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to intercept and mitigate TCP SYN floods at the edge. Cloudflare leverages SYN cookies, connection tracking, and behavioral analysis to distinguish real clients from spoofed or malicious sources, ensuring legitimate TCP connections are completed successfully. Using Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/cdn/"><u>CDN</u></a>/<a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> services or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> which are both reverse-proxy services for HTTP or TCP, respectively. Using a reverse-proxy basically eliminates the possible impact of TCP-based DDoS attacks.</p></li><li><p><b>How to avoid unintended impact:</b> Blocking all SYN traffic or applying aggressive timeouts can block real users. Instead, rely on <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/"><u>Cloudflare’s Advanced TCP protection system</u></a>, which uses SYN rate shaping, anomaly detection, and spoofed-packet filtering to mitigate attacks without affecting genuine client connections.</p></li></ul>
    <div>
      <h4>UDP DDoS attack</h4>
      <a href="#udp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Flood</p></li><li><p><b>How it works</b>: A high volume of UDP packets is sent to random or specific ports on the target IP address(es). It may attempt to saturate the Internet link or overwhelm its in-line appliances with more packets than it can handle in order to create disruption or an outage. Learn more about <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP attacks</a>.</p></li><li><p><b>How to defend against the attack</b>: Deploy cloud-based volumetric DDoS protection that can fingerprint attack traffic in real-time such as <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a>, apply smart rate-limiting on UDP traffic, and drop unwanted UDP traffic altogether with the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a>.</p></li><li><p><b>How to avoid unintended impact</b>: Aggressive filtering may disrupt legitimate UDP services such as VoIP, video conferencing, or online games. Apply thresholds carefully.</p></li></ul>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Among emerging L3/4 DDoS threats in 2025 Q2, <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#teeworlds-ddos-attack">Teeworlds flood</a> saw the biggest spike. These attacks jumped 385% QoQ, followed by the <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#ripv1-ddos-attack"><u>RIPv1 flood</u></a>, which surged 296%. <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#rdp-ddos-attack"><u>RDP floods</u></a> climbed by 173%, and <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#demonbot-ddos-attack"><u>Demon Bot floods</u></a> increased by 149%. Even the venerable <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#vxworks-flood-ddos-attack"><u>VxWorks flood</u></a> made a comeback, rising 71% quarter-over-quarter. These dramatic upticks highlight threat actors’ ongoing experimentation with lesser-known and legacy protocols to evade standard defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70OHdfj3auYqnHGCc2s1P0/1beaa1427cc5007fa069f028c0c1bb4c/image14.png" />
          </figure><p><sup>The top emerging threats for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top emerging threats</h3>
      <a href="#breakdown-of-the-top-emerging-threats">
        
      </a>
    </div>
    <p>Below are details about the emerging threats for 2025 Q2, mostly recycling of very old attack vectors. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>Teeworlds DDoS Attack</h4>
      <a href="#teeworlds-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/Teeworlds"><u>Teeworlds</u></a> is a fast-paced, open-source 2D multiplayer shooter game that uses a custom UDP-based protocol for real-time gameplay. Threat actors flood the target’s game server with spoofed or excessive UDP packets that mimic in-game actions or connection attempts. This can overwhelm server resources and cause lag or outages.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect the servers. Cloudflare automatically detects and mitigates these types of attacks using real-time fingerprinting, blocking attack traffic while allowing real players through. Magic Transit also provides a packet-level firewall capability, the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a> which can be used to craft custom protection.</p></li><li><p><b>How to avoid unintended impact:</b> When crafting custom rules, avoid blocking or aggressively rate-limiting UDP port 8303 directly as it can disrupt overall gameplay. Instead, rely on intelligent detection and mitigation services to avoid affecting legitimate users.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/608xA7d6AuPV38WCXWcfxj/1d00cec07300ecd15b99c9ca5d0bb07c/image17.png" />
          </figure><p><sup>Teeworlds Screenshot Jungle. Source: </sup><a href="https://commons.wikimedia.org/wiki/File:Teeworlds_Screenshot_Jungle_0.6.1.png"><sup><u>Wikipedia</u></sup></a></p>
    <div>
      <h4>RIPv1 DDoS attack</h4>
      <a href="#ripv1-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + (Low) Amplification</p></li><li><p><b>How it works</b>: Exploits the Routing Information protocol version 1 (RIPv1), an old unauthenticated distance-vector routing protocol that uses UDP/520. Threat actors send spoofed routing updates to flood or confuse networks.</p></li><li><p><b>How to prevent becoming a reflection / amplification element</b>: Disable RIPv1 on routers. Use RIPv2 with authentication where routing is needed.</p></li><li><p><b>How to defend against the attack</b>: Block inbound UDP/520 from untrusted networks. Monitor for unexpected routing updates.</p></li><li><p><b>How to avoid unintended impact</b>: RIPv1 is mostly obsolete; disabling it is generally safe. If legacy systems rely on it, validate routing behavior before changes.</p></li></ul>
    <div>
      <h4>RDP DDoS Attack</h4>
      <a href="#rdp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + Amplification</p></li><li><p><b>How it works</b>: The <a href="https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/"><u>Remote Desktop Protocol (RDP)</u></a> is used for remote access to Windows systems and typically runs over <a href="https://www.speedguide.net/port.php?port=3389"><u>TCP port 3389</u></a>. In some misconfigured or legacy setups, RDP can respond to unauthenticated connection attempts, making it possible to abuse for reflection or amplification. Threat actors send spoofed RDP initiation packets to exposed servers, causing them to reply to a victim, generating high volumes of unwanted traffic.</p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect your network infrastructure. Magic Transit provides L3/L4 DDoS protection, filtering out spoofed or malformed RDP traffic before it reaches your origin. For targeted application-layer abuse, <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a> or <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> can help secure remote desktop access behind authenticated tunnels.</p></li><li><p><b>How to avoid unintended impact</b>: Do not block TCP/3389 globally if RDP is actively used. Instead, restrict RDP access to known IPs or internal networks, or use <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/"><u>Cloudflare Tunnel</u></a> with <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> to remove public exposure altogether while maintaining secure access for legitimate users.</p></li></ul>
    <div>
      <h4>DemonBot DDoS Attack</h4>
      <a href="#demonbot-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Botnet-based Flood</p></li><li><p><b>How it works</b>: DemonBot is a malware strain that infects Linux-based systems—particularly unsecured IoT devices—via open ports or weak credentials. Once infected, devices become part of a botnet that can launch high-volume UDP, TCP, and application-layer floods. Attacks are typically command-and-control (C2) driven and can generate significant volumetric traffic, often targeting gaming, hosting, or enterprise services. To avoid infection, leverage antivirus software and domain filtering. </p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and filter large-scale network-layer floods before they reach your infrastructure. Cloudflare’s real-time traffic analysis and signature-based detection neutralize traffic originating from DemonBot-infected devices. For application-layer services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare DDoS protection</u></a> and <a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> can mitigate targeted <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a> and connection abuse.</p></li><li><p><b>How to avoid unintended impact</b>: Instead of broadly blocking traffic types or ports, rely on Cloudflare’s adaptive mitigation to distinguish between legitimate users and botnet traffic. Combine with IP reputation filtering, geo-blocking, and rate limiting to reduce false positives and maintain service availability.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41SKW3kjd0hp7wmySRb7OP/97a59d135cd7c3c975cda581acdec88c/image18.png" />
          </figure>
    <div>
      <h4>VxWorks Flood DDoS Attack</h4>
      <a href="#vxworks-flood-ddos-attack">
        
      </a>
    </div>
    <ul><li>
    <div>
      <h4><b>Type:</b> Flood (IoT-based)</h4>
      <a href="#type-flood-iot-based">
        
      </a>
    </div>
    </li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/VxWorks"><u>VxWorks</u></a> is a real-time operating system (<a href="https://en.wikipedia.org/wiki/Real-time_operating_system"><u>RTOS</u></a>) used in millions of embedded and IoT devices (e.g., routers, industrial controllers). Devices running outdated or misconfigured versions of VxWorks can be compromised and used to launch DDoS attacks. Once infected—often via public exploits or weak credentials—they send high volumes of UDP, TCP, or ICMP traffic to overwhelm targets, similar to traditional IoT botnets.</p></li><li><p><b>How to defend against the attack:</b> Deploy <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to block volumetric traffic at the network edge. Cloudflare uses real-time fingerprinting and  proprietary heuristics to identify traffic from compromised VxWorks devices and mitigate it in real-time. For application services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare’s DDoS mitigation</u></a><b> </b>and<b> </b><a href="https://www.cloudflare.com/zero-trust/products/gateway/"><b><u>Gateway services</u></b></a> provide additional protection against protocol-level abuse.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid over-blocking UDP or ICMP traffic, as it may disrupt legitimate diagnostics or real-time services. Instead, use Cloudflare’s intelligent filtering, rate limiting, and geo/IP reputation tools to safely mitigate attacks while avoiding impact to legitimate traffic.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6b6CqQNrSd3QFE2yTaDaFU/3ecc930ecf487067dac0dc2f4d50d390/image21.png" />
          </figure><p><sup>Cloudflare’s real-time fingerprint generation flow</sup></p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Most DDoS attacks are small and short. In 2025 Q2, 94% of L3/4 DDoS attacks didn’t exceed 500 Mbps. Similarly, around 85% of L3/4 DDoS attacks didn’t exceed 50,000 pps. The majority of HTTP DDoS attacks are also small, 65% stay below 50K rps. “Small”, though, is a relative term.</p><p>An average modern server typically refers to a general-purpose physical or virtual machine with around 4–8 CPU cores (e.g. Intel Xeon Silver), 16–64 GB RAM, and a 1 Gbps NIC, running a Linux OS like Ubuntu or CentOS with NGINX or similar software. This setup can handle ~100,000–500,000 pps, up to ~940 Mbps throughput, and around 10,000–100,000 rps for static content or 500–1,000 rps for database-backed dynamic applications, depending on tuning and workload.</p><p>Assuming the server is unprotected by a cloud DDoS protection service, if it’s targeted by “small” DDoS attacks during peak time traffic rates, it is very likely that the server won’t be able to handle it. Even “small” DDoS attacks can cause significant impact to unprotected servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bAmx7jQRjWgJHit83V57j/d8ec58ee7b1b207e36cb8e5b20984d9c/image3.png" />
          </figure><p><sup>DDoS attacks size and duration in 2025 Q2</sup></p><p>While the majority of DDoS attacks are small, hyper-volumetric DDoS attacks are increasing in size and frequency. 6 out of every 100 HTTP DDoS attacks exceed 1M rps, and 5 out of every 10,000 L3/4 DDoS attacks exceed 1 Tbps — a 1,150% QoQ increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ukMkHvtJOpfQwfPWn6Co9/62e161fa9f091ce2d99d56e57a7cd354/image16.png" />
          </figure><p><sup>The largest attack in the world: 7.3 Tbps</sup></p><p>Most DDoS attacks are short in duration, even the largest and most intense ones. Threat actors often rely on brief bursts of concentrated traffic—sometimes lasting as little as 45 seconds as seen with the monumental 7.3 Tbps DDoS attack — in an attempt to avoid detection, overwhelm targets and cause maximum disruption before defenses can fully activate. This tactic of short, high-intensity bursts makes detection and mitigation more challenging and underscores the need for always-on, real-time protection. Thankfully, Cloudflare’s autonomous DDoS defenses kick in immediately.</p>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, we’re committed to helping build a better Internet. A part of that mission is offering free, unmetered DDoS protection regardless of size, duration and quantity. We don’t just defend against DDoS attacks. The best defense is a good offense, and using our free ISP Botnet Threat Feed, we contribute to botnet takedowns. </p><p>While many still adopt protection reactively or rely on outdated solutions, our data shows proactive, always-on security is far more effective. Powered by a global network with 388 Tbps capacity across 330+ cities, we provide automated, in-line, battle-proven defense against all types of DDoS attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <guid isPermaLink="false">4aLih3oZO76muFrc9vJufj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[The crawl before the fall… of referrals: understanding AI’s impact on content providers]]></title>
            <link>https://blog.cloudflare.com/ai-search-crawl-refer-ratio-on-radar/</link>
            <pubDate>Tue, 01 Jul 2025 10:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar now shows how often a given AI model sends traffic to a site relative to how often it crawls that site. This helps site owners make decisions about which AI bots to allow or block.
 ]]></description>
            <content:encoded><![CDATA[ <p>Content publishers welcomed crawlers and bots from search engines because they helped drive traffic to their sites. The <a href="https://www.cloudflare.com/learning/bots/what-is-a-web-crawler/"><u>crawlers</u></a> would see what was published on the site and surface that material to users searching for it. Site owners could monetize their material because those users still needed to click through to the page to access anything beyond a short title.</p><p><a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/"><u>Artificial Intelligence (AI)</u></a> bots also crawl the content of a site, but with an entirely different delivery model. These <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>Large Language Models (LLMs)</u></a> do their best to read the web to train a system that can repackage that content for the user, without the user ever needing to visit the original publication.</p><p>The AI applications might still try to cite the content, but we’ve found that very few users actually click through relative to how often the AI bot <a href="https://www.cloudflare.com/learning/bots/what-is-content-scraping/"><u>scrapes</u></a> a given website. We have discussed this challenge in smaller settings, and today we are excited to publish our findings as <a href="https://radar.cloudflare.com/ai-insights#crawl-to-refer-ratio"><u>a new metric shown on the AI Insights page on Cloudflare Radar</u></a>.</p><p>Visitors to Cloudflare Radar can now review how often a given AI model sends traffic to a site relative to how often it crawls that site. We are sharing this analysis with a broad audience so that site owners can have better information to help them make decisions about which AI bots to allow or block and so that users can understand how AI usage in aggregate impacts Internet traffic.</p>
    <div>
      <h2>How does this measurement work?</h2>
      <a href="#how-does-this-measurement-work">
        
      </a>
    </div>
    <p>As HTML pages are arguably the most valuable content for these crawlers, the ratios displayed are calculated by dividing the total number of requests from relevant user agents associated with a given search or AI platform where the response was of <code>Content-type: text/html</code> by the total number of requests for HTML content where the <code>Referer</code> header contained a hostname associated with a given search or AI platform.</p><p>The diagrams below illustrate two common crawling scenarios, and show that companies may use different user agents depending on the purpose of the crawler. The top one represents a simple transaction where the example AI platform is requesting content for the purposes of training an LLM, representing itself as <code>AIBot</code>. The bottom one represents a scenario where the example AI platform is requesting content to service a user request — looking for flight information, for example. In this case, it is representing itself as <code>AIBot-User</code>. Request traffic from both of these user agents would be aggregated under a single platform name for the purposes of our analysis. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3SOsmpe6TAWwqK6g9irLI2/cca037eadf97578f7851e24ba6b90af4/image9.png" />
          </figure><p>When a user clicks on a link on a website or application, the client will often send a <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Referer"><code><u>Referer:</u></code><u> header</u></a> as part of the request to the target site. In the diagram below, the example AI platform has returned content that contains links to external sites in response to a user interaction. When the user clicks on a link, a request is made to the content provider that includes <code>ai.example.com </code>in the <code>Referer:</code> header, letting them know where that request traffic came from. Hostnames are associated with their respective platforms for the purpose of our analysis.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WqrD6q6k4ng8sBLbgzp42/b139464c5653d3cab533bf6413930a62/image10.png" />
          </figure>
    <div>
      <h2>Observations</h2>
      <a href="#observations">
        
      </a>
    </div>
    
    <div>
      <h3>Reviewing the ratios</h3>
      <a href="#reviewing-the-ratios">
        
      </a>
    </div>
    <p>The new metric is presented as a simple table, comparing the number of aggregate HTML page requests from crawlers (user agents) associated with a given platform to the number of HTML page requests from clients referred by a hostname associated with a given platform. The calculated ratio is always normalized to a single referral request.</p><p>The table below shows that for the period June 19-26, 2025, as an example, the ratios range from Anthropic’s 70,900:1 down to Mistral’s 0.1:1. This means that Anthropic’s AI platform Claude made nearly 71,000 HTML page requests for every HTML page referral, while Mistral sent 10x as many referrals as crawl requests. (However, traffic referred by Claude’s native app does not include a <code>Referer:</code> header, and we believe that the same holds true for traffic generated from other native apps as well. As such, because the referral counts only include traffic from the Web-based tools from these providers, these calculations may overstate the respective ratios, but it is unclear by how much.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1JaUDnjXMlq5YMxuKZGh7b/31210c8cd80779974450adfb4909f1cd/image7.png" />
          </figure><p>Of course, due in part to changes in crawling patterns, these ratios will change over time. The table above also displays the ratio changes as compared to the previous period, with changes ranging from increases of over 6% for DuckDuckGo and Yandex to Google’s 19.4% decrease. The week-over-week drop in Google’s ratio is related to an observed drop in crawling traffic from <code>GoogleBot</code> starting on June 24, while Yandex’s week-over-week growth is related to an observed increase in <code>YandexBot</code> crawling activity that started on June 21, as seen in the graphs below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UThXDeJepqM6jQCzXMvvw/f2d75d2202c33711f9eaa0a38c01a9f3/image3.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4FDYlEWYztxZCJZMg5RPvf/b4a3dac2dc4a06b709e2ef8d74ea1bc0/image10.png" />
          </figure><p>Radar’s Data Explorer includes a <a href="https://radar.cloudflare.com/explorer?dataSet=bots.crawlers&amp;groupBy=crawl_refer_ratio&amp;dt=2025-05-01_2025-05-28"><u>time series view of how these ratios change over time</u></a>, such as in the Baidu example below. The time series data is also available through an <a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/subresources/web_crawlers/methods/timeseries_groups/"><u>API endpoint</u></a>.</p>
    <div>
      <h3>Patterns in referral traffic</h3>
      <a href="#patterns-in-referral-traffic">
        
      </a>
    </div>
    <p>Changes and trends in the underlying activity can be seen in the <a href="https://radar.cloudflare.com/explorer?dataSet=bots.crawlers&amp;groupBy=referer&amp;timeCompare=1"><u>associated Data Explorer view</u></a>, as well as in the raw data available via API endpoints (<a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/subresources/web_crawlers/methods/timeseries_groups/"><u>timeseries</u></a>, <a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/subresources/web_crawlers/methods/summary/"><u>summary</u></a>). Note that the shares of both referral and crawl traffic are relative to the sets of referrers and crawlers included in the graphs, and not Cloudflare traffic overall.</p><p>For example, in the referrer-centric view below, covering nearly the first four weeks of June 2025, we can see that referral traffic is dominated by search platform Google, with a fairly consistent diurnal pattern visible in the data. (The <code>google.*</code> entry covers referral traffic from the main <a href="http://google.com"><u>google.com</u></a> site, as well as local sites, such as <a href="http://google.es"><u>google.es</u></a> or <a href="http://google.com.tw"><u>google.com.tw</u></a>.) Because of prefetching driven by the use of <a href="https://developer.chrome.com/blog/search-speculation-rules"><u>speculation rules</u></a>, referral traffic coming from Google’s ASN (AS15169) is specifically excluded from analysis here, as it doesn’t represent active user consumption of content.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5pNnqBHkfJEEGioN1dhpi5/65251de2ad63e0cef0ee2340e79f2f4b/image14.png" />
          </figure><p>Clear diurnal patterns are also visible in the referral request shares of other search platforms, although the request shares are a fraction of what is seen from Google.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5flVZwDhtYlseH5uYDk76U/a03e9957a10983e87e4fcd8f6a9e59bf/image4.png" />
          </figure><p>Throughout June, the share of traffic referred by AI platforms was significantly lower, even in aggregate, than the share of traffic referred by search platforms.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/705m9ac6GXGgT4qshubY70/3c6c0ca43be66114be53fa607bcb857d/image8.png" />
          </figure>
    <div>
      <h3>Changes in crawling traffic</h3>
      <a href="#changes-in-crawling-traffic">
        
      </a>
    </div>
    <p>As noted above, the change in ratio values over time can be driven by shifts in crawling activity. These shifts are visible in the <a href="https://radar.cloudflare.com/explorer?dataSet=bots.crawlers&amp;groupBy=user_agent&amp;timeCompare=1"><u>crawling traffic shares available in Data Explorer</u></a>, as well as in the raw data available via API endpoints (<a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/subresources/web_crawlers/methods/timeseries_groups/"><u>timeseries</u></a>, <a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/subresources/web_crawlers/methods/summary/"><u>summary</u></a>). In the crawler-centric view below, covering nearly the first four weeks of June 2025, we can see that the share of requests related to Google’s crawling activity for both their <code>Googlebot</code> and <code>GoogleOther</code> identifiers falls over the course of the month, with several peak/valley periods. A similar pattern <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=as15169&amp;dt=2025-05-31_2025-06-27"><u>observed in HTTP request traffic from Google’s AS15169</u></a> during that same time period loosely matches this observed drop in share.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K92yRMz57QrRH7iPvNH4V/0f7d7816fb3b22232dbee8359127b367/image11.png" />
          </figure><p>In addition, it appears that OpenAI’s <code>GPTBot</code> saw multiple periods where little-to-no crawling activity was observed throughout the month.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sXdBr25Y4toS2t3nvPKMm/e1313d3356130bc333a2e03574e56661/image13.png" />
          </figure>
    <div>
      <h2>What this means for content providers</h2>
      <a href="#what-this-means-for-content-providers">
        
      </a>
    </div>
    <p>These ratios directly impact the viability of content publication on the Internet. While they will vary over time, the trend continues to be more crawls and fewer referrals when compared in relation to each other. Legacy search index crawlers would scan your content a couple of times, or less, for each visitor sent. A site’s availability to crawlers made their revenue model more viable, not less.</p><p>The new data we are observing suggests that is no longer the case. These models continue to consume more content, more frequently, despite sending the same or less traffic to the source of its content.</p><p>We have <a href="https://blog.cloudflare.com/cloudflare-ai-audit-control-ai-content-crawlers/"><u>released new tools</u></a> over the last year to help site owners take control back. With a single click, publishers can <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">block the kinds of AI crawlers that train against their content</a>. And today, <a href="https://blog.cloudflare.com/introducing-pay-per-crawl"><u>we announced new ways</u></a> to make the exchange of value fair for both sides of the equation. However, we continue to recommend that content creators audit and then enforce their preferred policies for AI crawlers.</p>
    <div>
      <h2>One more thing…</h2>
      <a href="#one-more-thing">
        
      </a>
    </div>
    <p>In addition to providing these new insights around crawling and referral traffic and associated trends, we’ve also taken the opportunity to launch expanded Verified Bots content. The <a href="https://radar.cloudflare.com/bots"><u>Bots page on Cloudflare Radar</u></a> includes a paginated list of <a href="https://developers.cloudflare.com/bots/concepts/bot/verified-bots/"><u>Verified Bots</u></a>, displaying the bot name, owner, category, and rank (based on request volume). This list has now been expanded into a <a href="https://radar.cloudflare.com/bots/directory"><u>standalone directory in a new Bots section</u></a>. The directory, shown below, displays a card for each Verified Bot, showing the bot name, a description, the bot owner and category, and verification status. Users can search the directory by bot name, owner, or description, and can also filter by category (selecting just <i>Monitoring &amp; Analytics</i> bots, for example).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nTytFwnB1NVuwnAeAduX8/40efad4c333d8046d28a7ee44a8d91ca/image2.png" />
          </figure><p>Clicking on a bot name within a card brings up a bot-specific page that includes metadata about the bot, information on how the bot’s user agent is represented in <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/User-Agent"><u>HTTP request headers</u></a> and how it should be <a href="https://datatracker.ietf.org/doc/html/rfc9309#name-the-user-agent-line"><u>specified in robots.txt directives</u></a>, and a traffic graph that shows associated HTTP request volume trends for the selected time period (with a default comparison to the previous period). Associated data is also available via the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/bots/"><u>API</u></a>. As we add additional information to these bot-specific pages in the future, we will document the updates in <a href="https://developers.cloudflare.com/changelog/?product=radar"><u>Changelog entries</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SY1pwRzVnvC1sFNANrPxx/003260c3fdd3792cdff55d3a95628592/image12.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Pay Per Crawl]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Bots]]></category>
            <guid isPermaLink="false">2pLY5VumUNgntdcfkU9Ua3</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the April 28, 2025, power outage in Portugal and Spain impacted Internet traffic and connectivity]]></title>
            <link>https://blog.cloudflare.com/how-power-outage-in-portugal-spain-impacted-internet/</link>
            <pubDate>Mon, 28 Apr 2025 21:30:00 GMT</pubDate>
            <description><![CDATA[ A massive power outage struck significant portions of Portugal and Spain at 10:34 UTC on April 28, disrupting everyday activities and services. ]]></description>
            <content:encoded><![CDATA[ <p>A massive <a href="https://www.reuters.com/world/europe/large-parts-spain-portugal-hit-by-power-outage-2025-04-28/"><u>power outage struck significant portions of Portugal and Spain</u></a> at 10:34 UTC on April 28, grinding transportation to a halt, shutting retail businesses, and otherwise disrupting everyday activities and services. Parts of France were also reportedly impacted by the power outage. Portugal’s electrical grid operator <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Aa1493644-407b-44c0-aef9-c6f64d7fad0e#post"><u>blamed</u></a> the outage on a "<i>fault in the Spanish electricity grid</i>”, and <a href="https://www.bbc.com/news/live/c9wpq8xrvd9t?post=asset%3Addda9592-0346-4fe8-a17a-2261efc1ba5b#post"><u>later stated</u></a> that "<i>due to extreme temperature variations in the interior of Spain, there were anomalous oscillations in the very high voltage lines (400 kilovolts), a phenomenon known as 'induced atmospheric vibration'</i>" and that "<i>These oscillations caused synchronisation failures between the electrical systems, leading to successive disturbances across the interconnected European network</i>." However, the operator later <a href="https://sicnoticias.pt/pais/2025-04-28-e-falso-que-fenomeno-atmosferico-raro-tenha-estado-na-origem-do-apagao-1a078544"><u>denied</u></a> these claims. </p><p>The breadth of Cloudflare’s network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the Internet impact of this power outage at both a local and national level, as well as at a network level, across traffic, network quality, and routing metrics.</p>
    <div>
      <h2>Impacts in Portugal</h2>
      <a href="#impacts-in-portugal">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Portugal, Internet traffic dropped as the power grid failed, with traffic immediately dropping by half as compared to the previous week, falling to approximately 90% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21ezFb3KrFDR36Gn66twwd/99ed60e71501eccf948e7e1d2c0eb3a3/BLOG-2817_2.png" />
          </figure><p>Request traffic from users in Portugal to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 40% as compared to the previous week, and falling further over the next several hours. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GgzpC2ll27P1cfv0dQlFw/69dfabcfddd2dcb4db5f00885b12c67f/BLOG-2817_3.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, the loss of Internet traffic from local providers including NOS, Vodafone, MEO, and NOWO was swift and significant. The Cloudflare Radar graphs below show that traffic from those networks effectively evaporated over the hours after the power outage began. The <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous systems (ASNs)</u></a> shown below for these providers may carry a mix of fixed and mobile broadband traffic. However, MEO breaks out at least some of their mobile traffic onto a separate ASN, and the graph below for MEO-MOVEL (AS42863) shows that request traffic from that network more than doubled after the power went out, as subscribers turned to their mobile devices for information about what was happening. However, despite the initial spike, this mobile traffic also fell over the next several hours, dropping to approximately half of the volume seen the prior week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fys8MdtL3ImmHS6b25x0i/b1ccbd24818e4ec93170ae9f699c9727/BLOG-2817_4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LCdCDX9XoOHMgdVRzyjD0/1e276a9bb6eae716ee22059d88517615/BLOG-2817_5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fxFCuhYkBHXSDDizyj6AX/87d9e5f6e9e610cff365d3f5be8c75cb/BLOG-2817_6.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RfJ5HwTx3AqMKJ6c5FaaI/f595795b57dfb1b54fb6013ccca532fc/BLOG-2817_7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kYztdmWgq6n8lZgokElhh/a34f81d3dce5c259ee43b567ebbb8e9a/BLOG-2817_8.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In addition to looking at traffic at a national and network level, we can also look at traffic at a regional level. As noted above, the power outage did not impact every region of the country. The traffic graphs below show the changes in Internet traffic from the parts of Portugal where an impact was observed.</p><p>In Lisbon and Porto, a sharp, but limited drop in traffic was observed as the power outage began, with traffic recovering slightly almost as quickly. However, traffic gradually declined in the subsequent hours, in contrast to the other regions reviewed below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78BxDMSIsfvNyoPUczJ1Cv/aa4cf6cd71684726fc891c63dcb5108f/BLOG-2817_9.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/23KJh2ptN7NynAACvmFH9L/d71dc49bcd20ede70847592fb0d55b72/BLOG-2817_10.png" />
          </figure><p>The most significant immediate traffic drops were observed in Aveiro, Beja, Bragança, Castelo Branco, Évora, Faro, Guarda, Portalegre, Santarém, Viana do Castelo, Vila Real, and Viseu. In these areas, traffic fell and then quickly stabilized at very low volumes. In Braga and Setúbal, traffic declined more gradually after the initial drop.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tF73OLez4RM8I7x2I9ST0/06751ebb8bfdc22bc243939881eb2d16/BLOG-2817_11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fYFHRgvyG8jlSZtIQ55St/1b3656d6212c1dd0a1e8ee6be5863f26/BLOG-2817_12.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JKrwsr5k82cDreQluW336/61cc1d1b278a42995e71f98a02924d8c/BLOG-2817_13.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5q736FpU8TFEFZzNMl3ahB/b4f0105be84f00a9dc28d63ffb820124/BLOG-2817_14.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/717jnbhzFFBGxC8oKQzbWc/44ca9f1d5ca08104434f651750825bc9/BLOG-2817_15.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sghSM0J7Hx793fpzBNhBa/8e105feb10216547aa6fc4c829c5c95f/BLOG-2817_16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TRbyRB0hrjClK3S74Z6U1/71dc72b9b2bff67fd58fa43d5566aefb/BLOG-2817_17.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IEvNIigmrvmQ0qELWpLgO/63388e385162c421bb5ddf225993d300/BLOG-2817_18.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KWHQhpaMdU8EZUAjvJyZn/8de4ec173e79971e06cdbbc931e3f149/BLOG-2817_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NCILxkS2oymGlRpKcoiG6/89977e5bc093ce81311585f397fff97e/BLOG-2817_20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5s16pM0WdaX2bwDZuMuxda/af239a2a28abfeb5ce7da93c1094dd8c/BLOG-2817_21.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jkQrdlsCsGr4qyXX8EN42/7d90bbc1afcf138094a0f87d88b342e7/BLOG-2817_22.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xnoq8NQjx0nMruchenCRW/4a0a29367a0a4903a7623a9c3db72031/BLOG-2817_23.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sN1UZ4YYy7ZuOOy98KyIw/7c837a3034144937b8b9f3d43e0d7ffa/BLOG-2817_24.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Portugal. Prior to the loss of power, median download speeds across the country were around 40 Mbps, but within several hours after the state of the outage, fell as low as 15 Mbps. As expected, latency at a country level saw an opposite impact. Prior to the loss of power, median latency was around 20 ms. However, it gradually grew to as much as 50 ms. The lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IZu3b640cB11ZjnqQGcFh/886c356c4d8124be7f8b2ce01c9582cc/BLOG-2817_25.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nq7wmaWEZOgusVYw9v1it/8685d5ad7a343f22b94e09c72a34a0d5/BLOG-2817_26.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/the-net/network-infrastructure/">Network infrastructure </a>in Portugal was also impacted by the power outage, with the impact seen as a drop in announced IP address space. (This means that portions of Portuguese providers’ networks are no longer visible to the rest of the Internet.) The number of announced IPv4 /24s (blocks of 256 IPv4 addresses) dropped by ~300 (around 1.2%), and the number of announced IPv6 /48s (blocks of over 1.2 octillion IPv6 addresses) dropped from 17,928,551 to 16,355,607 (around 9%). Address space began to drop further after 16:00 UTC, possibly as a result of backup power being exhausted and associated network infrastructure falling offline.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZaC5NQzz6dzDzo5ywePst/417192abd6fc942ff85d06e247f7de66/BLOG-2817_27.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/asO2sxhD9Adue3q0FiBJv/40b8159855bd3c2156df49360adf898b/BLOG-2817_28.png" />
          </figure>
    <div>
      <h2>Impacts in Spain</h2>
      <a href="#impacts-in-spain">
        
      </a>
    </div>
    
    <div>
      <h3>Country level</h3>
      <a href="#country-level">
        
      </a>
    </div>
    <p>In Spain, Internet traffic dropped as the power grid failed, with traffic immediately dropping by around 60% as compared to the previous week, falling to approximately 80% below the previous week within the next five hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NWiuqfI5Z3MI5Q8fTXJM/df6438db91848c3faff11aaae43a7328/BLOG-2817_29.png" />
          </figure><p>Request traffic from users in Spain to Cloudflare’s <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> also fell when the power went out, initially dropping by 54% as compared to the previous week, but quickly stabilizing. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1N4JwFD2543isQ7laC6k/cf7ad7cce146ed18fd84ad9a32872e6e/BLOG-2817_30.png" />
          </figure>
    <div>
      <h3>Network level</h3>
      <a href="#network-level">
        
      </a>
    </div>
    <p>At a network level, traffic volumes from the <a href="https://radar.cloudflare.com/traffic/es?dateRange=1d#autonomous-systems"><u>top five ASNs in Spain</u></a> fell rapidly once power was lost, with most declining gradually over the next several hours. In contrast, traffic from Digi Spain Telecom (AS57269) fell quickly, but then stabilized at the lower level. In comparison to the previous week, traffic from these providers fell between 75% and 93% in the hours after the power outage began.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oFLKubgeo2NsffE9tGx2f/89af580571c94e14703b218feadb058b/BLOG-2817_31.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YTkS67VGnW9ACB3t58kBF/672f7e3e7d990bc7f33aa9a5155e133f/BLOG-2817_32.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56sGr0XxMAifw2ZqYnvSWU/07f168a415a2f0801bb2aebb1a7b45f9/BLOG-2817_33.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CpRU7YzB4LnTJppDnN2DZ/e479899ec5d6a0034c38361abf311d2f/BLOG-2817_34.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qYPxLDJQM2bfv0LTrY547/694f327f221bbc094580dbea731527d1/BLOG-2817_35.png" />
          </figure>
    <div>
      <h3>Regional level</h3>
      <a href="#regional-level">
        
      </a>
    </div>
    <p>In most of the impacted regions in Spain, traffic dropped off quickly and stabilized, or continued to fall further. However, some recovery in traffic is also evident, and can be seen in Navarre, La Rioja, Cantabria, and Basque Country. This traffic recovery is likely associated with an initial restoration of power in those regions, as an <a href="https://www.ree.es/es/sala-de-prensa/actualidad/nota-de-prensa/2025/04/proceso-de-recuperacion-de-la-tension-en-el-sistema-electrico-peninsular"><u>update</u></a> from <a href="https://www.redeia.com/en/about-us/our-brand"><u>Red Eléctrica</u></a> (operator of Spain’s national electricity grid) noted that “<i>Electricity is now available in parts of Catalonia, Aragon, the Basque Country, Galicia, Asturias, Navarre, Castile and León, Extremadura, Andalusia, and La Rioja.</i>”</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ziGXO8PBjWNAwhiYNa8hT/9af98f7fad1b22f482445d90314a524e/BLOG-2817_36.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17WcnWkXfG1BlxBCUwp5fW/1688269ff5dd6dbad06c09278e9ccd8d/BLOG-2817_37.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ho5Cc18AYxd8G54mtmfcH/739731e105a9236a00a6531a1a61c10f/BLOG-2817_38.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K4A82RT9L0tCXUBEVjZOw/a0798877806ac2c071cf82e71101a558/BLOG-2817_39.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6zFHmbct6zR2155GbfyM0F/af7f5aad5076bafc373127f7e5da82be/BLOG-2817_40.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FBbLHYIziEcd0qJJM02s1/404bcca11c826a758d174ce4ff94a638/BLOG-2817_41.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/349JW0IsbTDKRALrlQd91P/97b397344d72d3e6322a572e9c562ee2/BLOG-2817_42.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BNKpHFhRfNOlv1smU5BXr/9cda4655d68648c216f741cb200f0c51/BLOG-2817_43.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2g9WMm6XRkUvJxpW8pE0QJ/214f04aa2f8caa307e5f422db7a85dd3/BLOG-2817_44.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TeXN8cdr56fUFyNnbBtXo/f5ec765241d0b4af2f15eab70b65aa5c/BLOG-2817_45.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2h2R1k3eabXg7qB0XvfP0t/637dd2050cbc0e25b6ae441fe79bb14c/BLOG-2817_46.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37gqrGzlp0dIFinCinmAYk/6ed9f0b5c5d73490bbc539e577125df2/BLOG-2817_47.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Cr2Otys8KDJA0amR3PpUj/f51a2f1ffdbb50ce4f3ca7501352fc5d/BLOG-2817_48.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1K415209i5YGlJmcMuoRMr/1b5285b4872b1dc904ddb0f3a0417704/BLOG-2817_49.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AGjopp98UyZh52X5Jf1F9/df72d3f181012e07bb566aec3ab01ca6/BLOG-2817_50.png" />
          </figure>
    <div>
      <h3>Network quality</h3>
      <a href="#network-quality">
        
      </a>
    </div>
    <p>The power outage also impacted the quality of connectivity at a national level in Spain. Prior to the loss of power, median download speeds across the country were around 35 Mbps, but within several hours after the state of the outage, fell as low as 19 Mbps. Interestingly, the median bandwidth didn’t see the clean gradual decline as it did in Portugal, instead falling and recovering twice before gradually declining.</p><p>As expected, latency at a country level saw a significant increase. Prior to the loss of power, median latency was around 22 ms, but grew to as much as 40 ms. As in Portugal, the lower download speeds and higher latency are likely due to the congestion of the network links that remained available.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SvaDFDPdleRDctpTezUIf/65834285ceb6d7dedc76c97095871859/BLOG-2817_51.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BxQUuqVQdIHxro6XDAzUC/83e6001ffaa1492079cf54f25c36785c/BLOG-2817_52.png" />
          </figure>
    <div>
      <h3>Routing</h3>
      <a href="#routing">
        
      </a>
    </div>
    <p>Similar to Portugal, network infrastructure in Spain was also impacted by the power outage, with the impact seen as a drop in announced IP address space. By 14:30 UTC, the number of announced IPv4 /24 address blocks had fallen by around 2.4%, and continued to drop further over the following hours. The number of announced IPv6 /48 address blocks fell by over 8% during that same time span, and also continued to drop in the following hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6o4hGGWXhf8aoqkqUUCNnO/5ad97dafb731679c368f837f69fc7044/BLOG-2817_53.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZfoHrCrwHAMACg0oCTceD/8f816416c4cde1c562aa519099eed058/BLOG-2817_54.png" />
          </figure>
    <div>
      <h2>Impacts in other European countries</h2>
      <a href="#impacts-in-other-european-countries">
        
      </a>
    </div>
    <p>Parts of Andorra and France were also <a href="https://www.euronews.com/my-europe/2025/04/28/spain-portugal-and-parts-of-france-hit-by-massive-power-outage"><u>reportedly impacted</u></a> by the power outage, with additional outages reported as far away as Belgium. At a national level, no traffic disruptions were evident in any of the countries.</p><p>
</p><p>Analysis of traffic at a regional level in France shows a slight decline concurrent with the power outage in several regions, but the drops were nominal in comparison to Spain and Portugal, and traffic volumes recovered to expected levels within 90 minutes. No impact was evident at a regional level in Andorra.</p><p>It appears that Morocco may have been impacted in some fashion by the power outage, or at least Orange Maroc was. In a <a href="https://x.com/OrangeMaroc/status/1916866583047147690"><u>post on X</u></a>, the provider stated (translated) “<i>Internet traffic has been disrupted following a massive power outage in Spain and Portugal, which is affecting international connections.</i>” Cloudflare Radar shows that traffic from the network fell sharply around 12:00 UTC, 90 minutes after the power outage began, with a full outage beginning around 15:00 UTC.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62cA1IF7zleHp8RpCZu2Dq/2733086494e7d05b3feac5fd700e1c0f/BLOG-2817_55.png" />
          </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Power restoration in Spain had already started as this post was being written, and full recovery will likely take hours to days. As power is restored, Internet traffic and other metrics will recover as well. The current state of Internet connectivity in <a href="https://radar.cloudflare.com/es"><u>Spain</u></a> and <a href="https://radar.cloudflare.com/pt"><u>Portugal</u></a> can be tracked on Cloudflare Radar.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a>email</a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Traffic]]></category>
            <guid isPermaLink="false">3Zqv5LUUJauYsk7Dn0BIye</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[New year, no shutdowns: the Q1 2025 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q1-2025-internet-disruption-summary/</link>
            <pubDate>Tue, 22 Apr 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q1 2025, we observed Internet disruptions around the world caused by cable damage, power outages, natural disasters, fire, a cyberattack, and technical problems. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/"><u>network</u></a> spans more than 330 cities in over 125 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>. Note that both bytes-based and request-based traffic graphs are used within the post to illustrate the impact of the observed disruptions — the choice of metric was generally made based on which better illustrated the impact of the disruption.</p><p>In the first quarter of 2025, we observed a significant number of Internet disruptions due to <a href="#submarine-and-terrestrial-cable-damage"><u>cable damage</u></a> and <a href="#widespread-power-outages"><u>power outages</u></a>. <a href="#severe-weather"><u>Severe storms</u></a> caused outages in Ireland and Réunion, and an <a href="#earthquake"><u>earthquake</u></a> caused ongoing connectivity issues in Myanmar. Russian networks were taken offline by a reported <a href="#cyberattack"><u>cyberattack</u></a> and purported <a href="#technical-problems"><u>technical problems</u></a>, while a <a href="#fire-damage"><u>fire</u></a> took a telecom provider in Haiti offline briefly. In Q4 2024, we observed only a <a href="https://blog.cloudflare.com/q4-2024-internet-disruption-summary/#government-directed"><u>single government-directed Internet shutdown</u></a>, and this quarter, <b>no such shutdowns were observed</b>. Unfortunately, this is an unusual occurrence, and in the three-year history of this blog post series, has only occurred previously in <a href="https://blog.cloudflare.com/q4-2023-internet-disruption-summary/#governmentdirected"><u>Q4 2023</u></a> and <a href="https://blog.cloudflare.com/q1-2022-internet-disruption-summary/"><u>Q1 2022</u></a>. </p>
    <div>
      <h2>Submarine and terrestrial cable damage</h2>
      <a href="#submarine-and-terrestrial-cable-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    <p>Just after the new year, Internet connectivity in <a href="https://radar.cloudflare.com/pk"><u>Pakistan</u></a> was disrupted by a fault in the <a href="https://www.submarinecablemap.com/submarine-cable/asia-africa-europe-1-aae-1"><u>AAE-1 submarine cable</u></a>. According to a January 2 <a href="https://www.facebook.com/PTAOfficialPK/posts/pfbid02M2zM4MyFVAKWcHeg7WDKKTdwxF7PahWsYRW2W7WPLywp4dpLgS8m8ACUp5wtJJp6l"><u>alert</u></a> published on social media by the Pakistan Telecommunications Authority, the cable fault occurred near <a href="https://radar.cloudflare.com/qa"><u>Qatar</u></a>, and would likely impact user experience across the country. Because there are seven submarine cables carrying international Internet traffic to/from Pakistan, the loss of AAE-1 did not cause an observable outage. However, the impact of the disruption was visible in the <a href="https://radar.cloudflare.com/quality/pk?dateStart=2025-01-02&amp;dateEnd=2025-01-04#bandwidth"><u>bandwidth</u></a> and <a href="https://radar.cloudflare.com/quality/pk?dateStart=2025-01-02&amp;dateEnd=2025-01-04#latency"><u>latency</u></a> graphs for Pakistan. On January 2 and 3, median latency peaked at around 125 ms, up from a pre-disruption median of approximately 80 ms. Concurrent drops in bandwidth were observed, with media download speeds dropping to around 6 Mbps from a pre-disruption media of around 9 Mbps. In an <a href="https://www.instagram.com/p/DEVff2gTxw9/"><u>“Important Update”</u></a> posted to their Instagram account, <a href="https://radar.cloudflare.com/AS17557"><u>Pakistan Telecom (PTCL, AS17557)</u></a> also highlighted the potential for “slow browsing” — the <a href="https://radar.cloudflare.com/quality/as17557?dateStart=2025-01-02&amp;dateEnd=2025-01-04"><u>Internet Quality graphs for that network</u></a> show similarly-timed shifts in median bandwidth and latency.</p><p><a href="https://www.submarinecablemap.com/country/pakistan"><u>Pakistan</u></a> is currently connected to seven submarine cables, with two additional connections on the way in 2026. This connection diversity means that damage to or an issue with one cable will likely have minimal impact on Internet availability within the country, as traffic can be re-routed across other paths.</p>

<p></p>
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>According to an <a href="https://www.moct.gov.sy/news-0251"><u>announcement</u></a> from the Syrian Ministry of Communications, a widespread Internet outage spanning January 23-24 was caused by sabotage that damaged two fiber optic cables that run along the highway between Damascus and Homs. The graphs below show that both <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24#http-traffic"><u>HTTP</u></a> and <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24#dns-query-volume"><u>DNS</u></a> request traffic from <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> dropped to near zero between 00:30 and 03:30 local time on January 24 (21:30 on January 23 - 00:30 on January 24 UTC). Traffic began recovering shortly thereafter, and returned to expected levels by 09:00 local time (06:00 UTC). <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-01-23&amp;dateEnd=2025-01-24"><u>Announced IPv4 address space for the country</u></a>, almost exclusively from <a href="https://radar.cloudflare.com/routing/as29256?dateStart=2025-01-23&amp;dateEnd=2025-01-24"><u>Syria Telecom (AS29256)</u></a>, also saw an approximately 90% drop during this period, which suggests that these fiber cuts caused a significant amount of Syria Telecom’s network to become unreachable during the incident.</p><p>Echoing the disruption above, <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> experienced another Internet outage on March 25, again caused by sabotage that damaged fiber optic cables. According to an <a href="https://moct.gov.sy/news-0279"><u>announcement</u></a> from the Syrian Ministry of Communications, the damage occurred in the Maaloula and Hasiya regions, resulting in a near complete outage between 03:00 - 13:15 local time (00:00 - 10:15 UTC). Similar to the January outage, the graphs below show a near complete loss of <a href="https://radar.cloudflare.com/traffic/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#http-traffic"><u>HTTP</u></a> request traffic and a significant loss of <a href="https://radar.cloudflare.com/routing/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#announced-ip-address-space"><u>announced IPv4 address space</u></a>.</p><p>Somewhat paradoxically, <a href="https://radar.cloudflare.com/dns/sy?dateStart=2025-03-24&amp;dateEnd=2025-03-25#dns-query-volume"><u>DNS request volume from Syria</u></a> was elevated during this outage, in contrast to the behavior observed during the January event. It isn’t clear what drove the additional traffic to Cloudflare’s <a href="https://one.one.one.one/dns/"><u>1.1.1.1 DNS resolver</u></a> in this case.</p>
    <div>
      <h3>Nepal</h3>
      <a href="#nepal">
        
      </a>
    </div>
    <p>In early February, several Internet providers in <a href="https://radar.cloudflare.com/np"><u>Nepal</u></a> saw services disrupted when Indian provider <a href="https://radar.cloudflare.com/as9498"><u>Bharti Airtel (AS9498)</u></a> went offline. <a href="https://radar.cloudflare.com/as23752"><u>AS23752 (Nepal Telecom)</u></a>, <a href="https://radar.cloudflare.com/as17501"><u>AS17501 (Worldlink Communications)</u></a>, <a href="https://radar.cloudflare.com/as139922"><u>AS139922 (Dishhome Fibernet)</u></a>, <a href="https://radar.cloudflare.com/as45650"><u>AS45650 (Vianet Communications)</u></a>, and <a href="https://radar.cloudflare.com/as38565"><u>AS38565 (Ncell)</u></a>, who all have Airtel as an upstream provider or peer, saw traffic disrupted between 21:00 - 22:30 local time (15:15 - 16:45 UTC) on February 2.</p><p>Published reports disagree on the underlying cause of the Airtel issue, with one source claiming that it was related to an <a href="https://english.onlinekhabar.com/nationwide-internet-outage-in-nepal-after-payment-dispute-with-indian-bandwidth-provider.html"><u>ongoing payment dispute</u></a>, while another claims that it was due to reported <a href="https://kathmandupost.com/money/2025/02/04/nationwide-internet-outage-raises-concerns-over-outstanding-dues"><u>fiber cuts</u></a> in Airtel’s network.</p>
Show less
    <div>
      <h2>Widespread power outages</h2>
      <a href="#widespread-power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Angola</h3>
      <a href="#angola">
        
      </a>
    </div>
    <p><a href="https://angop.ao/en/noticias/economia/restabelecida-energia-electrica-nas-11-provincias-afectadas-pelo-apagao/"><u>Eleven provinces</u></a> in <a href="https://radar.cloudflare.com/ao"><u>Angola</u></a> lost electrical power on January 6 <a href="https://x.com/portalangop/status/1876328913070432710"><u>due to</u></a> an interruption in the North and Center Interconnected System, according to the <a href="http://www.rnt.co.ao/"><u>National Electricity Transmission Network (RNT)</u></a>. The widespread power outage disrupted Internet connectivity across the country, leading to a drop in traffic between 14:45 - 22:00 local time (13:45 - 21:00 UTC). <a href="https://angop.ao/en/noticias/economia/restabelecida-energia-electrica-nas-11-provincias-afectadas-pelo-apagao/"><u>Published reports</u></a> said that RNT was investigating the cause of the power outage, but no subsequent information was available confirming a specific cause.</p>
    <div>
      <h3>Sri Lanka</h3>
      <a href="#sri-lanka">
        
      </a>
    </div>
    <p>Monkey business at the Pandura electrical substation caused an island-wide power outage in <a href="https://radar.cloudflare.com/lk"><u>Sri Lanka</u></a> on February 9. More seriously, <a href="https://www.barrons.com/news/sri-lankan-monkey-causes-nationwide-blackout-2c3cc8ac"><u>a monkey coming into contact with a grid transformer</u></a> caused the power outage, which resulted in a multi-hour disruption to Internet traffic from the country. Traffic initially dropped around 11:30 local time (06:00 UTC), and recovered by around 21:00 local time (15:30 UTC). The graph below for <a href="https://radar.cloudflare.com/as18001"><u>AS18001 (Dialog)</u></a>, a major Sri Lankan network services provider, illustrates the impact on traffic.</p>
    <div>
      <h3>Chile</h3>
      <a href="#chile">
        
      </a>
    </div>
    <p>On February 25, a <a href="https://www.clarin.com/mundo/masivo-corte-luz-chile-afecta-80-ciento-pais_0_JxZR7Py3kb.html"><u>massive power outage</u></a> in <a href="https://radar.cloudflare.com/cl"><u>Chile</u></a> <a href="https://www.cnnchile.com/pais/chile-a-oscuras-mas-de-19-millones-de-clientes-sin-electricidad-equivalente-al-985-del-pais_20250225/"><u>reportedly impacted</u></a> 98.5% of the country. A <a href="https://www.cnnchile.com/pais/autoridades-informan-corte-luz-nacional-debe-desconexion-sistema-transmision-norte-chico_20250225/"><u>published report</u></a> noted that there was an interruption in the power supply from Arica to the Los Lagos region, caused by a disconnection of the 500 kV transmission system in the Norte Chico. The power outage resulted in an immediate and significant drop in Internet traffic, as seen at a country level, as well at a network level, as shown in the graphs below. Traffic initially fell at around 14:15 local time (18:15 UTC) and recovered to expected levels approximately 12 hours later, around 02:00 local time (06:00 UTC). It was <a href="https://www.cnnchile.com/pais/gobierno-informa-mas-94-clientes-pais-ya-tienen-suministro-electrico_20250226/"><u>reported</u></a> that as of an hour after traffic had recovered, approximately 94% of customers had power restored.</p>
    <div>
      <h3>Honduras</h3>
      <a href="#honduras">
        
      </a>
    </div>
    <p>A ground fault at the 15 de Septiembre electrical substation in <a href="https://radar.cloudflare.com/sv"><u>El Salvador</u></a> was <a href="https://www.elheraldo.hn/honduras/descartan-honduras-origen-apagon-afecto-region-erick-tejada-KD24633485"><u>reportedly</u></a> the cause of a power outage that resulted in a multi-hour Internet disruption in <a href="https://radar.cloudflare.com/hn"><u>Honduras</u></a> on March 1. The Regional Operator Entity (OER) <a href="https://www.instagram.com/protocinetico/p/DGrLkEqzWEP/"><u>stated</u></a> that the failure occurred at 09:22 local time (15:22 UTC), which resulted in traffic from the country dropping by about half. The disruption to Internet connectivity was relatively short-lived, as traffic returned to expected levels approximately two hours later.</p>
    <div>
      <h3>Cuba</h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>According to an <a href="https://x.com/EnergiaMinasCub/status/1900714003623506167"><u>X post from @EnergiasMinasCub</u></a> (the Cuban state agency responsible for promoting the sustainable development of the country's energy, geological, and mining sectors), at around 20:15 local time on March 14 (00:15 UTC on March 15) “<i>a failure at the Diezmero substation caused a significant loss of generation in the west of #Cuba and with it the failure of the National Electric System, SEN</i>”. This widespread power outage resulted in an immediate drop in request traffic from <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>. Over the following two days, X posts from @EnergiasMinasCub, <a href="https://x.com/OSDE_UNE"><u>@OSDE_UNE</u></a> (the Cuban Electric Union), and <a href="https://x.com/ETECSA_Cuba"><u>@ETECSA_Cuba</u></a> (the Cuban Telecommunications Company) kept impacted subscribers apprised of the status of ongoing repairs. Traffic levels returned to expected levels around 20:00 local time on March 16 (00:00 on March 17 UTC), two full days after the incident began.</p>
    <div>
      <h3>Panama</h3>
      <a href="#panama">
        
      </a>
    </div>
    <p>An explosion and fire at the La Chorrera Thermoelectric Power Plant in <a href="https://radar.cloudflare.com/pa"><u>Panama</u></a> caused a <a href="https://www.msn.com/en-in/news/world/blackout-in-panama-after-massive-fire-at-power-plant-water-supply-hit-too/ar-AA1B0vOv"><u>massive power outage</u></a> across the country, starting at 23:40 local time on March 15 (04:40 on March 16 UTC). As expected, traffic dropped immediately, as seen in the HTTP and DNS request graphs below. However, recovery was fairly swift, as the <a href="https://x.com/PanamaAmerica/status/1901288375778246675"><u>electric system saw 75% recovery</u></a> by 03:00 local time (08:00 UTC), with full restoration <a href="https://x.com/Etesatransmite/status/1901234515999174723"><u>completed</u></a> at 06:08 local time (11:08 UTC). Traffic volumes began to increase after power was restored.</p>
    <div>
      <h2>Severe weather</h2>
      <a href="#severe-weather">
        
      </a>
    </div>
    
    <div>
      <h3>Ireland</h3>
      <a href="#ireland">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Storm_%C3%89owyn"><u>Storm Éowyn</u></a> <a href="https://www.theguardian.com/uk-news/live/2025/jan/24/storm-eowyn-uk-weather-scotland-ireland-warning-winds-live-updates"><u>wreaked havoc</u></a> on <a href="https://radar.cloudflare.com/ie"><u>Ireland</u></a> in late January, knocking out <a href="https://transformers-magazine.com/tm-news/180000-without-power-in-ireland/"><u>power and water</u></a>, causing property damage, and limiting air and train travel. The storm’s impacts also disrupted Internet connectivity, as <a href="https://x.com/CloudflareRadar/status/1882851611749626219"><u>we observed</u></a> traffic from Connacht and Ulster fall by 75% as compared to the previous week at 06:30 local time (06:30 UTC) on January 24. As recovery from the storm progressed over the next several days, Internet traffic gradually recovered as well, with traffic in the two provinces reaching levels near those seen the prior week by mid-day on January 28.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sXx1CEVuZIP0pDyKXH0xY/2f5d256f5967eca3debcfbe59dc8b42f/GiY1qXQXcAADgKl.jpeg" />
          </figure>
    <div>
      <h3>Réunion</h3>
      <a href="#reunion">
        
      </a>
    </div>
    <p><a href="https://en.wikipedia.org/wiki/Cyclone_Garance"><u>Cyclone Garance</u></a> made landfall over the French territory of <a href="https://radar.cloudflare.com/re"><u>Réunion</u></a> at ~10:00 local time (06:00 UTC) on February 28. Damage from the storm's 100+ miles/hour (160+ km/hour) winds caused power outages and infrastructure damage, resulting in disruptions to Internet connectivity. The most significant impacts to traffic were observed in the hours after the storm made landfall, but it took <a href="https://radar.cloudflare.com/explorer?dataSet=netflows&amp;loc=re&amp;dt=2025-02-27_2025-03-05&amp;timeCompare=1"><u>several days before traffic returned to expected levels</u></a>, reaching that point around 08:00 local time (04:00 UTC) on March 4.</p>
    <div>
      <h2>Earthquake</h2>
      <a href="#earthquake">
        
      </a>
    </div>
    
    <div>
      <h3>Myanmar</h3>
      <a href="#myanmar">
        
      </a>
    </div>
    <p>On March 28 at 12:50 local time (06:20 UTC), a <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us7000pn9s/executive"><u>magnitude 7.7 earthquake</u></a> shook <a href="https://radar.cloudflare.com/mm"><u>Myanmar</u></a>, resulting in <a href="https://reccessary.com/en/news/asean-environment/massive-earthquake-in-myanmar-triggers-power-outages-fuel-shortages"><u>power outages and fuel shortages</u></a>. Almost immediately, <a href="https://x.com/CloudflareRadar/status/1905566630760902897"><u>traffic dropped by around 40%</u></a> at a country level. <a href="https://x.com/CloudflareRadar/status/1905603328144261396"><u>Regionally</u></a>, traffic from Nay Pyi Taw dropped 97% as compared to the previous week, Mandalay fell 90%, Ayeyarwady lost 88%, Bago 50%, and Shan State was down 38%.</p><p>While recovery efforts stretch into April, regular traffic patterns and volumes bounced back within days, as seen in the HTTP and DNS request graphs below.</p><p>However, at a network level, recovery has been mixed. Both <a href="https://radar.cloudflare.com/as134840"><u>AS134840 (MCCL)</u></a> and <a href="https://radar.cloudflare.com/as136442"><u>AS136442 (Oceanwave)</u></a> saw significant drops in traffic after the earthquake occurred, and traffic remained disrupted on both networks through the end of the first quarter. Peak traffic on MCCL has increased slightly, but nearly two weeks on, remains significantly lower than pre-earthquake levels. Traffic on Oceanwave saw steady growth after the initial disruption, and as of this writing is approaching pre-earthquake peaks. (It is unclear what caused the significant spike in request traffic seen from Oceanwave on April 3-4.) In contrast to these two providers, traffic from <a href="https://radar.cloudflare.com/as163255"><u>AS163255 (Mytel)</u></a> saw a significantly smaller disruption, and a <a href="https://developingtelecoms.com/telecom-business/humanitarian-communications/18289-mytel-says-connectivity-mostly-restored-after-myanmar-quake-amid-shutdown-fears.html"><u>significantly faster recovery</u></a>, as did traffic from <a href="https://radar.cloudflare.com/as135300?dateStart=2025-03-27&amp;dateEnd=2025-04-09#traffic-trends"><u>AS135300 (Myanmar Broadband Telecom)</u></a>.</p>
    <div>
      <h2>Cyberattack</h2>
      <a href="#cyberattack">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>On January 7, <a href="https://radar.cloudflare.com/ru"><u>Russian</u></a> Internet provider <a href="https://radar.cloudflare.com/as29329"><u>Nodex (AS29329)</u></a> said in <a href="https://vk.com/wall-7622_825"><u>a post on Russian social media platform VKontakte</u></a> (translated) “<i>Dear Subscribers, our technical staff is still working on restoring the network. The process is painstaking and long. We express our deep gratitude to those who support us in this difficult moment! This is really important for us. Let me remind you that our network was attacked by Ukrainian hackers, which resulted in its complete failure. At the moment, its functioning is being restored. There will be communication. When, is still unknown.</i>” The <a href="https://en.wikipedia.org/wiki/Ukrainian_Cyber_Alliance"><u>Ukrainian Cyber Alliance</u></a>, a community of pro-Ukraine cyber activists formed in 2016, <a href="https://t.me/UCAgroup/38"><u>claimed responsibility for the attack</u></a> in a Telegram post.</p><p>The “complete failure” of the Nodex network is visible in the traffic graph below, where Internet traffic from the network began to drop after 03:00 local time (00:00 UTC) on January 7, reaching zero around 05:30 local time (02:30 UTC). Traffic from the network remained essentially non-existent until around 14:00 local time (11:00 UTC) the next day, recovering fairly quickly after that. Announced IPv4 address space fell by two-thirds at the same time that traffic volume dropped to zero, but recovered at 21:20 local time (18:20 UTC).</p>
    <div>
      <h2>Fire damage</h2>
      <a href="#fire-damage">
        
      </a>
    </div>
    
    <div>
      <h3>Los Angeles, California</h3>
      <a href="#los-angeles-california">
        
      </a>
    </div>
    <p>Between January 7-9, during the early days of the<a href="https://en.wikipedia.org/wiki/January_2025_Southern_California_wildfires"><u> 2025 Southern California wildfires</u></a> — which affected the <a href="https://www.fire.ca.gov/incidents/2025/1/7/palisades-fire"><u>Palisades</u></a> and <a href="https://www.fire.ca.gov/incidents/2025/1/7/eaton-fire"><u>Eaton</u></a> areas in Los Angeles — there were clear Internet disruptions in at least 13 Los Angeles neighborhoods. According to Cloudflare’s data, traffic drops of over 50% compared to the previous week were especially noticeable in cities like Pacific Palisades, Altadena, Malibu, Temple City, and Monrovia, among others. In the weeks that followed, traffic remained significantly lower than before the fires, particularly in Pacific Palisades and Altadena, reflecting the devastation in those areas. However, traffic recovery occurred significantly sooner in Malibu, Temple City, and Monrovia, although peak traffic levels remain somewhat below pre-fire levels. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36NDkw4HzvLjEb1B2kMtLs/1792de620a5c2fbc5f83947f34b14f2f/BLOG-2800_LA1.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xXx4H91hZ4sqwfuBpWde7/0cb0b4d03e6a5f2313dc0d6b7f0412e8/BLOG-2800_LA2.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RHkUjU4OreZ6pQ8zBy3rQ/13c5a0f94466e4faa6c9673872111621/BLOG-2800_LA3.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/L9WOAV7BMywf9Q1jquEmh/46d5c2df525cf44384bc9f0ddd93a1c3/BLOG-2800_LA4.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pOWHX6sf42uUFxUaWTFUD/b569959b669329aa528d6603f9db7827/BLOG-2800_LA5.png" />
          </figure>
    <div>
      <h3>Haiti</h3>
      <a href="#haiti">
        
      </a>
    </div>
    <p>On January 15, an <a href="https://x.com/jpbrun30/status/1879554628469362857"><u>X post</u></a> from the Director General of <a href="https://radar.cloudflare.com/as27653"><u>Digicel Haiti (AS27653)</u></a> stated (translated) “<i>Dear customers, last night at 8:30 pm we suffered damage to 2 of our international fiber optic cables caused by a fire in the metropolitan area. At 10:30 am a 3rd outage affected all international services, Internet and Moncash. Our teams are mobilized to resolve the problem as quickly as possible.</i>” These fires ultimately caused two complete Internet outages for Digicel Haiti’s customers, as seen in the graphs below.</p><p>Both traffic and announced IP address space (IPv4 &amp; IPv6) dropped to zero between 20:30 - 21:45 local time on January 14 (01:30 - 02:45 on January 15 UTC) and again between 10:15 - 11:00 local time on January 15 (15:15 - 16:00 UTC).</p>
    <div>
      <h2>Technical problems</h2>
      <a href="#technical-problems">
        
      </a>
    </div>
    
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    <p>On January 14, multiple <a href="https://radar.cloudflare.com/ru"><u>Russian</u></a> networks, including <a href="https://radar.cloudflare.com/as8359"><u>AS8359 (MTS)</u></a>, <a href="https://radar.cloudflare.com/as12389"><u>AS12389 (Rostelecom)</u></a>, <a href="https://radar.cloudflare.com/as16345"><u>AS16345 (Beeline)</u></a>, <a href="https://radar.cloudflare.com/as31133"><u>AS31133 (MegaFon)</u></a>, and <a href="https://radar.cloudflare.com/as203451"><u>AS203451 (K-telecom)</u></a> all experienced a brief disruption in connectivity. As the traffic graphs below show, Internet traffic from these networks <a href="https://x.com/CloudflareRadar/status/1879196319874740312"><u>dropped by around 80%</u></a> between 14:00 - 14:30 UTC. According to a <a href="https://meduza.io/en/news/2025/01/14/internet-users-in-russia-report-widespread-service-outages"><u>statement</u></a> from <a href="https://en.wikipedia.org/wiki/Roskomnadzor"><u>Roskomnadzor</u></a>,  “<i>A brief connectivity issue was identified. Network operations were promptly restored.</i>” However, <a href="https://x.com/Liveuamap/status/1879195091874746543"><u>industry observers suggested</u></a> that the cause may have been due to an update to the so-called “Russian firewall” that failed and was quickly rolled back.</p>

    <div>
      <h3>Georgia</h3>
      <a href="#georgia">
        
      </a>
    </div>
    <p>Subscribers to <a href="https://radar.cloudflare.com/as16010"><u>Magticom (AS16010)</u></a>, one of the largest Internet providers in <a href="https://radar.cloudflare.com/ge"><u>Georgia</u></a>, experienced a complete outage on January 27. Request traffic and announced IP address space disappeared at 21:25 local time (17:25 UTC), recovering at 01:55 local time on January 28 (21:55 UTC). A (translated) <a href="https://www.facebook.com/permalink.php?story_fbid=pfbid03i7LBfz1Rn3YUJAUgzgv8oKK2xTPoozMAzeJnEWxbqPvYkMSUukwYnCGSqJDRcpgl&amp;id=100064447729415"><u>Facebook post from Magticom</u></a> explained that the company’s Internet connectivity comes through “<i>channels from Europe</i>” and that “<i>damage was reported in Turkey, where heavy snowfall and avalanche risks have prevented the partner company’s technical teams from reaching the affected area</i>”. Further, it noted that on the backup channel, “<i>suspicious damage was reported at three points on the Georgian side, in the territory of Adjara…</i>” Magticom’s published start and end times for the outage align with the loss and recovery of traffic and announced IP address space observed in Cloudflare data. </p>

    <div>
      <h3>France</h3>
      <a href="#france">
        
      </a>
    </div>
    <p>Subscribers of <a href="https://radar.cloudflare.com/as5410"><u>Bouygues Telecom (AS5410)</u></a> in <a href="https://radar.cloudflare.com/fr"><u>France</u></a> experienced a brief disruption to their Internet connectivity on March 11. According to a (translated) <a href="https://x.com/bouyguestelecom/status/1899352941942681834"><u>X post from the provider</u></a>, “<i>Following a technical incident between 5 a.m. and 7 a.m. you may have encountered difficulties using your services.</i>” As seen in the request traffic graphs below, a drop in traffic is visible between 05:00 - 06:45 local time (04:00 - 05:45 UTC), aligning with the provider’s stated timeframe. Bouyges Telecom did not provide any subsequent details around the cause of the “technical incident”.</p>
    <div>
      <h2>Unknown cause</h2>
      <a href="#unknown-cause">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>Major Internet outages and disruptions in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> are generally well documented, such as the cable cuts discussed above. However, on February 3, a multi-hour disruption was observed in the country, but no underlying cause was ever publicly disclosed. Starting approximately 14:00 local time (11:00 UTC), traffic from the country dropped by approximately 80%, along with a ~60% drop in announced IPv4 address space. Both traffic and announced IP address space returned to expected levels around 23:00 local time (20:00 UTC). The outage was confirmed in an <a href="https://x.com/syr_television/status/1886403431583092826"><u>X post from Syrian Television</u></a>.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>While the single government-directed shutdown last quarter, and the lack of such shutdowns this quarter, is an encouraging trend, we expect that it will be short-lived if countries like Iraq and Syria once again take such measures to prevent cheating on nationwide exams. As always, we encourage governments to recognize the collateral damage of such actions, and suggest that they explore alternative solutions to this problem.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">4BkxBjZIqq5UIU9wkfkJwr</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Global expansion in Generative AI: a year of growth, newcomers, and attacks]]></title>
            <link>https://blog.cloudflare.com/global-expansion-in-generative-ai-a-year-of-growth-newcomers-and-attacks/</link>
            <pubDate>Mon, 10 Mar 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Looking at which Generative AI services are more popular, new entrants into the space, how these services have grown in traffic, where that traffic originates, and others. ]]></description>
            <content:encoded><![CDATA[ <p>AI (<a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/"><u>Artificial Intelligence</u></a>) is a broad concept encompassing machines that simulate or duplicate human cognitive tasks, with <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/"><u>Machine Learning</u></a> (ML) serving as its data-driven engine. Both have existed for decades but gained fresh momentum when <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a>, AI models that can create text, images, audio, code, and video, surged in popularity following the <a href="https://openai.com/index/chatgpt/"><u>release</u></a> of OpenAI’s ChatGPT in late 2022. In this blog post, we examine the most popular Generative AI services and how they evolved throughout 2024 and early 2025. We also try to answer questions like how much traffic growth these Generative AI websites have experienced from Cloudflare’s perspective, how much of that traffic was malicious, and other insights.</p><p>To accomplish this, we use aggregated data from our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> to measure the popularity of specific Generative AI services. We typically do this for our <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><u>Year in Review</u></a> and now also on the <a href="https://radar.cloudflare.com/domains"><u>DNS domain rankings page</u></a> of Cloudflare Radar, where we aggregate related domains for each service and identify sites that provide services to users. For overall traffic growth and attack trends, we rely on aggregated data from the cohort of Generative AI customers that use Cloudflare for performance (including AI inference) and security.</p><p>Key takeaways:</p><ul><li><p><b>ChatGPT maintains the top spot:</b> OpenAI’s ChatGPT remains #1 in Generative AI popularity, hovering around the top 50 Internet domains overall, up from #200 in late 2023.</p></li><li><p><b>Rapid traffic growth:</b> Monthly traffic to Generative AI services grew by 251% over the past year, between February 1, 2024, and March 1, 2025.</p></li><li><p><b>New entrants on the rise:</b> Chinese chatbot DeepSeek and Grok/xAI quickly climbed the ranks, illustrating how fast newcomers can gain traction in the AI space.</p></li><li><p><b>Global reach with regional variations:</b> The U.S. leads with 23% of Generative AI visitors, but Asia dominates certain platforms like poe.com. Brazil also shows up as a strong user of multiple AI services.</p></li><li><p><b>Targeted by cyberattacks:</b> Over 197 billion potential attack requests were blocked by Cloudflare in the past year, with 39 billion part of DDoS attack campaigns — particularly affecting general AI chatbots and image-generation sites.</p></li></ul>
    <div>
      <h3>Generative AI services popularity ranking: new kids in town</h3>
      <a href="#generative-ai-services-popularity-ranking-new-kids-in-town">
        
      </a>
    </div>
    <p>We begin by looking at Generative AI service popularity using the <a href="https://radar.cloudflare.com/ai-insights"><u>new AI tab on Cloudflare Radar</u></a>. The newest entrant to our Top 10 is DeepSeek, a Chinese chatbot launched on January 10, 2025. It debuted at #9 on January 26, 2025, climbed to #3 on January 29 (coinciding with Lunar/Chinese New Year), and maintained that position until February 4, before settling at its current position of #6. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/s9pGGWSp87CqvIOcbZ4gb/8a5a83deabdf8a0ed7f9898fc384c74d/image1.png" />
          </figure><p>Also highlighted here is another AI chatbot that has recently gained popularity — X’s Grok/xAI. This Generative AI service released its Android app in February and gained <a href="https://edition.cnn.com/2025/02/18/tech/grok-3-release-elon-musk/index.html"><u>attention</u></a> after February 17, 2025, when it launched the Grok-3 model. In our Generative AI ranking, it first entered the top 10 on February 21, 2025, at #9, briefly reached Claude’s typical spot at #8, and is now fluctuating between #9 and #10.</p><p>Here is the current Generative AI Top 10 from the Cloudflare Radar <a href="https://radar.cloudflare.com/ai-insights?dateStart=2025-01-01&amp;dateEnd=2025-03-06"><u>AI page</u></a>, as of March 9, 2025, with ChatGPT/OpenAI as #1 since the start of the year (a trend also observed in previous years, as the table below shows).</p><p>To make ranking changes and trends easier to spot, the table below shows the February 1 - March 1, 2025 (monthly average) standings on the left, with color-coded comparisons to 2024’s list: services that dropped since 2024 appear in red, while new or higher-ranked ones appear in green. For reference, the second column presents the top 10 from our <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>2024 Year in Review</u></a> (including comparisons to the previous year), and the third column displays the 2023 Top 10.</p>
<figure>
    <table>
        <colgroup>
            <col></col>
            <col></col>
            <col></col>
        </colgroup>
        <thead>
            <tr>
                <th><span><span><strong>Top 10 Generative AI services </strong></span></span><br /><span><span><strong>in February 2025</strong></span></span><br /><span><span>ChatGPT / OpenAI (=)</span></span><br /><span><span>Character.AI (=)</span></span><br /><span><span>QuillBot (</span></span><span><span><strong>#4 in 2024</strong></span></span><span><span>)</span></span><br /><span><span>Codeium (</span></span><span><span><strong>#3</strong></span></span><span><span>)</span></span><br /><span><span>GitHub Copilot (</span></span><span><span><strong>#7</strong></span></span><span><span>)</span></span><br /><span><span>DeepSeek (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span><br /><span><span>Perplexity </span></span><span><span><strong>(#6</strong></span></span><span><span>)</span></span><br /><span><span>Claude / Anthropic (</span></span><span><span><strong>#5</strong></span></span><span><span>)</span></span><br /><span><span>Hugging Face (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span><br /><span><span>Suno AI (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span></th>
                <th><span><span><strong>Top 10 Generative AI services in 2024 (</strong></span></span><a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/#ready-to-face-the-generative-ai-era"><span><span><strong><u>Radar Year in Review</u></strong></span></span></a><span><span><strong>)</strong></span></span><br /><br /><span><span>ChatGPT / OpenAI (=)</span></span><br /><span><span>Character.AI (=)</span></span><br /><span><span>Codeium (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span><br /><span><span>QuillBot (#3 in 2023)</span></span><br /><span><span>Claude / Anthropic (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span><br /><span><span>Perplexity (=)</span></span><br /><span><span>GitHub Copilot (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span><br /><span><span>Wordtune (</span></span><span><span><strong>#7</strong></span></span><span><span>)</span></span><br /><span><span>Poe (</span></span><span><span><strong>#5</strong></span></span><span><span>)</span></span><br /><span><span>Tabnine (</span></span><span><span><strong>new</strong></span></span><span><span>)</span></span></th>
                <th><span><span><strong>Top 10 Generative AI services in 2023 (</strong></span></span><a href="https://radar.cloudflare.com/year-in-review/2023#internet-services"><span><span><strong><u>Radar Year in Review</u></strong></span></span></a><span><span><strong>)</strong></span></span><br /><span><span>ChatGPT / OpenAI</span></span><br /><span><span>Character.AI</span></span><br /><span><span>QuillBot</span></span><br /><span><span>Hugging Face</span></span><br /><span><span>Poe</span></span><br /><span><span>Perplexity</span></span><br /><span><span>Wordtune</span></span><br /><span><span>Google Bard</span></span><br /><span><span>ProWritingAid</span></span><br /><span><span>Voicemod</span></span></th>
            </tr>
        </thead>
    </table>
</figure><p>Other than the previously mentioned DeepSeek, Grok/xAI and ChatGPT/OpenAI, the top 10 includes other chatbots like Anthropic’s Claude, as well as other types of Generative AI services. Character.AI — a specialized platform for creating and interacting with character-based personalities — is #2, then there’s Perplexity (#7) that functions as an AI search engine, while QuillBot (#3) is an AI-powered writing assistant for paraphrasing, grammar, and summarizing. Codeium (#4), which includes developer productivity services like Windsurf AI, and GitHub Copilot (#5) serve as AI coding assistants.</p><p>There’s also Hugging Face (#9), an open-source hub for AI models (we’re including it here as a Generative AI platform, just as we do for other AI model enablers like Replicate and Stability AI), and Suno AI (#10), a music generator that creates songs from text prompts.</p><p>We saw that Grok/xAI entered the top 10 during the last days of February, but since we’re using February’s monthly average, it appears at #11 here. Curious about the rest of the February 2025 Top 20? Here it is, with AI coding services having a strong presence — beyond Codeium and GitHub Copilot, Sider AI and Tabnine also make the list.</p><p>11	Grok / xAI</p><p>12	Poe</p><p>13	Sider AI</p><p>14	Civitai</p><p>15	Tabnine</p><p>16	Google Gemini</p><p>17	Voicemod</p><p>18	GliaCloud</p><p>19	Runway ml</p><p>20	Midjourney</p><p>We have published Generative AI popularity rankings in both the <a href="https://radar.cloudflare.com/year-in-review/2023#internet-services"><u>2023</u></a> and <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>2024</u></a> Cloudflare Radar Year in Review, and in both, OpenAI’s ChatGPT has consistently held the #1 spot. In <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>2024</u></a>, as explained in our <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><u>blog post</u></a>, ChatGPT also moved in our overall rankings, nearly breaking into the top 50 by the end of the year. (It was just outside the top 100 in 2023).</p>
    <div>
      <h3>ChatGPT's influence in the overall ranking </h3>
      <a href="#chatgpts-influence-in-the-overall-ranking">
        
      </a>
    </div>
    <p>A recent addition to Cloudflare Radar is the updated domains ranking page in our <a href="https://radar.cloudflare.com/dns"><u>DNS section</u></a>, which includes a number of detailed trends. There, we now show the <a href="https://radar.cloudflare.com/domains"><u>top 100 overall Internet services ranking</u></a> next to a top 100 domains list. ChatGPT / OpenAI, the leading Generative AI service, is typically ranked in the mid-50’s on weekdays and close to #60 on weekends (based on early March 2025 insights), next to non-AI services like Temu, eBay, or Disney Plus.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4miBGzkADr0y6XTYzyFpCR/cea822eb3c9b7c8c25d27858a72762ca/image5.png" />
          </figure><p>Looking at previous trends, as noted in our  <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><u>Year in Review blog</u></a>, ChatGPT / OpenAI ranked around #200 in early 2023 and climbed to near the top 100 by the end of the year. In 2024, it started just outside the top 100, reached the top 60 in May with the <a href="https://openai.com/index/gpt-4o-and-more-tools-to-chatgpt-free/"><u>release of the 4o model</u></a>, and has been near the top 50 since September 2024, aligning with the return of employees and students to their routines.</p>
    <div>
      <h3>Visitor location distribution: Americas, Europe and Asia</h3>
      <a href="#visitor-location-distribution-americas-europe-and-asia">
        
      </a>
    </div>
    <p>The <a href="https://radar.cloudflare.com/domains"><u>Domain Information page on Cloudflare Radar</u></a> enables users to look at the location popularity of a <a href="https://radar.cloudflare.com/domains/domain"><u>specific domain</u></a> (from the last seven days), derived from Cloudflare <a href="https://one.one.one.one/"><u>1.1.1.1</u></a> resolver traffic data in a period of 48 hours (Radar’s default) on March 3-4, 2025.</p><p>In this case, the <a href="https://radar.cloudflare.com/domains/domain/chatgpt.com"><u>chatgpt.com</u></a> domain has most of its DNS traffic from the United States (17%), followed by Germany(7%), Brazil (4%), Indonesia (4%), and India (4%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MsCFiTsGRVF1N3c1oa87b/d5e02c68d7558b16e4fdb518ef5c776a/image2.png" />
          </figure><p>In the case of the new kid in town, <a href="https://radar.cloudflare.com/domains/domain/deepseek.com"><u>deepseek.com</u></a>, the U.S. is #1 location, with 14% of that domain’s DNS traffic, followed by China (11%), Germany (10%), Brazil (7%), and Hong Kong (5%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YKbSmz0ksNrbef2Xt7UE0/3fd694750f2cb413cd0e6e5001dfb248/image10.png" />
          </figure><p><a href="https://radar.cloudflare.com/domains/domain/grok.com"><u>Grok.com</u></a>, on the other hand, has 20% of its traffic from the U.S., 8% from Hong Kong, 6% from Germany, 6% from Japan, and 6% from Vietnam, reflecting a strong presence in Asia within its top 5 locations. Asia is even more dominant for another well-known Generative AI chatbot domain, <a href="https://radar.cloudflare.com/domains/domain/poe.com"><u>poe.com</u></a>, with Hong Kong ranking #1 (29% of traffic), followed by the U.S. (13%), Japan (6%), China (6%), and Singapore (5%).</p><p>Hugging Face (<a href="https://radar.cloudflare.com/domains/domain/huggingface.co"><u>huggingface.co</u></a>), the Generative AI models platform, also has the U.S. as its top location (34% of traffic), but its top 5 includes four European countries: France (6%), the United Kingdom (6%), Germany (4%), and Sweden (4%).</p><p>Looking more specifically at AI-powered coding tools, DNS traffic for <a href="https://radar.cloudflare.com/domains/domain/githubcopilot.com"><u>githubcopilot.com</u></a> is primarily driven by the United States (22%), followed by Germany (6%), Hong Kong (5%), India (5%), and Japan (5%). A similar pattern appears for <a href="https://radar.cloudflare.com/domains/domain/codeium.com"><u>codeium.com</u></a>, where the U.S. leads with 15%, followed by Hong Kong (8%), Japan (7%), Brazil (5%), and the Netherlands (5%). Likewise, <a href="https://radar.cloudflare.com/domains/domain/cursor.com"><u>cursor.com</u></a> has 20% of its DNS traffic from the U.S., followed by Hong Kong (10%), India (6%), China (6%), and Japan (5%). <a href="https://radar.cloudflare.com/domains/domain/tabnine.com"><u>Tabnine.com</u></a>, another AI code completion tool, has its highest traffic from the U.S. (15%), followed by India (6%), Brazil (5%), Germany (5%), and Hong Kong (5%).</p><p>The DNS traffic data from Cloudflare Radar highlights strong U.S. usage across all major Generative AI and AI coding tools, with regional adoption varying by platform. (It is worth noting that 1.1.1.1 has a larger user base in the U.S., but these specific trends vary depending on the domains.)</p><ul><li><p>Asia dominates poe.com and AI coding tools like Codeium and Cursor.</p></li><li><p>Europe plays a significant role in Hugging Face and GitHub Copilot.</p></li><li><p>Brazil emerges as a notable player, particularly in DeepSeek and Tabnine.</p></li></ul>
    <div>
      <h3>Generative AI general traffic growth </h3>
      <a href="#generative-ai-general-traffic-growth">
        
      </a>
    </div>
    <p>Cloudflare, in terms of Generative AI customers, has a unique perspective on the industry. We power many Generative AI services, both large and small. From a cohort of Generative AI customers — some recently popular, others established chatbots or image AI generators, and some just starting — we’ve aggregated both HTTP request data over the past months and <a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/"><u>application-layer attack</u></a> trends.</p><p>Let’s start with HTTP requests traffic growth in the past year. From February 1, 2024, through March 1, 2025 (a 13-month period to compare February 2024 with February 2025), <b>monthly traffic grew a total of 251%</b>, and over 2% of the requests processed by Cloudflare were mitigated as potential attacks.</p><p>Note that there was an increase over most of the entities in the cohort of Generative AI websites, and this 251% growth also includes recent Generative AI customers, although those mostly don’t influence the growth trend that much — if we exclude Generative AI customers that onboarded to Cloudflare in late 2024 and early 2025, year growth is 234%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4323TeVxE3VqSEoFjopa8t/640305a2b4b3583218115f7a9c35cd60/image11.png" />
          </figure><p>In this next perspective, shown at a daily level, the expected drop during Christmas and the end of the year holidays is quite clear. Another trend surfaces: the cohort of Cloudflare’s Generative AI customers definitely see more use during weekdays than weekends, suggesting a workplace focus. The clear drop during the holidays also includes the summer in the Northern Hemisphere — there's a slight drop in peak traffic in July, for example (similar to what we typically see in terms of general traffic in most countries).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NvzlVxeom6omVtgFjwauB/a3088b03dc870581c9b6b1f86a810f6d/image12.png" />
          </figure><p>We also have a perspective on the top visitor locations to Generative AI websites, where the U.S. ranks #1, with 23% of all requests in this category, followed by India (8%), Brazil (5%), Indonesia (4%), and Philippines (4%) in the top 5. European countries, such as the U.K. and Germany, come next in the ranking. Below, we show the top 50 for further exploration. Note that Egypt is the first African country appearing in the ranking, at #32, with the same 0.7% as South Africa.</p><p><b>Top locations by share of traffic to Generative AI websites</b></p><table><tr><td><p><b>Rank</b></p></td><td><p><b>Country</b></p></td><td><p><b>Percentage of total</b></p></td><td><p><b>Rank</b></p></td><td><p><b>Country</b></p></td><td><p><b>Percentage of total</b></p></td></tr><tr><td><p>1</p></td><td><p>United States</p></td><td><p>22.7%</p></td><td><p>26</p></td><td><p>Singapore</p></td><td><p>1.1%</p></td></tr><tr><td><p>2</p></td><td><p>India</p></td><td><p>8.3%</p></td><td><p>27</p></td><td><p>Ukraine</p></td><td><p>1%</p></td></tr><tr><td><p>3</p></td><td><p>Brazil</p></td><td><p>4.9%</p></td><td><p>28</p></td><td><p>Taiwan</p></td><td><p>0.9%</p></td></tr><tr><td><p>4</p></td><td><p>Indonesia</p></td><td><p>4.2%</p></td><td><p>29</p></td><td><p>Thailand</p></td><td><p>0.9%</p></td></tr><tr><td><p>5</p></td><td><p>Philippines</p></td><td><p>4%</p></td><td><p>30</p></td><td><p>Chile</p></td><td><p>0.8%</p></td></tr><tr><td><p>6</p></td><td><p>United Kingdom</p></td><td><p>3.8%</p></td><td><p>31</p></td><td><p>United Arab Emirates</p></td><td><p>0.7%</p></td></tr><tr><td><p>7</p></td><td><p>Germany</p></td><td><p>3.7%</p></td><td><p>32</p></td><td><p>Egypt</p></td><td><p>0.7%</p></td></tr><tr><td><p>8</p></td><td><p>Canada</p></td><td><p>3.2%</p></td><td><p>33</p></td><td><p>Saudi Arabia</p></td><td><p>0.7%</p></td></tr><tr><td><p>9</p></td><td><p>France</p></td><td><p>3%</p></td><td><p>34</p></td><td><p>South Africa</p></td><td><p>0.7%</p></td></tr><tr><td><p>10</p></td><td><p>Mexico</p></td><td><p>2.7%</p></td><td><p>35</p></td><td><p>Sweden</p></td><td><p>0.6%</p></td></tr><tr><td><p>11</p></td><td><p>Japan</p></td><td><p>2.4%</p></td><td><p>36</p></td><td><p>Belgium</p></td><td><p>0.6%</p></td></tr><tr><td><p>12</p></td><td><p>Russian Federation</p></td><td><p>2.2%</p></td><td><p>37</p></td><td><p>Bangladesh</p></td><td><p>0.6%</p></td></tr><tr><td><p>13</p></td><td><p>Spain</p></td><td><p>2%</p></td><td><p>38</p></td><td><p>Switzerland</p></td><td><p>0.6%</p></td></tr><tr><td><p>14</p></td><td><p>Australia</p></td><td><p>2%</p></td><td><p>39</p></td><td><p>Morocco</p></td><td><p>0.6%</p></td></tr><tr><td><p>15</p></td><td><p>South Korea</p></td><td><p>1.8%</p></td><td><p>40</p></td><td><p>Ecuador</p></td><td><p>0.6%</p></td></tr><tr><td><p>16</p></td><td><p>Vietnam</p></td><td><p>1.6%</p></td><td><p>41</p></td><td><p>Israel</p></td><td><p>0.5%</p></td></tr><tr><td><p>17</p></td><td><p>Italy</p></td><td><p>1.5%</p></td><td><p>42</p></td><td><p>Nigeria</p></td><td><p>0.5%</p></td></tr><tr><td><p>18</p></td><td><p>Malaysia</p></td><td><p>1.5%</p></td><td><p>43</p></td><td><p>Romania</p></td><td><p>0.5%</p></td></tr><tr><td><p>19</p></td><td><p>Turkey</p></td><td><p>1.4%</p></td><td><p>44</p></td><td><p>Portugal</p></td><td><p>0.5%</p></td></tr><tr><td><p>20</p></td><td><p>Poland</p></td><td><p>1.4%</p></td><td><p>45</p></td><td><p>Kazakhstan</p></td><td><p>0.5%</p></td></tr><tr><td><p>21</p></td><td><p>Netherlands</p></td><td><p>1.4%</p></td><td><p>46</p></td><td><p>Austria</p></td><td><p>0.4%</p></td></tr><tr><td><p>22</p></td><td><p>Argentina</p></td><td><p>1.2%</p></td><td><p>47</p></td><td><p>Czech Republic</p></td><td><p>0.4%</p></td></tr><tr><td><p>23</p></td><td><p>Colombia</p></td><td><p>1.2%</p></td><td><p>48</p></td><td><p>Hong Kong</p></td><td><p>0.4%</p></td></tr><tr><td><p>24</p></td><td><p>Pakistan</p></td><td><p>1.2%</p></td><td><p>49</p></td><td><p>Algeria</p></td><td><p>0.4%</p></td></tr><tr><td><p>25</p></td><td><p>Peru</p></td><td><p>1.1%</p></td><td><p>50</p></td><td><p>Denmark</p></td><td><p>0.4%</p></td></tr></table>
    <div>
      <h3>Attacks targeting Generative AI websites</h3>
      <a href="#attacks-targeting-generative-ai-websites">
        
      </a>
    </div>
    <p>On the security front, <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">Generative AI websites have become key targets</a> for DDoS attacks as they have gained attention and grown in popularity. Recently, our Cloudforce One team published a threat analysis on attacks by Anonymous Sudan targeting AI-related companies: <a href="https://www.cloudflare.com/threat-intelligence/research/report/inside-lameduck-analyzing-anonymous-sudans-threat-operations/"><u>Inside LameDuck: Analyzing Anonymous Sudan’s Threat Operations</u></a>. In this report, they explained how the U.S. Department of Justice indicted two Sudanese brothers behind LameDuck, linking them to 35,000+ DDoS attacks via the Skynet Botnet. The case exposes both political and financial motives behind their operations and underscores the global effort — including Cloudflare’s — to strengthen cybersecurity.</p><p>Over the last 13 months, from February 1, 2024, until March 1, 2025, Cloudflare blocked <b>197 billion requests </b>as potential attacks. Of that number, <b>39 billion</b> requests were part of <b>DDoS attacks</b> targeting Generative AI websites.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4R9GfQsKixZ3CcGB4GPazz/2e43fa46125d22a3058e2099a1c8c38e/image6.png" />
          </figure><p>In terms of malicious requests that were blocked, June 2024 saw the highest number of potential attacks blocked by Cloudflare, followed by January 2025. For DDoS attacks, January 2025 recorded the highest activity, followed by November 2024 and February 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KtuwFvwQWbjHL464kDbUG/45bc21c813d9a0ab0fb621da4eb4367d/image14.png" />
          </figure><p>Looking more closely at DDoS traffic at a daily level, the largest attack occurred on February 23, 2024, when 3.7 billion requests were blocked as part of a DDoS attack. The second largest was a 1.5 billion request DDoS attack on November 13, 2024. Additionally, a series of multiday DDoS attacks took place between January 20 and 31, 2025, with January 29 seeing the highest number of DDoS attack-related requests, at over one billion (7.3 billion in total for the month).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2DpI9bSIUziw2mVCA6WwUh/06d00c656656af711cba830f6380ae98/image3.png" />
          </figure><p>During the February 23, 2024, DDoS attack, which targeted a specific Generative AI customer, more than 20% of all requests across all Generative AI customers were blocked as part of the attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gh467o7mEZBvm0wu3s9eI/1e2a21f47e3645de4257549937bc5ba0/image8.png" />
          </figure><p>Taking a more granular view of DDoS attacks against that particular Generative AI customer, the attack began on February 22, 2024, at 22:45 UTC, lasting for over eight hours of continuous traffic spikes, peaking at 270,000 requests per second. Further attacks followed, with the most significant occurring on February 26, 2024, at 03:45 UTC, lasting three minutes and peaking at 309,000 requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ccxcb4WCqyoZOpZvJkv8/1748a4044e7de327aff9f289d51e4fdc/image9.png" />
          </figure><p>Another popular Generative AI customer was targeted in a DDoS campaign from January 25 to January 31, 2025, with traffic peaking on January 30, reaching 523,000 requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZBMBJXBlyk7kHc85TthBG/ba0309a070b3d920b9ba2f9651fb1343/image7.png" />
          </figure><p>Another perspective to consider over the same February 2024 to February 2025 period is the type of Generative AI websites most targeted by DDoS attacks. General AI chatbots accounted for over 80% of all blocked requests, making them the primary targets.</p><p><b>DDoS attacks targets by Generative AI category</b></p><table><tr><td><p><b>Category</b></p></td><td><p><b>Percentage</b></p></td></tr><tr><td><p>General Chatbots</p></td><td><p>82.7%</p></td></tr><tr><td><p>Image AI Generators</p></td><td><p>8.2%</p></td></tr><tr><td><p>Code Assistants</p></td><td><p>3.4%</p></td></tr><tr><td><p>Other</p></td><td><p>2.6%</p></td></tr><tr><td><p>AI Research &amp; Infra</p></td><td><p>1.3%</p></td></tr><tr><td><p>AI Music Creation</p></td><td><p>1.2%</p></td></tr><tr><td><p>Writing &amp; Content AI</p></td><td><p>0.4%</p></td></tr><tr><td><p>Voice &amp; Video AI</p></td><td><p>0.3%</p></td></tr></table><p>However, when looking at the percentage of total traffic blocked as DDoS attacks within each category, image AI-related websites had the highest proportion, with over 50% of their total traffic being blocked.</p><p><b>Websites category with the highest percentage of traffic blocked as DDoS attacks </b></p><table><tr><td><p><b>Category</b></p></td><td><p><b>Blocked DDoS (%)</b></p></td></tr><tr><td><p>Image AI</p></td><td><p>50.8%</p></td></tr><tr><td><p>AI Chatbot</p></td><td><p>31%</p></td></tr><tr><td><p>AI Search</p></td><td><p>9.4%</p></td></tr><tr><td><p>AI Code Assistant</p></td><td><p>6.8%</p></td></tr><tr><td><p>AI Model</p></td><td><p>5.8%</p></td></tr><tr><td><p>AI Music</p></td><td><p>3.6%</p></td></tr><tr><td><p>AI Company</p></td><td><p>2.9%</p></td></tr></table>
    <div>
      <h3>Conclusion: AI transformation</h3>
      <a href="#conclusion-ai-transformation">
        
      </a>
    </div>
    <p>Generative AI continues to grow and transform Internet usage, driving traffic growth of over 250% for AI services over the course of the last year. ChatGPT is definitely the most popular service, and nears the top 50 of all Internet services as seen through analysis of traffic from our 1.1.1.1 DNS resolver. New entrants like DeepSeek and Grok/xAI have quickly climbed the popularity rankings, while regional adoption patterns show the U.S., India, and Brazil leading in visitor traffic.</p><p>This rapid rise has also drawn cyberattacks, with 39 billion requests identified as DDoS attacks targeting specific Generative AI websites over the past year. While most attacks focus on general AI chatbots, image-generation sites show the highest percentage of blocked requests, at over 50%. As Generative AI evolves, tracking these trends provides a historical record of growth surges, global reach, and emerging threats.</p><p>If you’re interested in more trends and insights about the Internet, check out <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p><p></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Generative AI]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Domain Rankings]]></category>
            <guid isPermaLink="false">37sDCMT8KRe3efzPLqVEoN</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Offline celebrations: how Christmas, NYE, and Lunar New Year festivities shape online behavior]]></title>
            <link>https://blog.cloudflare.com/offline-celebrations-how-christmas-nye-and-lunar-new-year-festivities-shape-online-behavior/</link>
            <pubDate>Tue, 11 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ This blog examines how diverse cultural celebrations — from Western Christmas to Orthodox and Lunar New Year festivities — shape global Internet traffic. ]]></description>
            <content:encoded><![CDATA[ <p>Now that 2025 has been here for a few weeks and 2024 has closed with a variety of year-end traditions — from Christmas and Hanukkah celebrations to New Year’s Eve (NYE) countdowns, as well as celebrations of Orthodox Christmas, and Lunar/Chinese New Year — let’s examine how these events have shaped online behavior across continents and cultures. Reflecting on Christmas and NYE 2024 provides insights into how these trends compared with those of the previous year, <a href="https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/"><u>as detailed in an earlier blog</u></a>.</p><p>One notable finding is the remarkable consistency in human online patterns from one year to the next, a trend that persists despite cultural differences among countries. Data from over 50 countries reveal how people celebrated in 2024–2025, offering a timely reminder of typical holiday trends. While Christmas remains a dominant influence in many regions, other cultural and religious events — such as Hanukkah and local festivities — also shape online habits where Western traditions hold less sway.</p><p>In regions where Christmas is deeply rooted, Internet traffic dips significantly during Christmas Eve dinners, midnight masses, morning gift exchanges, and Christmas Day lunches, a pattern evident in both our previous and current analyses.</p><p>This analysis focuses exclusively on non-bot Internet traffic, filtering out automated activity to highlight genuine human behavior during the most recent holiday season. Before going into specific countries, here’s a global hourly snapshot (UTC-based) of Christmas and New Year’s Eve 2024 traffic from the <a href="https://radar.cloudflare.com/explorer?dt=2024-12-19_2025-01-04&amp;timeCompare=1&amp;dataSet=http&amp;filters=botClass%253DLikely_Human"><u>Cloudflare Radar Data Explorer</u></a>: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5z6aUJ5SZ6iFr5dIMABPfb/bc740e88003c6e53b06b4331116f2131/image1.png" />
          </figure><p>This worldwide perspective captures notable drops across a 23-hour window, from New Zealand to Hawaii. Globally, December 25 saw a 19% drop in traffic from the previous week, followed by December 24 with a 14% drop. This holiday period also included the four days with the lowest global traffic during the period between October 1, 2024, and February 6, 2025. In descending order, these days were: December 25, December 24, January 1, 2025, and December 31, 2024.</p><p>Some key takeaways:</p><ul><li><p><b>Europe:</b> Christmas Eve drops in Internet traffic reached up to 67% (seen in Denmark; Spain reached 66%).</p></li><li><p><b>Americas:</b> December 25 was key, with drops ranging from 26% in the US and up to 70% at midnight in Argentina.</p></li><li><p><b>Regional timing</b> differs: Nordic countries on Christmas Eve disconnect earlier at around 18:00, Southern Europe at 21:00-22:00, and Latin America even later.</p></li><li><p><b>New Year's</b> shows worldwide impact, strongest in Latin America: a 73% drop in Chile, followed by 68% drop in Argentina.</p></li><li><p><b>Lunar New Year:</b> January 29 is a peak offline moment, with drops of 25% in Hong Kong, 23% in Singapore, and 24% in Vietnam.</p></li></ul><p><i>Note: Unless otherwise noted, all times used in this blog post are local ones; in countries with several timezones, we’re using the timezone where more people live. For the US, Eastern time is used.</i></p>
    <div>
      <h2>Global Christmas and New Year’s Eve daily trends</h2>
      <a href="#global-christmas-and-new-years-eve-daily-trends">
        
      </a>
    </div>
    <p>In this analysis, we apply the same methods as our <a href="https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/"><u>previous blog post</u></a> to rank countries and regions by their lowest holiday traffic dates, showing each day’s percentage drop. Many locations, such as the United States, experience clear dips on December 24 and 25 as people disconnect for Christmas Eve and Christmas Day celebrations. In contrast, some regions show smaller declines on December 31 as the New Year approaches. The order and magnitude of these drops vary by country, reflecting cultural nuances — some nations register their largest drop on Christmas Eve, others on Christmas Day, and still others exhibit unique patterns around New Year’s Eve or January 1.</p><p>Below is a world map highlighting where traffic dropped the most on December 24 or 25; darker colors indicate larger drops based on our analysis.</p><p>In the following table, we provide more details than can be shown in the map. The data focuses only on locations that had their lowest traffic days between December 24-25 and December 31-January 1, along with the respective percentage drop on each of those days compared to the previous week (where applicable).</p><p><b><i>Top days with the lowest Internet traffic in December 2024 - January 2025</i></b></p><p><i>(with respective percentage drops, if any, from the previous week)</i></p><table><tr><td><p><b>Location</b></p></td><td><p><b>December 24</b></p></td><td><p><b>December 25</b></p></td><td><p><b>December 31</b></p></td><td><p><b>January 1</b></p></td></tr><tr><td><p>Denmark</p></td><td><p>-42%</p></td><td><p>-19%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Portugal</p></td><td><p>-34%</p></td><td><p>-29%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Poland</p></td><td><p>-33%</p></td><td><p>-24%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Norway</p></td><td><p>-33%</p></td><td><p>-15%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Spain</p></td><td><p>-31%</p></td><td><p>-26%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Switzerland</p></td><td><p>-30%</p></td><td><p>-28%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Finland</p></td><td><p>-30%</p></td><td><p>-22%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Austria</p></td><td><p>-29%</p></td><td><p>-19%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Ireland</p></td><td><p>-28%</p></td><td><p>-31%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Chile</p></td><td><p>-28%</p></td><td><p>-25%</p></td><td><p>
</p></td><td><p>-5%</p></td></tr><tr><td><p>Czech Republic</p></td><td><p>-28%</p></td><td><p>-16%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Sweden</p></td><td><p>-28%</p></td><td><p>-11%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Colombia</p></td><td><p>-26%</p></td><td><p>-35%</p></td><td><p>-5%</p></td><td><p>-8%</p></td></tr><tr><td><p>Italy</p></td><td><p>-26%</p></td><td><p>-31%</p></td><td><p>-1%</p></td><td><p></p></td></tr><tr><td><p>Argentina</p></td><td><p>-25%</p></td><td><p>-30%</p></td><td><p>
</p></td><td><p>-3%</p></td></tr><tr><td><p>Belgium</p></td><td><p>-25%</p></td><td><p>-23%</p></td><td><p>-1%</p></td><td><p></p></td></tr><tr><td><p>France</p></td><td><p>-24%</p></td><td><p>-24%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Mexico</p></td><td><p>-24%</p></td><td><p>-21%</p></td><td><p>
</p></td><td><p>-1%</p></td></tr><tr><td><p>Germany</p></td><td><p>-24%</p></td><td><p>-16%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>United Kingdom</p></td><td><p>-22%</p></td><td><p>-32%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Brazil</p></td><td><p>-22%</p></td><td><p>-23%</p></td><td><p>-2%</p></td><td><p>-1%</p></td></tr><tr><td><p>United States</p></td><td><p>-21%</p></td><td><p>-26%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Canada</p></td><td><p>-20%</p></td><td><p>-22%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Netherlands</p></td><td><p>-19%</p></td><td><p>-30%</p></td><td><p>-8%</p></td><td><p></p></td></tr><tr><td><p>Australia</p></td><td><p>-19%</p></td><td><p>-29%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>New Zealand</p></td><td><p>-18%</p></td><td><p>-27%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Greece</p></td><td><p>-17%</p></td><td><p>-22%</p></td><td><p>-5%</p></td><td><p></p></td></tr><tr><td><p>Romania</p></td><td><p>-16%</p></td><td><p>-12%</p></td><td><p>-7%</p></td><td><p></p></td></tr><tr><td><p>South Africa</p></td><td><p>-12%</p></td><td><p>-31%</p></td><td><p>-4%</p></td><td><p></p></td></tr><tr><td><p>Nigeria</p></td><td><p>-10%</p></td><td><p>-17%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Japan</p></td><td><p>-6%</p></td><td><p>-6%</p></td><td><p></p></td><td><p></p></td></tr><tr><td><p>Philippines</p></td><td><p>-4%</p></td><td><p>-6%</p></td><td><p>-5%</p></td><td><p>-3%</p></td></tr></table><p>In cultures with a strong Christmas tradition — mostly in the West — people generally go offline on Christmas Eve (December 24) or Christmas Day (December 25). In regions where Christmas is less culturally significant, key offline moments occur on other dates, such as December 31 or January 1.</p><p>In Europe, most countries (including Denmark, Norway, Spain, Portugal, Switzerland, Finland, Czech Republic, Germany, France, Poland, Sweden, Austria, the United Kingdom, Italy, Ireland, Belgium, and Romania) experience their largest traffic drop on December 24, making Christmas Eve the primary offline moment. Some countries also exhibit a less significant drop in traffic on December 25 or December 31.</p><p>North America and Latin America display similar patterns, with the United States, Canada, and Mexico showing the largest drop on December 25. In Latin America — specifically in Argentina, Chile, and Colombia — December 25 also sees a significant decline, though in some cases January 1 emerges as a key offline moment, indicating slight variations in local celebration timing.</p><p>In Asia, the traffic drops are milder. For example, Japan experienced only modest declines on December 24 and 25, while in the Philippines, January 1 recorded a 3% drop compared with December 25, which had a 6% drop from the previous week. In Hong Kong, Singapore, and Malaysia, the influence of Lunar/Chinese New Year is more pronounced; however, Christmas Day 2024 still registered noticeable declines of 12%, 13%, and 9% in these locations, respectively. Meanwhile, in Indonesia and Turkey, December 31 is their peak low-traffic day, suggesting that Christmas plays a less central role in their offline behavior.</p><p>As an example, here’s the US perspective from <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=US&amp;timeCompare=1&amp;dt=2023-12-18_2024-01-02"><u>Cloudflare Radar Data Explorer</u></a>, where the drop in traffic during Christmas 2024 and New Year’s 2025 is evident:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uQOG9ZRE6Fi3y3kXTdQqN/5fefb453b84fbf23d1b3a1ff5982cbc5/image5.png" />
          </figure><p>Comparing Christmas 2023 with 2024, most European regions experienced a stronger traffic drop on their key Christmas day — whether December 24 or December 25 — than in the previous year. The ranking of the days with the lowest traffic sometimes shifts, with new dates such as December 23 or January 1 entering the top three. In North and Latin America, while December 24 and 25 remain important, January 1 has also emerged in several cases. </p>
    <div>
      <h3>Orthodox Christmas impact</h3>
      <a href="#orthodox-christmas-impact">
        
      </a>
    </div>
    <p>In countries that celebrate Orthodox Christmas (January 7), Internet traffic follows a distinct pattern. During the December 25 Christmas period, the drops are relatively modest — for example, Russia sees a 6% decrease on December 25, while Romania and Ukraine register declines of 16% on December 24 and 12–13% on December 25. However, because traffic falls significantly on December 30–31 — even more so than on December 24–25 — the levels on January 6–7 are considerably higher compared with the previous week. In fact, a notable surge occurs on January 7 compared with December 31, with traffic increasing by 30% in Russia, 32% in Romania, 24% in Ukraine, 31% in Belarus, and 15% in Kazakhstan.</p><p>Below is a daily chart of Internet traffic in Russia, which clearly shows the December 30–31 drop and a strong rebound in the following days of the new year. Notably, there is a slight decline on January 6, 2025 — the Orthodox Christmas Eve — registering a 4% drop compared with the previous day.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56wavWZZT4FMg8IwP6zoQv/5e9869e9c4d892341639588dbf3e1e23/image2.png" />
          </figure>
    <div>
      <h3>Where Christmas isn’t central</h3>
      <a href="#where-christmas-isnt-central">
        
      </a>
    </div>
    <p>Not every country’s December revolves around Christmas. Hanukkah’s timing changes each year, influencing when people log off. In 2024, Hanukkah started on the evening of December 25, leading to a 5% drop in traffic in Israel, followed by 4% drops on the next two days. (Hanukkah lasted until January 2, 2025.) Looking at a more granular view, traffic dropped ~15% between 14:45 and 20:00 in Israel on December 25. The chart below highlights the days that Hanukkah was celebrated.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GVwc2be7mvoHsh4bMavXK/c0d6a3abb88d83cad8ab6520b4c68742/image6.png" />
          </figure><p>In 2023, Hanukkah began on December 7, leading to an 8% traffic drop in Israel that day and a 7% decline on the following days. More granular data shows that on December 7, traffic dropped the most around 17:00, reaching as much as 17%.</p><p>In Saudi Arabia, Turkey, Egypt, and Indonesia, the lowest traffic days don’t align with December 24-25. In those regions, <a href="https://en.wikipedia.org/wiki/Ramadan"><u>Ramadan</u></a> is a much more impactful event, as we’ve noted in <a href="https://blog.cloudflare.com/how-ramadan-shows-up-in-internet-trends/"><u>previous blog posts</u></a>. Meanwhile, in other regions such as China, Hong Kong, Singapore, Vietnam, Taiwan, and South Korea, Lunar New Year plays a much bigger role, as we’ll analyze in more detail below.</p><p>Now, let’s focus on a more granular perspective of these trends, showing the impact of Christmas dinners and lunches, and also New Year’s Eve drops in traffic.</p>
    <div>
      <h2>A more granular perspective of Christmas</h2>
      <a href="#a-more-granular-perspective-of-christmas">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lCnDEUTNr2y8tk6z2LgPI/edcb32bf7d81f27f903696c4b78e3d36/image7.png" />
          </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>The Christmas 2024 data show that in Europe, as we saw in the <a href="https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/"><u>previous year</u></a>, the stronger traffic drop still occurs during Christmas Eve dinner. In Spain, for example, there is a 66% drop compared with the previous week at 21:45, while the morning and lunch periods on Christmas Day see further declines of 55% at 08:00 and 47% at 15:30. Denmark recorded a 67% drop at 18:45 and a 50% drop the next morning at 07:00. Poland and the Czech Republic experience steep dinner declines, with drops as high as 60% (17:15) and 55% (17:45) respectively, followed by substantial drops in the early morning. France, Portugal, Italy, Switzerland, and Germany follow similar patterns, with dinnertime drops ranging between 46% and 57%, along with additional significant declines during the morning or lunchtime hours.</p><p>A closer look at timing reveals interesting regional differences also related to typical times for <a href="https://www.stoketravel.com/backpacking-europe/average-dinner-time-europe/"><u>dinner</u></a>. In Nordic countries such as Denmark, Norway, Sweden, Finland, and Poland, the Christmas Eve dinnertime drop in traffic happens relatively early — Denmark’s is at 18:45, and Norway’s occurs around 17:45 to 18:15, with Sweden and Finland also showing early declines. A similar pattern appears in the Czech Republic (17:45). Some countries show mixed trends, such as the UK, which sees a 34% drop in traffic both at 16:15 and 20:30, or Switzerland, with 47% at 19:00 and 50% at 21:00, and Germany, with 46% at 19:15.</p><p>In contrast, many Latin and Southern European countries experience peak drops later in the evening (this includes Latin America, as we’ll highlight below). Spain, for instance, reaches its maximum drop at 21:45, while Italy and Portugal see the largest declines at 21:15. Greece records its biggest drop between 21:45 and 22:45, at 37%. Romania and France, for example, are slightly earlier, at 20:45. These early or late traffic drops reflect local dinner traditions, which vary by region.</p>
    <div>
      <h3>Americas</h3>
      <a href="#americas">
        
      </a>
    </div>
    <p>In the Americas, holiday patterns continue to reflect a mix of cultural traditions. In the United States, Christmas Eve sees a 30% drop between 19:45 and 20:45, aligning with family gatherings, while Christmas Day mornings record a 39% decline at 09:30 and a 33% drop at 13:15, highlighting the quiet start to the day. It’s similar in Canada, both in the drop (35%) and the time (20:30), but Mexico aligns more closely with South American countries.</p><p>In Latin America, Christmas Eve (<a href="https://www.usatoday.com/story/news/nation/2023/12/23/nochebuena-meaning-celebrate-on-the-24th/71981540007/"><u>Nochebuena</u></a>) remains the key period of reduced Internet usage, and the following trends are consistent with <a href="https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/"><u>Christmas 2023</u></a>. Significant traffic declines align with late-night traditions like the Midnight Toast (in Argentina, the late-night feast is especially popular) and Misa de Gallo (Midnight Mass). For example:</p><ul><li><p>Chile: -62% at 22:45, -63% at midnight (December 25)</p></li><li><p>Argentina: -60% at 22:15, -70% at midnight</p></li><li><p>Colombia: -49% at 22:15, -34% at midnight</p></li><li><p>Peru: -47% at 22:30, -53% at midnight</p></li><li><p>Mexico: -48% at 22:30, -40% at midnight</p></li><li><p>Brazil: -46% at 22:00</p></li></ul>
    <div>
      <h3>Asia Pacific</h3>
      <a href="#asia-pacific">
        
      </a>
    </div>
    <p>In the Asia Pacific region and other parts of the world, the reduction in online activity is noticeably milder. Countries such as Indonesia, Japan, South Korea, and Thailand record much smaller drops at Christmas Eve dinner and in the morning. For instance, Japan’s dinner drop is only 11%, while South Korea’s is 18%.</p><p>Singapore, Hong Kong, Malaysia, and the Philippines show more variability, with some moderate dinnertime drops but stronger declines later in the day in places like Singapore and Hong Kong. New Zealand and Australia, in the Southern Hemisphere, experienced a 29% and 30% drop respectively at dinner followed by even deeper declines in the morning and early afternoon.</p>
    <div>
      <h3>Middle East and Africa</h3>
      <a href="#middle-east-and-africa">
        
      </a>
    </div>
    <p>Turning to the Middle East and Africa, the trends reflect regional cultural differences. In these areas the reduction in online activity is generally less dramatic than in predominantly Christian regions. Nigeria, for example, shows a 20% drop at dinner (with additional declines at later times). Our analysis also includes other Middle Eastern locations such as the United Arab Emirates, which registers a relatively modest -12% drop at Christmas Eve dinner with deeper declines later in the day.</p><p>In <a href="https://blog.cloudflare.com/easter-passover-ramadan-internet-trends-2023/"><u>previous blog posts</u></a>, we have shown how events like <a href="https://blog.cloudflare.com/how-ramadan-shows-up-in-internet-trends/"><u>Ramadan</u></a> clearly impact Internet traffic in countries with large Muslim populations. One example from our <a href="https://radar.cloudflare.com/year-in-review/2024/ae?compareWith=ID&amp;cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A15%2C%22targetId%22%3A%2211B31B8E5374713A1265DF95F60D0530%22%7D#internet-traffic-growth"><u>Year in Review 2024</u></a> highlights Indonesia and the United Arab Emirates, where traffic dropped during Eid al-Fitr, the festival marking the end of Ramadan (April 9-10, 2024).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5iYCMXqn92mgjAS4SSqqzK/291f7fe6602b723a0f49862690f45951/image4.png" />
          </figure>
    <div>
      <h3>Boxing Day trends</h3>
      <a href="#boxing-day-trends">
        
      </a>
    </div>
    <p>Boxing Day on December 26 shows a sharp rebound in online activity after the significant drop in traffic during Christmas. In the UK, Canada, Australia, and New Zealand, traffic recovered as people return online after the Christmas break, even if daily traffic in the UK and Canada compared with the previous week was still lower -2% and -3% respectively, it was much higher than Christmas Day (+42% in the UK and +24% in Canada). Traditionally associated with charitable activities, family gatherings, and shopping, the day sees traffic spikes across these regions:</p><table><tr><td><p><b>Location</b></p></td><td><p><b>December 26 increase/decrease in daily traffic</b></p></td><td><p><b>Peak traffic increase on December 26</b></p></td></tr><tr><td><p>Australia</p></td><td><p>+6%</p></td><td><p>December 26, 10:00: +12%</p></td></tr><tr><td><p>United Kingdom</p></td><td><p>-2%</p></td><td><p>December 26, 12:45: +7%</p></td></tr><tr><td><p>Canada</p></td><td><p>-3%</p></td><td><p>December 26, 12:15: +1%</p></td></tr><tr><td><p>New Zealand</p></td><td><p>+2%</p></td><td><p>December 26, 10:30: +7%, 17:15: +11%</p></td></tr></table>
    <div>
      <h3>Christmas traffic drops in more detail</h3>
      <a href="#christmas-traffic-drops-in-more-detail">
        
      </a>
    </div>
    <p>Here is the list of locations that saw a clear drop in traffic on Christmas Eve or Christmas Day in the morning or around lunch. We selected the time (morning or lunch) with the largest drop compared to the previous week for further analysis. The list is ordered by the Christmas Eve dinner drop. Countries like Russia (where <a href="https://www.bbc.co.uk/newsround/59905614"><u>Orthodox Christians</u></a> celebrate Christmas later, on January 7), Japan, China, Indonesia, Turkey, Israel, Thailand, Egypt, Singapore, Vietnam, and Bangladesh showed no impact during Christmas Eve dinner or Christmas Day morning or lunch.</p><table><tr><td><p><b>Location</b></p></td><td><p><b>Christmas Eve Dinner Drop</b></p></td><td><p><b>Christmas Day Morning/Lunch Drop</b></p></td></tr><tr><td><p>Spain</p></td><td><p>-66% at 21:45</p></td><td><p>-55% at 08:00, -47% at 15:30</p></td></tr><tr><td><p>Denmark</p></td><td><p>-67% at 18:45</p></td><td><p>-50% at 07:00</p></td></tr><tr><td><p>Argentina</p></td><td><p>-60% at 22:15, (-70% at 00:00, December 25)</p></td><td><p>-60% at 08:30</p></td></tr><tr><td><p>Poland</p></td><td><p>-60% at 17:15</p></td><td><p>-52% at 07:15, -33% at 15:45</p></td></tr><tr><td><p>Chile</p></td><td><p>-62% at 22:45, (-63% at 00:00, December 25)</p></td><td><p>-55% at 08:45</p></td></tr><tr><td><p>Norway</p></td><td><p>-56% at 17:45, -56% at 18:15</p></td><td><p>-49% at 07:30, -23% at 13:30</p></td></tr><tr><td><p>Czech Republic</p></td><td><p>-55% at 17:45</p></td><td><p>-51% at 06:45, -26% at 14:00</p></td></tr><tr><td><p>France</p></td><td><p>-54% at 20:45</p></td><td><p>-50% at 07:00, -43% at 13:45</p></td></tr><tr><td><p>Portugal</p></td><td><p>-57% at 21:15</p></td><td><p>-54% at 07:30, -47% at 14:15</p></td></tr><tr><td><p>Italy</p></td><td><p>-48% at 21:15</p></td><td><p>-53% at 06:45, -55% at 13:45</p></td></tr><tr><td><p>Switzerland</p></td><td><p>-47% at 19:00, -50% at 21:00</p></td><td><p>-50% at 06:45, -37% at 13:45</p></td></tr><tr><td><p>Germany</p></td><td><p>-46% at 19:15</p></td><td><p>-40% at 07:15, -21% at 13:45</p></td></tr><tr><td><p>Brazil</p></td><td><p>-46% at 22:00</p></td><td><p>-42% at 08:15, -35% at 13:45</p></td></tr><tr><td><p>Sweden</p></td><td><p>-46% at 15:15, -46% at 16:30</p></td><td><p>-43% at 07:15, -20% at 13:15</p></td></tr><tr><td><p>Colombia</p></td><td><p>-49% at 22:15,  (-34% at 00:00, December 25)</p></td><td><p>-55% at 07:45, -44% at 15:15</p></td></tr><tr><td><p>Belgium</p></td><td><p>-51% at 19:45</p></td><td><p>-49% at 07:15</p></td></tr><tr><td><p>Mexico</p></td><td><p>-48% at 22:30, (-40% at 00:00, December 25)</p></td><td><p>-46% at 08:00</p></td></tr><tr><td><p>Finland</p></td><td><p>-45% at 15:30, -43% at 17:00-17:45</p></td><td><p>-46% at 08:30, -34% at 14:30</p></td></tr><tr><td><p>Austria</p></td><td><p>-48% at 19:30</p></td><td><p>-47% at 06:15, -29% at 14:15</p></td></tr><tr><td><p>United Kingdom</p></td><td><p>-34% at 16:15, -34% at 20:30</p></td><td><p>-36% at 09:00, -43% at 14:45</p></td></tr><tr><td><p>Romania</p></td><td><p>-34% at 20:45</p></td><td><p>-34% at 06:30</p></td></tr><tr><td><p>Ireland</p></td><td><p>-38% at 16:15, -40% at 21:00</p></td><td><p>-42% at 09:30, -42% at 15:15</p></td></tr><tr><td><p>Canada</p></td><td><p>-35% at 20:30</p></td><td><p>-35% at 09:30, -27% at 16:00</p></td></tr><tr><td><p>South Africa</p></td><td><p>-26% at 19:30</p></td><td><p>-35% at 09:30, -46% at 14:30</p></td></tr><tr><td><p>Netherlands</p></td><td><p>-35% at 21:00</p></td><td><p>-38% at 08:30, -40% at 16:00</p></td></tr><tr><td><p>United States</p></td><td><p>-30% at 19:45-20:45</p></td><td><p>-39% at 09:30, -33% at 13:15</p></td></tr><tr><td><p>Australia</p></td><td><p>-30% at 21:00</p></td><td><p>-44% at 13:45</p></td></tr><tr><td><p>New Zealand</p></td><td><p>-29% at 19:45</p></td><td><p>-39% at 09:30, -44% at 13:45</p></td></tr><tr><td><p>Ukraine</p></td><td><p>-25% at 18:15</p></td><td><p>-25% at 09:00, -19% at 14:30</p></td></tr><tr><td><p>Nigeria</p></td><td><p>-20% at 16:45, -21% at 22:30</p></td><td><p>-22% at 13:45, (-36% at 21:45)</p></td></tr><tr><td><p>South Korea</p></td><td><p>-18% at 21:00</p></td><td><p>-19% at 07:45</p></td></tr><tr><td><p>Malaysia</p></td><td><p>-19% at 22:15</p></td><td><p>-22% at 09:15, -13% at 14:15</p></td></tr><tr><td><p>Philippines</p></td><td><p>-19% at 21:30</p></td><td><p>-26% at 06:00</p></td></tr><tr><td><p>Hong Kong</p></td><td><p>-13% at 20:30</p></td><td><p>-20% at 10:00, -17% at 16:15</p></td></tr><tr><td><p>Japan</p></td><td><p>-11% at 19:45</p></td><td><p>-12% at 18:00</p></td></tr></table><p>
</p><p>Many countries, though not all, experienced a noticeable drop in Internet traffic during Christmas Day lunch, with variations in timing. Spain, Poland, Norway, the Czech Republic, France, Portugal, Italy, Switzerland, Germany, Brazil, Sweden, Colombia, Finland, Austria, the United Kingdom, Ireland, Canada, South Africa, the Netherlands, the United States, New Zealand, and Ukraine all recorded significant declines, mostly in the early afternoon. In contrast, Denmark, Argentina, Chile, Belgium, Mexico, Romania, and Australia did not exhibit the same lunch decline.</p>
    <div>
      <h2>New Year’s Eve: A planetary moment</h2>
      <a href="#new-years-eve-a-planetary-moment">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uoXOtiOJn1y6fRtZo9Xuo/d56016c1ad03a2d6274825facd242d54/image10.png" />
          </figure><p>Midnight on January 1 — a moment when people around the world turned away from their screens — revealed regional differences in digital behavior as people disconnected to celebrate. To accurately assess New Year’s impact, we compared traffic at 00:00 on January 1 with 00:00 on December 18 (the same time two weeks prior), avoiding Christmas distortions. This approach highlights the distinct drop in Internet activity due to the celebrations. These latest holiday patterns mirror those of <a href="https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/"><u>2023</u></a>, with slight percentage changes and Latin American countries exhibiting larger drops than Northern Europe or some Asian regions.</p><p>Latin America countries led our global analysis with the strongest drops: Chile registered a 73% decline, Argentina 68%, and Colombia a 50% drop, underscoring deep-rooted traditions that drove people to disconnect at midnight.</p><p>European nations also experienced substantial declines in Internet traffic, especially those in Latin or Southern Europe, with Romania (-60%), Italy (-58%), Portugal (-57%), and Spain (-56%) demonstrating pronounced drops, while countries like Germany (-48%) and Switzerland (-42%) also emphasized the cultural importance of New Year’s celebrations. Northern Europe, however, showed a more moderate impact, with Norway dropping by 41% and Sweden by 22%.</p><p>In contrast, North America experienced a relatively milder decrease in online activity, with the United States with a drop in traffic of 11% and Canada at 15%, likely due to the spread of time zones and staggered celebrations. The trend was similar in 2023, with a 12% drop in the US and 14% in Canada, reinforcing the consistency of local Internet usage patterns from year to year.</p><p>Across Asia and the Pacific, the impact varied: the Philippines (-41%), Australia (-21%), South Korea (-18%), and Singapore (-18%) showed significant declines, while Indonesia (-7%) and Malaysia (-11%) experienced a smaller drop.</p><p>In the Middle East, the United Arab Emirates saw a 29% decline, and Egypt dropped by 7%, whereas Israel recorded an 11% increase, indicating different cultural or post-celebration dynamics. The 2024 data highlighted New Year’s global influence, with patterns of reduced online activity shaped by diverse local traditions that impacted digital activity.</p><table><tr><td><p><b>Locations</b></p></td><td><p><b>January 1, 00:00 drop (compared to December 18)</b></p></td><td><p><b>Locations</b></p></td><td><p><b>January 1, 00:00 drop (compare to December 18)</b></p></td></tr><tr><td><p>Chile</p></td><td><p>-73%</p></td><td><p>Australia</p></td><td><p>-21%</p></td></tr><tr><td><p>Argentina</p></td><td><p>-68%</p></td><td><p>Ireland</p></td><td><p>-21%</p></td></tr><tr><td><p>Romania</p></td><td><p>-60%</p></td><td><p>United Kingdom</p></td><td><p>-20%</p></td></tr><tr><td><p>Italy</p></td><td><p>-58%</p></td><td><p>France</p></td><td><p>-20%</p></td></tr><tr><td><p>Portugal</p></td><td><p>-57%</p></td><td><p>Hong Kong</p></td><td><p>-20%</p></td></tr><tr><td><p>Spain</p></td><td><p>-56%</p></td><td><p>South Africa</p></td><td><p>-19%</p></td></tr><tr><td><p>Colombia</p></td><td><p>-50%</p></td><td><p>South Korea</p></td><td><p>-18%</p></td></tr><tr><td><p>Germany</p></td><td><p>-48%</p></td><td><p>Singapore</p></td><td><p>-18%</p></td></tr><tr><td><p>Brazil</p></td><td><p>-48%</p></td><td><p>Thailand</p></td><td><p>-17%</p></td></tr><tr><td><p>Mexico</p></td><td><p>-48%</p></td><td><p>Nigeria</p></td><td><p>-17%</p></td></tr><tr><td><p>Switzerland</p></td><td><p>-42%</p></td><td><p>Finland</p></td><td><p>-17%</p></td></tr><tr><td><p>Netherlands</p></td><td><p>-41%</p></td><td><p>Taiwan</p></td><td><p>-17%</p></td></tr><tr><td><p>Norway</p></td><td><p>-41%</p></td><td><p>Canada</p></td><td><p>-15%</p></td></tr><tr><td><p>Philippines</p></td><td><p>-41%</p></td><td><p>New Zealand</p></td><td><p>-15%</p></td></tr><tr><td><p>Poland</p></td><td><p>-40%</p></td><td><p>China</p></td><td><p>-12%</p></td></tr><tr><td><p>Ukraine</p></td><td><p>-39%</p></td><td><p>United States</p></td><td><p>-11%</p></td></tr><tr><td><p>Belgium</p></td><td><p>-38%</p></td><td><p>Malaysia</p></td><td><p>-11%</p></td></tr><tr><td><p>Austria</p></td><td><p>-38%</p></td><td><p>Indonesia</p></td><td><p>-7%</p></td></tr><tr><td><p>Russia</p></td><td><p>-35%</p></td><td><p>Egypt</p></td><td><p>-7%</p></td></tr><tr><td><p>Czech Republic</p></td><td><p>-31%</p></td><td><p>Vietnam</p></td><td><p>-3%</p></td></tr><tr><td><p>United Arab Emirates</p></td><td><p>-29%</p></td><td><p>Saudi Arabia</p></td><td><p>10%</p></td></tr><tr><td><p>Sweden</p></td><td><p>-22%</p></td><td><p>Israel</p></td><td><p>11%</p></td></tr></table>
    <div>
      <h2>Chinese &amp; Lunar New Year: family time</h2>
      <a href="#chinese-lunar-new-year-family-time">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3WWDRsMW1itlNJ5OxwV5KU/c8f1c2a0064e2124fdc62f7b341da55d/image8.png" />
          </figure><p>The Lunar New Year, also known as Chinese New Year or Spring Festival, is widely celebrated across Asia. It began on Wednesday, January 29, 2025, marking the start of the Year of the Snake, a symbol of wisdom and intuition. A few days prior, China’s extended holiday period began, running from January 29 to February 4, 2025.</p><p>This period is marked by Chunyun, the <a href="https://focus.cbbc.org/what-is-chunyun-and-why-is-it-the-worlds-largest-annual-human-migration"><u>world’s largest annual human migration</u></a>, as millions return home. Key traditions include the New Year’s Eve Reunion Dinner, fireworks, and cultural performances such as temple fairs and dragon or lion dances. In South Korea, Malaysia, and Singapore, the holiday period was shorter, lasting from January 28 to 30, 2025. Here’s Vietnam as an example, where it is also clearly evident how traffic started to decrease after January 21, 2025:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kGLwhLKc2V7dL9ITNWeNc/f31ec0df97ed0439efe3bce8cbae256b/image11.png" />
          </figure><p>Daily Internet traffic drops when people disconnected to celebrate across Asia. Hong Kong saw its sharpest decline on January 29 (-25%), while Singapore peaked at -23% on the same day. Vietnam (-24%) and Malaysia (-16%) also hit their lowest points on January 29. Taiwan’s biggest drop occurred on January 28 (-15%), while South Korea recorded moderate declines of 8% on both January 28 and 29. China experienced its largest drop on January 28 (-17%), while Indonesia saw its strongest decline on January 29 (-11%). In general, January 29 stood out as a key moment of reduced Internet traffic, though the impact varied by country.</p><table><tr><td><p><b>Location</b></p></td><td><p><b>January 28</b></p></td><td><p><b>January 29</b></p></td><td><p><b>January 30</b></p></td></tr><tr><td><p>Hong Kong</p></td><td><p>-22%</p></td><td><p>-25%</p></td><td><p>-22%</p></td></tr><tr><td><p>Vietnam</p></td><td><p>-12%</p></td><td><p>-24%</p></td><td><p>-18%</p></td></tr><tr><td><p>Singapore</p></td><td><p>-17%</p></td><td><p>-23%</p></td><td><p>-16%</p></td></tr><tr><td><p>Malaysia</p></td><td><p>-9%</p></td><td><p>-16%</p></td><td><p>-12%</p></td></tr><tr><td><p>Taiwan</p></td><td><p>-15%</p></td><td><p>-14%</p></td><td><p>-12%</p></td></tr><tr><td><p>Indonesia</p></td><td><p>
</p></td><td><p>-11%</p></td><td><p></p></td></tr><tr><td><p>China</p></td><td><p>-17%</p></td><td><p>-9%</p></td><td><p></p></td></tr><tr><td><p>South Korea</p></td><td><p>-8%</p></td><td><p>-8%</p></td><td><p></p></td></tr></table><p>The more granular traffic data revealed specific offline moments that mirrored rich cultural traditions. In China, digital activity dropped sharply on January 28 around midday (-36%) and again in the late afternoon. It also declined by 28% at 00:00 on January 29, likely reflecting deep engagement in family reunions and festivities. Hong Kong, Vietnam, and the Philippines also experienced significant declines around midnight, while Singapore, Malaysia, and Taiwan exhibited notable, though varied, drops.</p><table><tr><td><p><b>Location</b></p></td><td><p><b>January 28/29 drops in traffic</b></p></td></tr><tr><td><p>China</p></td><td><p>January 28, 12:30: -36%, 18:15-20:15: -32% 
January 29, 00:00: -28%, 08:00: -31%, 13:00: -19%</p></td></tr><tr><td><p>Singapore</p></td><td><p>January 29, 00:00: -12%, 15:00: -35%</p></td></tr><tr><td><p>Vietnam</p></td><td><p>January 28, 21:30: -33%, 
January 29, 00:00: -33%, 06:00: -40%, 18:15: -38%</p></td></tr><tr><td><p>Philippines</p></td><td><p>January 28, 20:30: -7% 
January 29, 00:00: +3%, 06:00: -8%</p></td></tr><tr><td><p>Hong Kong</p></td><td><p>January 28, 19:45: -36% 
January 29, 00:00: -29%, 09:30: -40%, 14:45: -35%</p></td></tr><tr><td><p>Malaysia</p></td><td><p>January 28, 20:30-21:45: -18%, 
January 29, 00:00: -12%, 09:30: -30%, 15:00: -25%, 21:15: -20%</p></td></tr><tr><td><p>Taiwan</p></td><td><p>January 28, 18:30: -34%;
January 29, 00:00: -14%, 12:30: -26%</p></td></tr></table><p>It’s important to note that the midnight drop in traffic during Lunar or Chinese New Year was not as pronounced as during the <a href="https://en.wikipedia.org/wiki/Gregorian_calendar"><u>Gregorian calendar’s</u></a> New Year, as seen in previous data.</p>
    <div>
      <h2>Conclusion: traditions stand the test of time</h2>
      <a href="#conclusion-traditions-stand-the-test-of-time">
        
      </a>
    </div>
    <p>In 2024, the trends remain strikingly consistent with those of 2023. In Europe, Christmas Eve continues to be the main offline moment, with traffic drops reaching 67% in Denmark and 66% in Spain. In North and Latin America, December 25 remained the key day, as seen with a 26% drop in the US and up to 70% drop at midnight in Argentina. These patterns demonstrate that traditional celebrations still heavily influence online behavior.</p><p>Across Asia, unique cultural events drive distinct periods of reduced online activity. The Lunar New Year showed peak disconnection around January 29 in China, Hong Kong, Singapore, and Vietnam. Overall, the 2024 data reinforce the enduring impact of cultural rituals on global Internet usage. Those are also demonstrated by Ramadan in a different part of the year. It also reminds us that while the Internet connects billions, cultural rhythms continue to shape our relationship with technology.</p><p>If you’re interested in more trends and insights about the Internet, check out <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Christmas]]></category>
            <category><![CDATA[New Year]]></category>
            <guid isPermaLink="false">mljaUpYN9x5uUxMSbXy0f</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[A diversity of downtime: the Q4 2024 Internet disruption summary]]></title>
            <link>https://blog.cloudflare.com/q4-2024-internet-disruption-summary/</link>
            <pubDate>Tue, 28 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ After a rather busy third quarter, the fourth quarter of 2024 saw significantly fewer Internet disruptions. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/network/">network</a> spans more than 330 cities in over 120 countries, where we interconnect with over 13,000 network providers in order to provide a broad range of services to millions of customers. The breadth of both our network and our customer base provides us with a unique perspective on Internet resilience, enabling us to observe the impact of Internet disruptions at both a local and national level, as well as at a network level.</p><p>As we have noted in the past, this post is intended as a summary overview of observed and confirmed disruptions, and is not an exhaustive or complete list of issues that have occurred during the quarter. A larger list of detected traffic anomalies is available in the <a href="https://radar.cloudflare.com/outage-center#traffic-anomalies"><u>Cloudflare Radar Outage Center</u></a>.</p><p>In the third quarter we covered quite a few <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#government-directed"><u>government-directed Internet shutdowns</u></a>, including many intended to prevent cheating on exams. In the fourth quarter, however, we only observed a single <a href="#government-directed"><u>government-directed shutdown</u></a>, this one related to protests. Terrestrial <a href="#cable-cuts"><u>cable cuts</u></a> impacted connectivity in two African countries. As we have seen multiple times before, both unexpected <a href="#power-outages"><u>power outages</u></a> and rolling power outages following <a href="#military-action"><u>military action</u></a> resulted in Internet disruptions. <a href="#natural-disasters"><u>Violent storms and an earthquake</u></a> predictably caused Internet outages in the affected countries. And unexpected issues with <a href="#maintenance"><u>maintenance</u></a> efforts caused outages at two European providers, while Verizon customers in several US states experienced a brief but <a href="#unknown"><u>unexplained</u></a> outage.</p>
    <div>
      <h2>Cable cuts</h2>
      <a href="#cable-cuts">
        
      </a>
    </div>
    
    <div>
      <h3>Rwanda</h3>
      <a href="#rwanda">
        
      </a>
    </div>
    <p>On October 1, local mobile provider <a href="https://radar.cloudflare.com/as36890"><u>MTN Rwanda (AS36890)</u></a> <a href="https://x.com/MTNRwanda/status/1841092339625865329"><u>published a post on X</u></a> alerting subscribers of a double fiber cut in <a href="https://radar.cloudflare.com/tz"><u>Tanzania</u></a> and <a href="https://radar.cloudflare.com/ug"><u>Uganda</u></a> that may impact connection quality. As a result of these fiber cuts, Internet traffic began to drop sharply after 12:45 local time (10:45 UTC), with a full outage visible between 13:15 - 13:30 local time (11:15 - 11:30 UTC). Traffic then began to rapidly recover, recovering to expected levels around 19:00 local time (17:00 UTC). Several hours later, MTN Rwanda <a href="https://x.com/MTNRwanda/status/1841201775493464174"><u>published a followup post</u></a> confirming that all services had been restored.</p><p>The <a href="https://afterfibre.nsrc.org/"><u>African Undersea and Terrestrial Fibre Optic Cables (AfTerFibre) map</u></a> shows that in addition to connecting with networks to the north and south in Tanzania and Uganda, it appears that connections are also available through networks to the west in the <a href="https://radar.cloudflare.com/cd"><u>Democratic Republic of the Congo (DRC)</u></a>. However, <a href="https://radar.cloudflare.com/routing/as36890#connectivity"><u>MTN Rwanda’s upstream providers and/or peers</u></a> may not be routing traffic through DRC-based networks, meaning that they couldn’t be used as a backup path when the apparently simultaneous fiber cuts occurred.</p>
    <div>
      <h3>Niger</h3>
      <a href="#niger">
        
      </a>
    </div>
    <p>On November 30, local mobile provider <a href="https://radar.cloudflare.com/as37531"><u>Airtel Niger (AS37531)</u></a> <a href="https://x.com/airtelniger/status/1862936319824888015"><u>posted a thread of messages</u></a> on X apologizing for Internet service disruptions, explaining that (translated) “<i>Indeed, due to a simultaneous interruption on the national optical fiber on the Niamey-Dosso, Niamey-Balleyara exits, our internet services are completely interrupted throughout the territory, beyond our control.</i>” These simultaneous fiber cuts resulted in a near complete outage between 17:30 local time (16:30 UTC) on November 29 until 19:45 local time (18:45 UTC) on November 30.</p><p>It seems unusual that the message thread was not posted until after the outage was resolved. It is possible that Airtel Niger themselves had no backup connectivity, and could not post an update until connectivity was restored. Alternately, given that the first post of the thread starts with “<i>[COMMUNIQUÉ IMPORTANT📢]</i>” (“<i>[IMPORTANT PRESS RELEASE 📢 ]</i>”), it is possible that the alert and apology was communicated through more official channels, such as Airtel’s website, in a timely manner, with the thread on X simply a follow-up once Internet services were again available.</p>
    <div>
      <h2>Power outages</h2>
      <a href="#power-outages">
        
      </a>
    </div>
    
    <div>
      <h3>Cuba </h3>
      <a href="#cuba">
        
      </a>
    </div>
    <p>Instability in a country’s electrical infrastructure often causes widespread power outages, which, in turn, disrupt Internet connectivity. This happened on October 18 in <a href="https://radar.cloudflare.com/cu"><u>Cuba</u></a>, where a <a href="https://x.com/EnergiaMinasCub/status/1847315612738978114"><u>post on X from the Ministry of Energy and Mines of Cuba</u></a> noted (translated) “<i>Following the unexpected disconnection of the Antonio Guiteras CTE, the National Electricity System was completely disconnected at 11 a.m. today. The Unión Eléctrica is working on its restoration.</i>” The power outage caused Internet traffic within the country to drop by more than half within minutes (15:15 UTC). Connectivity was disrupted for approximately three-and-a-half days, as it returned to expected levels around 23:00 local time on October 21 (03:00 UTC on October 22).</p><p>The Ministry posted several status updates on October 19 and 20, covering the work being done to restore power across the country. A <a href="https://x.com/OSDE_UNE/status/1848812241979916598"><u>final X post on October 22</u></a> signaled the end of the power outage, proclaiming (translated) “<i>At 02:44 pm the National Electric System was synchronized.</i>”</p><p>Several weeks later, power issues again impacted Internet connectivity in Cuba. On November 6, <a href="https://x.com/OSDE_UNE/status/1854252013212844461"><u>the Electrical Union of Cuba (Uníon Eléctrica) posted on X</u></a> that (translated) “<i>14:48 hours. Strong winds caused by the intense Hurricane Rafael, cause the disconnection of the National Electric System. Contingency protocols are applied.</i>” The timing of this post aligns with a sharp decline in traffic observed from Cuba, which fell sharply around 14:30 local time (19:30 UTC). Over the following days, after Hurricane Rafael passed the island, the Uníon Eléctrica posted numerous updates on the restoration of electrical service. Internet traffic appeared to return to expected levels around 13:00 local time (18:00 UTC) on November 9, although full restoration of electrical services took several days longer.</p><p>On December 4, Cuba suffered its third nationwide power outage in as many months. Early that morning, the <a href="https://x.com/EnergiaMinasCub/status/1864220455139168538"><u>Ministry of Energy and Mines posted on X</u></a> that (translated) “<i>At 2:08 this morning, the Electrical System, SEN, was disconnected when the Antonio Guiteras thermoelectric plant went out due to the automatic tripping.</i>” The loss of this electrical power due to the failure of this generation plant caused a significant drop in Internet traffic from Cuba, falling approximately 60% as compared to the previous week at just before 02:15 local time (07:15 UTC). Traffic recovered to expected levels almost a day later at around 00:30 local time (05:30 UTC). This timing aligns with a <a href="https://x.com/EnergiaMinasCub/status/1864542875255541780"><u>follow-on X post from the Ministry</u></a> that announced that all units had been synchronized, signaling a restoration of electrical service.</p>
    <div>
      <h3>Guadeloupe</h3>
      <a href="#guadeloupe">
        
      </a>
    </div>
    <p>An article <a href="https://www.theguardian.com/world/2024/oct/25/guadeloupe-power-outage-strike"><u>published in The Guardian</u></a> on October 25 noted that “<i>The French Caribbean island of </i><a href="https://radar.cloudflare.com/gp"><i><u>Guadeloupe</u></i></a><i> has been left entirely without power after striking workers seized control of the territory’s power station.</i>” Workers entered the power station’s command room “<i>and caused an emergency shutdown of all the engines</i>”, according to the article. The power outage caused by this “emergency shutdown” resulted in traffic dropping nearly 70% as compared to the previous week at 08:30 local time (12:30 UTC). Although “<a href="https://www.lemonde.fr/en/international/article/2024/10/25/guadeloupe-suffers-power-outage-blamed-on-striking-staff_6730504_4.html"><u>restored electricity supply for the 230,000 affected households was expected at 3 pm local time (19:00 UTC) at best</u></a>”, it appears that recovery took significantly longer than expected, as Internet traffic did not return to expected levels until around 22:00 local time on October 26 (02:00 UTC on October 27) . A <a href="https://www.guadeloupe.gouv.fr/Actualites/Communiques-et-dossiers-de-presse/Conflit-EDF-PEI-Point-de-situation-a-11h"><u>press release from the government</u></a> at 11:00 local time (15:00 UTC) on October 26 gave an update on the recovery efforts, noting (translated) “<i>160,000 users have had their electricity restored. The restoration of service for the 70,000 customers still cut off is continuing, with a return to normal expected over the weekend.</i>” It also noted that “<i>76% of Orange subscribers have been able to regain their network connection. 1,800 homes are still without internet.</i>”</p>
    <div>
      <h3>Kenya</h3>
      <a href="#kenya">
        
      </a>
    </div>
    <p>Power outages in <a href="https://radar.cloudflare.com/ke"><u>Kenya</u></a> resulted in multiple Internet disruptions during both the <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary/#kenya"><u>second</u></a> and <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#kenya"><u>third</u></a> quarters of 2024. A similar event occurred during the fourth quarter as well. An <a href="https://x.com/KenyaPower_Care/status/1869153351436468632"><u>X post from Kenya Power</u></a> contained a “Customer Alert” issued at 01:28 local time on December 18 (22:28 UTC on December 17) that informed customers that “<i>We are experiencing a widespread power outage affecting most of the country, except parts of Western and North Rift regions.</i>” This outage caused Internet traffic from the country to drop by over 70% starting just after midnight local time on December 18 (21:00 UTC on December 17). On December 18 at 07:35 local time (04:35 UTC), an <a href="https://x.com/KenyaPower_Care/status/1869243286667628702"><u>update from Kenya Power posted to X</u></a> reported that power had been restored to all affected areas. Internet traffic from the country had recovered to near expected levels by that time as well.</p>
    <div>
      <h2>Natural disasters</h2>
      <a href="#natural-disasters">
        
      </a>
    </div>
    
    <div>
      <h3>United States, Florida</h3>
      <a href="#united-states-florida">
        
      </a>
    </div>
    <p>At 20:30 local time on October 9 (00:30 UTC on October 10), <a href="https://www.weather.gov/mlb/HurricaneMilton_Impacts"><u>Hurricane Milton made landfall in Florida</u></a> as a Category 3 storm. Damage from Milton was extensive, including flooding, downed trees and power lines, and damage to homes and businesses. The power outages and other infrastructure damage caused by the storm, coupled with evacuation from impacted areas, resulted in a notable Internet disruption at a state level. As seen in the graph below, peak traffic levels on October 10, after Milton’s arrival, were approximately 40% lower than the preceding days. As recovery and restoration efforts began over the following days, and as evacuees returned to home, school, and work, the state’s Internet traffic began to gradually increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KVUA87OvUlomBVrbylU8w/793b65193655ffef980c9341c1476668/Oct_9_-_United_States_-_Florida.png" />
          </figure><p>This gradual recovery is also visible in the series of maps below, which illustrate cities where <a href="https://x.com/CloudflareRadar/status/1845903842355101827"><u>Internet traffic was over 50% lower</u></a> than the same time the prior week, with snapshots taken at 09:00 local time (13:00 UTC) on October 10, 11, and 14. On October 10, <a href="https://x.com/CloudflareRadar/status/1844444286911381980"><u>over 70 cities</u></a> had significantly lower traffic, while on October 14, it was just over 10 cities.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rqveKTtJ60LW8rLBizxeD/ea62aec5653bc46622fbabb922e61c88/Florida_-_three_maps.jpeg" />
          </figure>
    <div>
      <h3>Mayotte</h3>
      <a href="#mayotte">
        
      </a>
    </div>
    <p>On December 14, Cyclone Chido caused significant destruction on the French territory of <a href="https://radar.cloudflare.com/yt"><u>Mayotte</u></a> in the Indian Ocean. Power, water, and communications infrastructure <a href="https://reliefweb.int/report/mozambique/cyclone-chido-has-devastated-mayotte-and-mozambique"><u>were all damaged</u></a>, as well as homes and public facilities. Over three dozen people <a href="https://www.reuters.com/business/environment/french-officials-raise-mayotte-death-toll-39-after-storm-chido-2024-12-24/"><u>were killed</u></a>, with thousands more injured. With such widespread devastation, Internet traffic from the country was also impacted, as would be expected. Chido <a href="https://reliefweb.int/attachments/f852498a-d8a7-42c2-a447-ceff1d24ddeb/20241219_ACAPS_Briefing_note_Mayotte_Impact_of_Tropical_Cyclone_Chido.pdf"><u>made landfall</u></a> in Mayotte early in the morning on December 14, and traffic dropped sharply around 09:00 local time (06:00 UTC), causing a near-complete Internet outage. After extremely slow growth over the following week, a diurnal pattern is once again visible, with peak traffic levels continuing to gradually increase through the end of the month. As of the third week of January 2025, Mayotte’s Internet traffic continues to slowly increase, but remains well below pre-Chido levels.</p>
    <div>
      <h3>Vanuatu</h3>
      <a href="#vanuatu">
        
      </a>
    </div>
    <p>A <a href="https://earthquake.usgs.gov/earthquakes/eventpage/us7000nzf3/executive"><u>magnitude 7.3 earthquake</u></a> struck 24 km WNW of Port-Vila, <a href="https://radar.cloudflare.com/vu"><u>Vanuatu</u></a> at 17:46 local time (01:47 UTC) on December 17. Internet traffic from the country dropped sharply almost immediately, falling nearly 90% compared to the previous week. A significant drop in announced IPv4 address space was also observed, suggesting that damage from the earthquake took core network provider infrastructure offline as well. Recovery was slow, with Internet traffic not returning to expected levels until around 23:00 local time (12:00 UTC) on December 26.</p><p>An <a href="https://maritime-executive.com/editorials/vanuatu-illustrates-risks-of-thin-subsea-cable-infrastructure"><u>editorial published on The Maritime Executive</u></a> website highlights that Vanuatu is currently reliant on the <a href="https://www.submarinecablemap.com/submarine-cable/interchange-cable-network-1-icn1"><u>Interchange Cable Network 1 (ICN1) submarine cable</u></a> connection to <a href="https://radar.cloudflare.com/fj"><u>Fiji</u></a> for international Internet connectivity. The editorial states that “<i>A fire at the cable landing station temporarily interrupted the power supply, disabling internet traffic. The connection was restored 10 days later…</i>” The resolution of the power outage at the cable landing station roughly aligns with traffic returning to expected levels, suggesting that this was a significant driver of the drop in traffic seen from Vanuatu after the earthquake. Starlink’s satellite Internet service provides some nominal redundancy, as <a href="https://x.com/Starlink/status/1843395755547209765"><u>the company announced service availability</u></a> on October 7. The <a href="https://www.submarinecablemap.com/submarine-cable/tamtam"><u>TAMTAM submarine cable</u></a>, connecting Vanuatu to <a href="https://radar.cloudflare.com/nc"><u>New Caledonia</u></a>, is expected to be ready for service in 2026 — once available, it will provide additional redundancy for Internet connectivity. </p>
    <div>
      <h2>Government directed</h2>
      <a href="#government-directed">
        
      </a>
    </div>
    
    <div>
      <h3>Mozambique</h3>
      <a href="#mozambique">
        
      </a>
    </div>
    <p>On October 25 in <a href="https://radar.cloudflare.com/mz"><u>Mozambique</u></a>, <a href="https://www.enca.com/news-top-stories/internet-blackout-hits-mozambique-capital-after-election-protests"><u>mobile Internet connectivity across multiple providers was shut down</u></a> after protests against the re-election of the ruling Frelimo party became violent. Starting around 13:00 local time (11:00 UTC), significant drops in traffic were observed across <a href="https://radar.cloudflare.com/as30619"><u>AS30619 (</u></a><a href="https://radar.cloudflare.com/as30619">Telecomunicações de Moçambique</a><a href="https://radar.cloudflare.com/as30619"><u>)</u></a>, <a href="https://radar.cloudflare.com/as37342"><u>AS37342 (Movitel)</u></a>, and <a href="https://radar.cloudflare.com/as37223"><u>AS37223 (Vodacom)</u></a>. Both Vodacom and Movitel experienced near complete outages almost immediately, while some traffic remained on Telecomunicações de Moçambique until just before 02:00 local time (00:00 UTC) on October 26. Connectivity was restored the morning of October 26, as traffic returned around 08:00 local time (06:00 UTC). However, after connectivity returned, some social media platforms and messaging applications <a href="https://www.hrw.org/news/2024/11/06/mozambique-post-election-internet-restrictions-hinder-rights"><u>remained unavailable</u></a>.</p><p>Just over a week later, on November 3, subscribers on these mobile networks experienced another Internet shutdown. At around 20:30 local time (18:30 UTC) traffic dropped significantly on each of these networks, with connectivity disrupted for nearly 12 hours before recovering around 08:00 (06:00 UTC) the morning of November 4. Similar shutdowns (“Internet curfews”) were observed November 4-5 and November 6-7 on all three networks, and November 7-8 on Movitel and Vodacom. According to a <a href="https://aimnews.org/2024/11/11/internet-shutdown-to-prevent-destruction-of-country/"><u>published report</u></a>, the country’s Minister of Transport and Communications “admitted that Internet access was restricted in order ‘to avoid the destruction of the country’”, but shifted blame to the impacted services providers, claiming that when they note misuse of their services, they can take the initiative of interrupting the services, as part of their “civil responsibility” to safeguard “the stability and welfare of the population”.</p>
    <div>
      <h2>Military action</h2>
      <a href="#military-action">
        
      </a>
    </div>
    
    <div>
      <h3>Syria</h3>
      <a href="#syria">
        
      </a>
    </div>
    <p>An Internet disruption observed in <a href="https://radar.cloudflare.com/sy"><u>Syria</u></a> on November 9 may have been caused by damage from an <a href="https://www.reuters.com/world/middle-east/israeli-aggression-injures-syrian-soldiers-near-aleppo-state-media-says-2024-11-08/"><u>Israeli airstrike near Aleppo and Idlib</u></a> reported to have taken place earlier that morning. Internet traffic from the country dropped by about 80% at around 04:00 local time (01:00 UTC), with announced IP address space from the country falling significantly at that time as well. The disruption lasted approximately four hours, with traffic and announced IP address space returning to expected levels around 08:00 local time (05:00 UTC). </p><p>Internal analysis of city-level Internet traffic shows a similar disruption in Aleppo, suggesting that it may have been caused by the airstrike.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4mINSvpkYHgWfw2fmmUQ73/655b6509cff44bcdb627fc319b301198/Nov_9_-_Syria_-_Aleppo.png" />
          </figure>
    <div>
      <h3>Ukraine</h3>
      <a href="#ukraine">
        
      </a>
    </div>
    <p>Russian missile strikes on November 17 <a href="https://www.reuters.com/world/europe/ukraine-brings-back-long-rolling-power-cuts-after-major-russian-strike-2024-11-18/"><u>targeting electrical power infrastructure</u></a> in <a href="https://radar.cloudflare.com/ua"><u>Ukraine</u></a> resulted in rolling power outages in multiple regions across the country. As we have seen multiple times throughout the nearly three-year-old conflict, these power outages result in disruptions to Internet traffic, impacting both service provider infrastructure and subscriber connectivity.</p><p>During the period between 07:30 local time (05:30 UTC) on November 17 and 02:00 local time (00:00 UTC) on November 23, <a href="https://x.com/CloudflareRadar/status/1858512061816275381"><u>we observed lower Internet traffic as compared to the previous week</u></a> in Odessa, Zaporizhzhia, Mykolaiv, and Sumy. Traffic in Odessa initially dropped on November 17 by around 50% as compared to the prior week, while on November 18, traffic dropped by over 20% in the other regions. Traffic largely recovered in Odessa by November 21, while <a href="https://x.com/CloudflareRadar/status/1859693864539558225"><u>the other regions took several additional days</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4df2zIvFEYuEzlxCOsheVq/929deb1bb59fa7424499489910df1660/Nov_17_-_Ukraine_-_Odessa_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ifIBz0P1A5CJJE5jzXCEb/9bed04debd6d2b2bb477a09bf33be572/Nov_17_-_Ukraine_-_Mykolaiv_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OP5J1JrocK1gEM8RV8Ejk/55cbe2ef4d5f58665e5a3e8a45930d28/Nov_17_-_Ukraine_-_Sumy_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ul0rncfaLHonLFaO1PAza/171a02e635370bf4ef83d83272309351/Nov_17_-_Ukraine_-_Zaporizhzhia_-_compare.png" />
          </figure><p>Similar attacks took place just a few days later, with <a href="https://www.politico.eu/article/ukraine-power-shutdowns-russia-massive-attack-energy-grid-volodymyr-zelenskyy-vladimir-putin-border-eu/"><u>additional Russian airstrikes again targeting electrical infrastructure in Ukraine</u></a>. Once again, Ukrainian officials implemented emergency power outages, which impacted Internet traffic in multiple areas across the country. Starting around 07:00 local time (05:00 UTC) on November 28, <a href="https://x.com/CloudflareRadar/status/1862210312625152034"><u>we observed traffic drop by as much as 65%</u></a> as compared to the previous week in Kherson Oblast, Mykolaiv, Ternopil Oblast, Rivna, and Lviv. Traffic remained lower over the next several days, but appears to have generally recovered by December 1.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MdWZ5jx2HNvMb98N1OSUv/b2241380e2c8f41bad84c1bfc9d97e26/Nov_28_-_Ukraine_-_Kherson_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BT5MUbigIKPn23Qrro81i/aaaaca0a3ec7281efb726b3fd2ee47b6/Nov_28_-_Ukraine_-_Mykolaiv_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3SFzcNP5FgPxQ20T5HH1UD/9bc3da6e9be2465e9df62bb47dc8e1be/Nov_28_-_Ukraine_-_Ternopil_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6i7si8ch823gPYhcvrANJe/08cf403779b09f7d451da06c61d137d3/Nov_28_-_Ukraine_-_Rivne_-_compare.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jcZqZeL0hDEgb7jTVNaMW/5de359cf61ba96763b6416b835790722/Nov_28_-_Ukraine_-_LVIV_-_compare.png" />
          </figure>
    <div>
      <h2>Maintenance</h2>
      <a href="#maintenance">
        
      </a>
    </div>
    
    <div>
      <h3>Switzerland, Salt Mobile</h3>
      <a href="#switzerland-salt-mobile">
        
      </a>
    </div>
    <p>According to the image below, which replaced the homepage of Swiss provider <a href="https://radar.cloudflare.com/as15796"><u>Salt Mobile (AS15796)</u></a>, reported maintenance took the network completely offline early in the morning of December 3.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UcFvHDUtaPnmtKKVi0SaM/f02396634bef3dee5579428956189ebc/Dec_2_-_Switzerland_-_Salt_Mobile_-splash_-_border.jpg" />
          </figure><p>The outage lasted nearly three hours, with observed traffic at or near zero, between 01:25 and 04:20 local time (00:25 - 03:20 UTC). </p>
    <div>
      <h3>Greenland, Tusass A/S</h3>
      <a href="#greenland-tusass-a-s">
        
      </a>
    </div>
    <p>A December 10 <a href="https://www.tusass.gl/en/press/article/?id=139"><u>update from Tusass A/S</u></a> <a href="https://radar.cloudflare.com/as8818"><u>(AS8818, formerly TeleGreenland)</u></a> explained why the provider experienced a complete Internet outage between 02:30 and 05:15 local time (04:30 - 07:15 UTC) that morning. The post noted “<i>This happened because preventive maintenance was to be done on the connections in Canada between 02:00 and 06:00 last night, but with a combined fault on our connection to Denmark we lost nationwide connectivity. Fortunately, the fault on the connection to Denmark occurred on land, and therefore easy to repair.</i>” The graphs below show that for the duration of the outage, traffic from the network dropped to zero, no IPv6 address space was announced, and the volume of announced IPv4 address space fell by 94%.</p><p>According to <a href="https://www.submarinecablemap.com/"><u>TeleGeography’s Submarine Cable Map</u></a>, the <a href="https://www.submarinecablemap.com/submarine-cable/greenland-connect"><u>Greenland Connect</u></a> cable system connects <a href="https://radar.cloudflare.com/gl"><u>Greenland</u></a> to Newfoundland, <a href="https://radar.cloudflare.com/ca"><u>Canada</u></a>. It is possible that the fault on the connection to <a href="https://radar.cloudflare.com/dk"><u>Denmark</u></a> may have occurred on the Greenland-to-<a href="https://radar.cloudflare.com/is"><u>Iceland</u></a> segment of the Greenland Connect cable system; the Iceland-to-Denmark connection is made over the <a href="https://www.submarinecablemap.com/submarine-cable/danice"><u>DANICE</u></a> submarine cable.</p>
    <div>
      <h2>Unknown</h2>
      <a href="#unknown">
        
      </a>
    </div>
    
    <div>
      <h3>United States, Verizon</h3>
      <a href="#united-states-verizon">
        
      </a>
    </div>
    <p>Very early in the morning of November 12, some subscribers of Verizon’s Fios Internet service experienced a disruption to their Internet connectivity. A <a href="https://puck.nether.net/pipermail/outages/2024-November/015342.html"><u>post to the Outages mailing list</u></a> noted that a major multi-state Verizon Fios outage began at 12:28am EST, impacting Virginia, Washington DC, Maryland, and New Jersey, as well as parts of eastern Pennsylvania. Traffic from <a href="https://radar.cloudflare.com/as701"><u>AS701</u></a>, the autonomous system used by Verizon for their Fios service, dropped by approximately 30% around 00:30 Eastern time (05:30 UTC). At a state level, traffic from AS701 dropped between 50-70% in Pennsylvania, Delaware, Maryland, and Washington DC.</p><p>A subsequent post on the Outages mailing list stated that the outage was resolved everywhere at 3:23am EST (08:23 UTC). Nearly six hours after the outage ended, <a href="https://x.com/VerizonSupport/status/1856334754888438158"><u>Verizon Support published a post on X</u></a> acknowledging the issue, stating “<i>A network issue early this morning disrupted service for some Verizon Fios customers in the Northeast for a short period of time. As soon as the issue was identified, our engineering teams quickly restored the service.</i>” However, they did not provide any information on what ultimately caused the service disruption.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>In addition to the outages and disruptions covered above, <a href="https://blog.cloudflare.com/resilient-internet-connectivity-baltic-cable-cuts/"><u>resilient Internet connectivity</u></a> meant that two Baltic Sea cable cuts that occurred on November 17 and 18 had minimal impact. Whether <a href="https://www.datacenterdynamics.com/en/news/baltic-subsea-cable-damage-was-accidental-not-sabotage-us-and-european-officials/"><u>accidental or sabotage</u></a>, the security and resiliency of submarine cable infrastructure continues to be <a href="https://www.datacenterdynamics.com/en/news/nato-launches-baltic-sentry-for-subsea-cable-security/"><u>an important topic</u></a>. The security and resilience of terrestrial cable infrastructure, as well as other critical Internet infrastructure, must also remain top of mind to help speed recovery from storms, earthquakes, military action, and power outages.</p><p>The Cloudflare Radar team is constantly monitoring for Internet disruptions, sharing our observations on the <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a>, via social media, and in posts on <a href="https://blog.cloudflare.com/tag/cloudflare-radar/"><u>blog.cloudflare.com</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via <a><u>email</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">1dimpxaWgcG7zwbJJYhdfX</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[The fall and rise of TikTok (traffic)]]></title>
            <link>https://blog.cloudflare.com/the-fall-and-rise-of-tiktok-traffic/</link>
            <pubDate>Tue, 21 Jan 2025 13:50:00 GMT</pubDate>
            <description><![CDATA[ On January 19, 2025, ByteDance suspended TikTok and related apps for US users. We examine the 14-hour traffic plunge, recovery near Donald Trump’s inauguration. ]]></description>
            <content:encoded><![CDATA[ <p>The United States ban on TikTok went into effect on January 19, 2025, and although service began to be restored after just 14 hours, it was only close to the inauguration of Donald Trump as the 47th President of the United States that associated DNS traffic started to recover to closer to previous levels. In this post, we analyze the events of January 19 and 20, and what they meant for TikTok-related DNS traffic, but also other competitors (including their growth outside the US).</p><p>For context, we wrote an <a href="https://blog.cloudflare.com/tiktok-ban-traffic-decline-alternatives-rednote/"><u>initial blog</u></a> post about the TikTok ban on Sunday, January 19, 2025. The ban was part of the "<a href="https://www.congress.gov/118/plaws/publ50/PLAW-118publ50.pdf"><u>Protecting Americans from Foreign Adversary Controlled Applications Act</u></a>," proposed in Congress, which ordered ByteDance to divest due to alleged security concerns. The bill was signed into law by Congress and President Biden in April 2024, and was upheld by the Supreme Court on January 17, 2025.</p><p>Aggregated data from our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> shows — as we’ve posted <a href="https://x.com/CloudflareRadar/status/1880890502364672216"><u>on social media</u></a> — that the TikTok shutdown in the US began to impact DNS traffic to TikTok-related domains on January 19, just after 03:30 UTC (22:30 ET on January 18). This includes DNS traffic not only for TikTok, but also for other ByteDance-owned platforms, such as the CapCut video editor. Here’s the timeline focused on DNS traffic for TikTok related domains (with the respective line chart), as we’ve observed it:</p><ul><li><p><b>January 19, just after 03:30 UTC (22:30 ET on January 18):</b> DNS traffic to TikTok-related domains dropped by as much as 85% compared to the previous week, and showed signs of further decline in the following hours.</p></li><li><p><b>January 19, 17:30 UTC (12:30 ET):</b> After a 14-hour shutdown, TikTok announced it was starting service restoration following assurances from Donald Trump. DNS traffic began to recover slightly after 18:00 UTC but stayed near "shutdown" levels for several hours. Traffic from AS396986 (ByteDance) showed a similar trend.</p></li><li><p><b>January 20, 06:00 UTC (01:00 ET):</b> A short-lived spike in DNS traffic for TikTok-related domains occurred, with traffic still 25% below the previous week.</p></li><li><p><b>January 20, 14:00–15:00 UTC (09:00–10:00 ET):</b> DNS traffic picked up, moving from 27% to 18% below pre-shutdown levels.</p></li><li><p><b>January 20, 17:00 UTC (12:00 ET):</b> During Donald Trump’s inauguration ceremony, DNS traffic increased to 12% below pre-shutdown levels, with a trend of continued growth, reaching 10% below previous levels at 18:00 UTC (13:00 ET).</p></li><li><p><b>January 21, 05:00 UTC (00:00 ET):</b> DNS traffic was 7% below pre-shutdown levels.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5P0HXhOaJtBClOnZyAifNx/d66b69eb511bf0670d9136a0da4f74cc/image6.png" />
          </figure><p>On January 19, around 17:30 UTC (12:30 ET), TikTok released a <a href="https://x.com/TikTokPolicy/status/1881030712188346459"><u>statement</u></a>: “In agreement with our service providers, TikTok is in the process of restoring service. We thank President Trump for providing the necessary clarity and assurance to our service providers that they will face no penalties.” A message indicating the TikTok ban was over appeared for US users (image on the left). However, a few hours later, some users reported difficulties accessing the app (image on the right).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nI5tzedgXiQOpj9UJYAN5/5a2e1b0ad470807dc475f8f23e65744a/Screenshot_2025-01-21_at_13.49.55.png" />
          </figure><p>Analyzing data from <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a>-level data, traffic from TikTok owner ByteDance’s network (AS396986) in the US to Cloudflare experienced a sharp decline, dropping by as much as 95% after 03:30 UTC on January 19 (22:30 ET on January 18).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fgbhrtt4ROVLvshup0lG2/f27c0cd29e6320deac0c7dcfac5877b8/image4.png" />
          </figure><p>Our data shows that traffic within ByteDance’s network (AS396986) never fully recovered, remaining around 80% below pre-shutdown levels. This suggests that ByteDance may have used other solutions after the shutdown.</p>
    <div>
      <h2>Alternatives like RedNote (Xiaohongshu) </h2>
      <a href="#alternatives-like-rednote-xiaohongshu">
        
      </a>
    </div>
    <p>As mentioned <a href="https://blog.cloudflare.com/tiktok-ban-traffic-decline-alternatives-rednote/"><u>previously</u></a>, DNS traffic in the US for TikTok alternatives, driven by <a href="https://en.wikipedia.org/wiki/Xiaohongshu"><u>RedNote</u></a> (Xiaohongshu or Little Red Book), has been steadily increasing since January 13. It surged on January 19 by up to 74% around 04:00 UTC (23:00 ET on January 18) compared to the previous week, with lower growth seen later that day in the US (around 52% at 17:00 UTC (12:00 ET)). Traffic subsequently declined, and was only 17% higher than the previous week after TikTok announced it was beginning to restore its services in the US around 22:00 UTC (17:00 ET), and it lost even more growth momentum after that.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nXqvN8EE0kvvnO2h1t5c6/c1394571b7ac3f833d48ecc25b0ec7b8/image2.png" />
          </figure><p>Daily DNS traffic in the US for TikTok alternatives has been rising since January 13, reaching 116% higher than the previous week on January 15. On Sunday, January 19, the day of the TikTok ban, it peaked with a 291% increase compared to the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OxdAjwocA13LmKIWcZME6/6acd7370c818dd6fa133015998fdd03d/image12.png" />
          </figure>
    <div>
      <h2>RedNote impacting other countries</h2>
      <a href="#rednote-impacting-other-countries">
        
      </a>
    </div>
    <p>DNS traffic for TikTok alternatives, driven by RedNote, has also been increasing in other countries, with a noticeable rise in daily DNS traffic to these platforms. Below is the breakdown of the most impacted countries, with a few updates from our most recent <a href="https://blog.cloudflare.com/tiktok-ban-traffic-decline-alternatives-rednote/#rednote-impacting-other-countries"><u>blog post</u></a>. We highlight the peak day of DNS traffic and the percentage growth compared to the previous week.</p><ul><li><p>Mexico (+1200% on January 19)</p></li><li><p>Brazil (+185% on January 20)</p></li><li><p>France (+165% on January 19)</p></li><li><p>Germany (+142% on January 19)</p></li><li><p>Canada (+119% on January 19)</p></li><li><p>Spain (+106% on January 19)</p></li><li><p>Portugal (+97% on January 19)</p></li><li><p>The UK (+86% on January 19)</p></li><li><p>Australia (+19% on January 15)</p></li><li><p>Japan (+18% on January 18)</p></li></ul><p>(Note: In many cases, DNS traffic had been growing for more than a week, so countries with recent growth may show higher percentages.)</p><p>Those trends are consistent with apps like RedNote rising on top of the Android and iOS App Stores, according to <a href="http://data.ai"><u>Data.ai</u></a>.</p><p>The rapid increases in DNS traffic can be clearly seen in the graphs below:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/619Z2yoZlVuATOgN3DHBXX/6d3266656dfcea4cce601a2a4b6306bb/image10.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71fJCQSX0K7aG072m6muva/3c96f32a6be1595cbeb9d03249baac86/image11.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RBoRKMmKva2E1pHEeQytf/6e98cd7586370e34af8b73814a2718e4/image8.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4aFxiYyzMD8w1JugtBLVvx/e824cb4c4f2d4beb8fcdcfe01ed3393a/image7.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/28NKyTWZ1L0YWObIBlfiSv/f0d2e14ec39a90e20751f58ef4b953b9/image13.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7u3ekAZgdlOMkmyvpAvxZx/6c5b8fdb1fe590cc67498cf41d7907fb/image5.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vFqDPx17F2LjgUDA922px/dabce8ce69fae17779241aa69b47db4c/image1.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4BalkDrhzcYMfgikD3qNSB/6afae6e46ffc3feff41fbb129c4b5408/image15.png" />
          </figure><p>If you’re interested in more trends and insights about the Internet, check out <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[TikTok]]></category>
            <guid isPermaLink="false">17jSeXT3kNCEM1V3rVeCL3</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[TikTok ban takes hold: data reveals sharp traffic decline and rapid shift to alternatives]]></title>
            <link>https://blog.cloudflare.com/tiktok-ban-traffic-decline-alternatives-rednote/</link>
            <pubDate>Sun, 19 Jan 2025 16:19:26 GMT</pubDate>
            <description><![CDATA[ On January 19, 2025, ByteDance shut down access to TikTok and other owned/operated apps for US users, causing an 85% traffic plunge and a rapid shift to alternatives like RedNote. ]]></description>
            <content:encoded><![CDATA[ <p>The United States ban on TikTok went into effect on January 19, 2025, and our data showed a clear impact starting after 03:30 UTC (10:30 PM ET on January 18, 2025). The ban was part of the "<a href="https://www.congress.gov/118/plaws/publ50/PLAW-118publ50.pdf"><u>Protecting Americans from Foreign Adversary Controlled Applications Act</u></a>," proposed in Congress, which ordered ByteDance to divest due to alleged security concerns. The bill was signed into law by Congress and President Biden in April 2024, and was upheld by the Supreme Court.</p><p>Aggregated data from our <a href="https://1.1.1.1/dns"><u>1.1.1.1 DNS resolver</u></a> shows — as we’ve posted <a href="https://x.com/CloudflareRadar/status/1880890502364672216"><u>on X</u></a> — that the TikTok shutdown in the US began to impact DNS traffic to TikTok-related domains on January 19, just after 03:30 UTC (22:30 ET on January 18). This includes DNS traffic not only for TikTok, but also for other ByteDance-owned platforms, such as the CapCut video editor. Traffic dropped by as much as 85% compared to the previous week and showed signs of further decline in the following hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4y2Pqb3NMy3PtkKR9njnZk/eadf128533b1979efff2c4a4bebd63aa/Screenshot_2025-01-19_at_14.00.11.png" />
          </figure><p>Around that time, a message indicating the TikTok ban began appearing for US users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Y49JNNy1mrt02mC8GZ7CH/039f7c1e6c11a33b5edc6f967d805771/GhoGzFfWsAApInt.png" />
          </figure><p>Analyzing data from <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous systems or networks</u></a>, traffic from TikTok owner ByteDance’s network (AS396986) in the US to Cloudflare experienced a sharp decline, dropping by as much as 95% after 03:30 UTC (22:30 ET).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20dtSdJ9V7F25P4mFM8IC7/578f56a58edbefd73f35cd61187ddceb/Screenshot_2025-01-19_at_10.10.14.png" />
          </figure>
    <div>
      <h2>Alternatives like RedNote (Xiaohongshu) surge in the US</h2>
      <a href="#alternatives-like-rednote-xiaohongshu-surge-in-the-us">
        
      </a>
    </div>
    <p>DNS traffic in the US for TikTok alternatives, driven by <a href="https://en.wikipedia.org/wiki/Xiaohongshu"><u>RedNote</u></a> (Xiaohongshu or Little Red Book), has been steadily growing since January 13. It surged on January 19 by as much as 74% around 04:00 UTC (23:00 ET on January 18) compared to the previous week, with growth being less intensive during nighttime in the US (around 22%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BFopXEWaqXVYhZhlg06dv/a66426a2d7fb91be0012a1118e322a41/Screenshot_2025-01-19_at_14.12.04.png" />
          </figure><p>Daily DNS traffic in the US for TikTok alternatives has increased since January 13, reaching as much as 116% growth on January 15. Sunday, January 19, is on track to surpass that growth.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nhJxzFWyqzXd1rAVagznf/3e1ac444ed40ce85b0e84946f3dc7c06/Screenshot_2025-01-19_at_14.17.45.png" />
          </figure>
    <div>
      <h2>RedNote impacting other countries</h2>
      <a href="#rednote-impacting-other-countries">
        
      </a>
    </div>
    <p>DNS traffic for TikTok alternatives, driven by RedNote, has been growing in the last few days, and not only in the US. </p><p>The other countries where we observed a clear increase in daily DNS traffic to TikTok alternatives were Mexico (a 500% increase on January 18), Canada (68% on January 18), the UK (53% on January 18), Germany (110% on January 18), and France (75% on January 18). These increases are shown in the graphs below:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/nZTi56Jb50MNTHrc7EuId/9ecd46b673cb8f578b13b214627e9bdb/Screenshot_2025-01-19_at_14.24.01.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LeAwtSaNvpqtmy1y2myZ0/a8d613889f8d5ff21b5ad8f85abde89e/Screenshot_2025-01-19_at_14.25.16.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hJI9YsojdQJykKQBszA4A/927d1cdcf4558128a284e6237632d37d/Screenshot_2025-01-19_at_14.24.42.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uTV1uX8aDGP2gdDxyjhx5/3e13693564c41a100338716c6dc466f1/Screenshot_2025-01-19_at_14.24.20.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DkqD8rlSxzTFPjwAGBdx9/39df5d9f89515cf65eca94faf631217d/Screenshot_2025-01-19_at_15.53.38.png" />
          </figure><p>Those trends are consistent with apps like RedNote rising on top of the Android and iOS App Stores, according to <a href="http://data.ai"><u>Data.ai</u></a>.</p><p>President-elect Donald Trump <a href="https://www.nbcnews.com/politics/donald-trump/trump-likely-give-tiktok-90-day-extension-avoid-ban-rcna188258"><u>indicated</u></a> on January 18 that he plans to grant TikTok a 90-day extension following his inauguration on Monday, January 20, 2025.</p><p>We will continue monitoring the TikTok ban and share updates through a new blog post or on <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p><p>——
<a href="https://x.com/CloudflareRadar/status/1881389924735398382"><u><b>UPDATE</b></u></a><u><b>, January 20, 2025, 17:00 UTC:</b></u></p><p>On Sunday, January 19, 2025, around 17:30 UTC (12:30 ET), after 14 hours of the shutdown, TikTok announced it was beginning service restoration following assurances from Donald Trump. DNS traffic began to recover slightly after 18:00 but remained near "shutdown" levels for several hours, with traffic from AS396986 (ByteDance) showing a similar trend.</p><p>As of Monday, January 20, 2025, TikTok-related domains in the U.S. remain below pre-shutdown levels. Despite some fluctuations overnight, DNS traffic to those domains has been recovering and at 17:00 UTC (11:00 AM ET) is already only 14% lower than the same time last week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6JJnmu9FCbN2bRLHbLpISb/cb96d309cb1a9f0538f779fa187aad66/Screenshot_2025-01-20_at_17.09.36.png" />
          </figure><p>
</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[TikTok]]></category>
            <guid isPermaLink="false">2SBjZFXkq8YOFgTPaQMyPI</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[When the world logs off: Christmas, New Year’s, and the Internet’s holiday rhythm]]></title>
            <link>https://blog.cloudflare.com/when-the-world-logs-off-christmas-new-years-and-the-internets-holiday-rhythm/</link>
            <pubDate>Tue, 24 Dec 2024 10:00:00 GMT</pubDate>
            <description><![CDATA[ From Christmas Eve dinners in Europe to New Year’s Eve countdowns in Asia, Cloudflare data reveals how global festivities have typically shaped Internet usage and cultural rhythms ]]></description>
            <content:encoded><![CDATA[ <p>As January approaches and the year comes to a close, distinct changes in global Internet usage emerge. Year-end traditions — ranging from Christmas feasts to New Year’s Eve (NYE) countdowns — shape online behavior across continents and cultures. Looking back at Christmas and NYE 2023 offers insights into how these trends may repeat this year, and by January 2025, we’ll be able to directly compare patterns. Examining data from 50 countries and regions reveals how people celebrated in 2023-2024, providing a timely reminder of typical holiday trends.</p><p>With Cloudflare’s global reach, we observe planet-wide and local Internet habits during the holiday season. In the past, unintended trends during Christmas and New Year’s Eve have surfaced through our <a href="https://radar.cloudflare.com/outage-center"><u>Outage Center</u></a>, which uses automatic traffic anomaly alerts to detect Internet outages or unusual patterns. In the 2023 <a href="https://radar.cloudflare.com/outage-center?dateStart=2023-12-21&amp;dateEnd=2024-01-02"><u>overview below</u></a>, traffic dropped enough on those days to trigger dozens of anomaly alerts (orange and pink bubbles):</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pPt1Ccp2AVqdhCqhOsEEk/424f5cddd931ae86a5a2e21dbabb2eda/image6.png" />
          </figure><p>While Christmas dominates in many regions, other cultural and religious holidays — like Hanukkah or regional festivities — shape online rhythms in places where Western traditions are less central.</p><p>In countries and regions where Christmas is deeply rooted, Internet traffic slows during Christmas Eve dinners, midnight masses, morning gift exchanges, and Christmas Day lunches.</p><p>This blog post focuses exclusively on non-bot-related Internet traffic requests, filtering out automated activity to provide a clearer view of genuine human behavior during the holiday season. Before going into location-specific perspectives, here’s a global hourly view of Internet traffic during Christmas and New Year’s Eve 2023 from <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=US&amp;timeCompare=1&amp;dt=2023-12-18_2024-01-02"><u>Cloudflare Radar Data Explorer</u></a>, highlighting notable drops (in UTC, so it captures impacts across more days due to time zones spanning over 23 hours, from New Zealand to Hawaii in the US):</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K08u0Q3BgqtwNAQEZCinh/d1eead7068ce053173fa2aca9fb031c9/image5.png" />
          </figure>
    <div>
      <h2>Global Christmas and New Year’s Eve daily trends</h2>
      <a href="#global-christmas-and-new-years-eve-daily-trends">
        
      </a>
    </div>
    <p>Let’s start with a ranking of countries and regions and their top low-traffic holiday dates, showing each day’s percentage drop. Many locations like the US see clear dips on December 24 and 25 as people celebrate Christmas Eve and Christmas Day offline, and some show smaller declines (compared to Christmas) around December 31 as the New Year approaches. Still, the exact order and magnitude differ, reflecting cultural nuances — some nations experience greater drops on Christmas Eve, others on Christmas Day, and others signal unique patterns tied to New Year’s Eve or January 1 celebrations.</p><p>In the next table, locations are listed first (in the left column) by those with the lowest traffic on December 24 (and the highest percentage of traffic drop), followed by December 25, and finally December 31 (in the right column).</p><p><b>Top days with the lowest Internet traffic in December 2023 - January 2024</b></p><p>(with respective percentage drops, if any, from the previous week)</p><table><tr><td><p><b>Denmark</b></p><p>#1 December 24 (-35%)</p><p>#2 December 25 (-11%)</p><p>#3 December 31</p></td><td><p><b>South Africa</b></p><p>#1 December 25 (-27%)</p><p>#2 December 24 (-15%)</p><p>#3 December 31 (-5%)</p></td></tr><tr><td><p><b>Norway</b></p><p>#1 December 24 (-32%)</p><p>#2 December 25 (-12%)</p><p>#3 December 31</p></td><td><p><b>United Kingdom</b></p><p>#1 December 25 (-26%)</p><p>#2 December 24 (-19%)</p><p>#3 December 31</p></td></tr><tr><td><p><b>Portugal</b></p><p>#1 December 24 (-32%)</p><p>#2 December 25 (-24%)</p><p>#3 December 31</p></td><td><p><b>Italy</b></p><p>#1 December 25 (-25%)</p><p>#2 December 24 (-25%)</p><p>#3 December 31</p></td></tr><tr><td><p><b>Poland</b></p><p>#1 December 24 (-31%)</p><p>#2 December 25 (-21%)</p><p>#3 December 31</p></td><td><p><b>Australia</b></p><p>#1 December 25 (-25%)</p><p>#2 December 24 (-15%)</p><p>#3 December 31 (-1%)</p></td></tr><tr><td><p><b>Spain</b></p><p>#1 December 24 (-28%)</p><p>#2 December 25 (-25%)</p><p>#3 December 31</p></td><td><p><b>Ireland</b></p><p>#1 December 25 (-24%)</p><p>#2 December 24 (-22%)</p><p>#3 December 23</p></td></tr><tr><td><p><b>Sweden</b></p><p>#1 December 24 (-26%)</p><p>#2 December 25 (-6%)</p><p>#3 December 31</p></td><td><p><b>New Zealand</b></p><p>#1 December 25 (-22%)</p><p>#2 December 24 (-8%)</p><p>#3 December 31 (-4%)</p></td></tr><tr><td><p><b>Chile</b></p><p>#1 December 24 (-23%)</p><p>#2 December 25 (-24%)</p><p>#3 December 31 (-3%)</p></td><td><p><b>Canada</b></p><p>#1 December 25 (-19%)</p><p>#2 December 24 (-15%)</p><p>#3 December 31</p></td></tr><tr><td><p><b>Finland</b></p><p>#1 December 24 (-23%)</p><p>#2 December 25 (-16%)</p><p>#3 December 31</p></td><td><p><b>Nigeria</b></p><p>#1 December 25 (-18%)</p><p>#2 December 24 (-19%)</p><p>#3 January 1</p></td></tr><tr><td><p><b>France</b></p><p>#1 December 24 (-22%)</p><p>#2 December 25 (-19%)</p><p>#3 December 23</p></td><td><p><b>Philippines</b></p><p>#1 December 25 (-16%)</p><p>#2 December 24 (-7%)</p><p>#3 December 31</p></td></tr><tr><td><p><b>Germany</b></p><p>#1 December 24 (-21%)</p><p>#2 December 25 (-9%)</p><p>#3 December 31</p></td><td><p><b>Hong Kong</b></p><p>#1 December 25 (-9%)</p><p>#2 December 24 (-6%)</p><p>#3 December 23</p></td></tr><tr><td><p><b>Mexico</b></p><p>#1 December 24 (-21%)</p><p>#2 December 25 (-19%)</p><p>#3 December 31</p></td><td><p><b>Belgium</b></p><p>#1 December 31 (-1%)</p><p>#2 December 24 (-20%)</p><p>#3 December 25 (-17%)</p></td></tr><tr><td><p><b>Romania</b></p><p>#1 December 24 (-20%)</p><p>#2 December 25 (-14%)</p><p>#3 December 31 (-3%)</p></td><td><p><b>Indonesia</b></p><p>#1 December 31 (-1%)</p><p>#2 December 25 (-7%)</p><p>#3 December 24</p></td></tr><tr><td><p><b>United States</b></p><p>#1 December 24 (-16%)</p><p>#2 December 25 (-21%)</p><p>#3 December 31</p></td><td><p><b>Netherlands</b></p><p>#1 December 31 (-10%)</p><p>#2 December 24 (-10%)</p><p>#3 December 25 (-20%)</p></td></tr><tr><td><p><b>Brazil</b></p><p>#1 December 24 (-14%)</p><p>#2 December 25 (-26%)</p><p>#3 December 31</p></td><td><p><b>Ukraine</b></p><p>#1 December 31 (-10%)</p><p>#2 December 24 (-5%)</p><p>#3 December 30</p></td></tr><tr><td><p><b>Colombia</b></p><p>#1 December 24 (-14%)</p><p>#2 December 25 (-26%)</p><p>#3 December 31 (-4%)</p></td><td><p><b>Thailand</b></p><p>#1 December 31 (-6%)</p><p>#2 January 1 (-2%)</p><p>#3 December 25 (-2%) </p></td></tr></table><p>The data shows that in many European countries — such as Denmark, Norway, the United Kingdom, Portugal, Italy, Poland, Spain, Ireland, Sweden, Finland, France, Germany, Belgium, the Netherlands, and Romania — Christmas Eve (December24) and Christmas Day (December25) consistently register the biggest drops in Internet traffic. These dips suggest that in much of Europe, Christmas traditions take people firmly offline, whether it’s for family gatherings, festive meals, or religious observances. Outside Europe, similar patterns appear in predominantly Christian-influenced regions, including Australia, New Zealand, Canada, the United States, and several Latin American countries (like Brazil, Chile, and Colombia), confirming that the holiday’s cultural importance is mirrored in their online habits.</p><p>In contrast, locations less influenced by Western Christmas traditions, such as those in Asia, show subtler or different patterns. For example, Hong Kong and the Philippines do show declines in traffic, reflecting a hybrid of local and global influences, while places like Thailand and Indonesia present smaller dips on Christmas compared to other days or emphasize different holidays altogether. These variations highlight that while Christmas exerts a strong pull offline in many parts of the world, its impact on Internet usage is shaped by local cultural contexts.</p><p>As an example, here’s the US perspective from <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;loc=US&amp;timeCompare=1&amp;dt=2023-12-18_2024-01-02"><u>Cloudflare Radar Data Explorer</u></a>, where the drop in traffic during Christmas and New Year 2023 is evident:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Z2ODYM1L5vlBdZHhEdq4W/84b2144c586b01db3e3e99bb3bd05bc6/image3.png" />
          </figure>
    <div>
      <h2>Where Christmas isn’t central</h2>
      <a href="#where-christmas-isnt-central">
        
      </a>
    </div>
    <p>Not every country’s December revolves around Christmas. In Israel, for example, Hanukkah’s timing changes year to year, influencing when people log off. In 2023, Hanukkah started on December 7, leading to an 8% traffic drop that day and 7% on the following days through December 10. Interestingly, in some years like 2024, Hanukkah begins closer to December 25, potentially overlapping with Western Christmas.</p><p><b>Countries where Christmas didn’t have a clear impact</b></p><table><tr><td><p><b>Turkey</b></p><p>#1 December 31 (-18%)</p><p>#2 December 29</p><p>#3 December 30</p></td><td><p><b>Israel</b></p><p>#1 December 29</p><p>#2 January 5</p><p>#3 December 30</p></td></tr><tr><td><p><b>Japan</b></p><p>#1 December 31 (-8%)</p><p>#2 January 1</p><p>#3 December 30 — December 24 with -3%</p></td><td><p><b>Vietnam</b></p><p>#1 January 1 (-7%)</p><p>#2 December 31 (-3%)</p><p>#3 January 2</p></td></tr><tr><td><p><b>Russia</b></p><p>#1 December31 (-23%)</p><p>#2 January 1 (-15%)</p><p>#3 December 30</p></td><td><p><b>Singapore</b></p><p>#1 December 16</p><p>#2 December 17</p><p>#3 December 18</p></td></tr><tr><td><p><b>India</b></p><p>#1 December 17</p><p>#2 December 16</p><p>#3 December 24</p></td><td><p><b>Bangladesh</b></p><p>#1 December 15</p><p>#2 December 16</p><p>#3 December 18</p></td></tr><tr><td><p><b>Saudi Arabia</b></p><p>#1 January 5</p><p>#2 January 6</p><p>#3 January 8</p></td><td><p><b>China</b></p><p>#1 December 19</p><p>#2 December 15</p><p>#3 December 18</p></td></tr></table><p>Now, let’s focus on a more granular perspective of these trends, showing the impact of Christmas dinners and lunches, and also New Year’s Eve drops in traffic.</p><p><i>Note: Unless otherwise noted, all times used in this blog post are local ones; in countries with several timezones, we’re using the timezone where more people live (for the US, Eastern time is used).</i></p>
    <div>
      <h2>A more granular perspective of Christmas: offline feasts and morning quiet</h2>
      <a href="#a-more-granular-perspective-of-christmas-offline-feasts-and-morning-quiet">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AnOIfryr3c8zSAc23SRKD/f3ee2dd0ed6f8d4f54a951663e2916e7/image4.png" />
          </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>In Europe, Christmas traditions dominate, leading to the most significant Internet traffic drops. Christmas Eve dinner is a near-universal offline moment, with countries like Spain (-70% at 21:45), Portugal (-70% at 20:30), and Denmark (-68% at 19:45) experiencing the steepest declines. On Christmas Day, mornings are quieter as people relax or attend religious services, while festive lunches drive further drops, with traffic down 43% at 13:45 in Portugal and 44% at 07:15 in France.</p>
    <div>
      <h3>Americas</h3>
      <a href="#americas">
        
      </a>
    </div>
    <p>In the Americas, holiday patterns reflect a mix of cultural traditions. In the United States, Christmas Eve traffic drops by 29% at 20:15, aligning with evening family gatherings, and Christmas Day sees a 32% decline at 09:15, reflecting quieter mornings.</p><p>In Latin America, Christmas Eve (Nochebuena) takes center stage, with significant traffic declines aligning with late-night traditions like the Midnight Toast (in <a href="https://christmasenthusiasts.co.uk/classic-traditions/how-do-people-celebrate-christmas-in-the-southern-hemisphere-where-its-summer"><u>Argentina</u></a>, the late-night feast is quite popular) and Misa de Gallo (Midnight Mass). For example:</p><ul><li><p>Colombia: -48% at 21:45</p></li><li><p>Argentina: -58% at 22:00; -67% at midnight</p></li><li><p>Chile: -64% at 22:45</p></li><li><p>Mexico: -50% at 21:45</p></li><li><p>Brazil: -22% at 21:45</p></li></ul><p>These late-night traffic dips highlight the region’s emphasis on midnight celebrations, family feasts, and religious observances.</p>
    <div>
      <h3>Asia Pacific</h3>
      <a href="#asia-pacific">
        
      </a>
    </div>
    <p>Asian locations influenced by Western traditions, such as the Philippines and Hong Kong, experience moderate Christmas dips but shift focus to New Year’s celebrations — more on NYE below.</p><p>In the Southern Hemisphere, Australia and New Zealand experience their steepest traffic drops during Christmas lunch, with Australia seeing a 43% decrease at 13:45 and New Zealand recording a 42% decline.</p>
    <div>
      <h3>Middle East and Africa</h3>
      <a href="#middle-east-and-africa">
        
      </a>
    </div>
    <p>In regions less influenced by Christmas, holiday traffic patterns vary significantly. For example, Nigeria sees a 26% drop at lunchtime on Christmas Day, while South Africa records a 37% decline at 14:15, reflecting offline family gatherings.</p><p>In predominantly non-Christian countries like Egypt and Saudi Arabia, December 24-25 does not show significant dips; instead, other cultural holidays drive offline moments. For example, as we’ve noted, Israel experienced up to an 8% drop in 2023 during Hanukkah, particularly in the first four days after December 7. In <a href="https://blog.cloudflare.com/easter-passover-ramadan-internet-trends-2023/"><u>previous blog posts</u></a>, we have shown how events like <a href="https://blog.cloudflare.com/how-ramadan-shows-up-in-internet-trends/"><u>Ramadan</u></a> clearly impact Internet traffic in countries with large Muslim populations. One example from our <a href="https://radar.cloudflare.com/year-in-review/2024/ae?compareWith=ID&amp;cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A15%2C%22targetId%22%3A%2211B31B8E5374713A1265DF95F60D0530%22%7D#internet-traffic-growth"><u>Year in Review 2024</u></a> highlights Indonesia and the United Arab Emirates, where traffic dropped during Eid al-Fitr, the festival marking the end of Ramadan (April 9-10, 2024).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NCDJ1EQZaBbqAn5KKeN7s/1fe50400f25c144f24292bfbf4fe821e/image2.png" />
          </figure>
    <div>
      <h3>The Boxing Day revival</h3>
      <a href="#the-boxing-day-revival">
        
      </a>
    </div>
    <p>Boxing Day on December 26 marks a significant digital rebound in countries like the UK, Canada, Australia (where there is a higher increase from the previous week, with daily traffic growing 9%), and New Zealand, as people return online after the Christmas break. Traditionally associated with charitable activities, family gatherings, and shopping, the day sees traffic spikes across these regions:</p><table><tr><td><p><b>Location</b></p></td><td><p><b>December 26 increase in daily traffic</b></p></td><td><p><b>Higher traffic increase on December 26</b></p></td></tr><tr><td><p>Australia</p></td><td><p>+9%</p></td><td><p>December 26; 09:30: +20%</p></td></tr><tr><td><p>United Kingdom</p></td><td><p>+2%</p></td><td><p>December 26; 13:00: +16%</p></td></tr><tr><td><p>Canada</p></td><td><p>+1%</p></td><td><p>December 26, 08:15: +19%</p></td></tr></table><p>Here is the list of locations that saw a clear drop in traffic on Christmas Eve or Christmas Day morning or lunch. We selected the time (morning or lunch) with the bigger drop compared to the previous week for further analysis. The list is ordered by the Christmas Eve dinner drop. Countries like Russia (where <a href="https://www.bbc.co.uk/newsround/59905614"><u>Orthodox Christians</u></a> celebrate Christmas later, on January 7), Japan, China, Indonesia, Turkey, Israel, Thailand, Egypt, Singapore, Vietnam, and Bangladesh showed no impact during Christmas Eve dinner or Christmas Day morning or lunch.</p><table><tr><td><p><b>Location</b></p></td><td><p><b>Christmas Eve Dinner Drop</b></p></td><td><p><b>Christmas Day Morning/Lunch Drop</b></p></td></tr><tr><td><p>Spain</p></td><td><p>-70% at 21:45</p></td><td><p>-51% at 08:00 (morning)</p></td></tr><tr><td><p>Portugal</p></td><td><p>-70% at 20:30</p></td><td><p>-43% at 13:45 (lunch)</p></td></tr><tr><td><p>Denmark</p></td><td><p>-68% at 19:45</p></td><td><p>-43% at 06:15 (morning)</p></td></tr><tr><td><p>Chile</p></td><td><p>-64% at 22:45; (-65% at 00:00, December 25)</p></td><td><p>-49% at 09:00 (morning) </p></td></tr><tr><td><p>Norway</p></td><td><p>-63% at 18:45</p></td><td><p>-50% at 06:45 (morning)</p></td></tr><tr><td><p>Czech Republic</p></td><td><p>-60% at 18:15</p></td><td><p>-43% at 06:30 (morning)</p></td></tr><tr><td><p>Poland</p></td><td><p>-59% at 17:15</p></td><td><p>-51% at 07:15 (morning)</p></td></tr><tr><td><p>Argentina</p></td><td><p>-58% at 22:00 (-67% at 00:00, December 25)</p></td><td><p>-52% at 09:00 (morning) </p></td></tr><tr><td><p>Italy</p></td><td><p>-55% at 21:15</p></td><td><p>-44% at 07:00 (morning)</p></td></tr><tr><td><p>France</p></td><td><p>-55% at 20:45</p></td><td><p>-44% at 07:15 (morning)</p></td></tr><tr><td><p>Mexico</p></td><td><p>-50% at 21:45</p></td><td><p>-38% at 08:15 (morning)</p></td></tr><tr><td><p>Belgium</p></td><td><p>-50% at 20:15</p></td><td><p>-46% at 07:15 (morning)</p></td></tr><tr><td><p>Switzerland</p></td><td><p>-50% at 19:45</p></td><td><p>-46% at 06:30 (morning)</p></td></tr><tr><td><p>Austria</p></td><td><p>-50% at 19:15</p></td><td><p>-42% at 06:15 (morning)</p></td></tr><tr><td><p>Nigeria</p></td><td><p>-49% at 18:00</p></td><td><p>-26% at 12:30 (lunch)</p></td></tr><tr><td><p>Colombia</p></td><td><p>-48% at 21:45</p></td><td><p>-49% at 08:00 (morning)</p></td></tr><tr><td><p>Germany</p></td><td><p>-47% at 19:15</p></td><td><p>-36% at 07:15 (morning)</p></td></tr><tr><td><p>Sweden</p></td><td><p>-47% at 16:30</p></td><td><p>-36% at 07:00 (morning)</p></td></tr><tr><td><p>Finland</p></td><td><p>-42% at 17:45</p></td><td><p>-42% at 08:00 (morning)</p></td></tr><tr><td><p>Ireland</p></td><td><p>-40% at 18:15</p></td><td><p>-36% at 15:15 (lunch)</p></td></tr><tr><td><p>South Africa</p></td><td><p>-37% at 19:00</p></td><td><p>-37% at 14:15 (lunch)</p></td></tr><tr><td><p>Romania</p></td><td><p>-34% at 20:45</p></td><td><p>-34% at 06:30 (morning)</p></td></tr><tr><td><p>United Kingdom</p></td><td><p>-34% at 18:00</p></td><td><p>-38% at 14:45 (lunch)</p></td></tr><tr><td><p>Canada</p></td><td><p>-32% at 20:30</p></td><td><p>-31% at 09:30 (morning)</p></td></tr><tr><td><p>Netherlands</p></td><td><p>-30% at 20:45</p></td><td><p>-35% at 06:45 (morning)</p></td></tr><tr><td><p>United States</p></td><td><p>-29% at 20:15</p></td><td><p>-32% at 09:15 (morning)</p></td></tr><tr><td><p>Australia</p></td><td><p>-23% at 20:45</p></td><td><p>-43% at 13:45 (lunch)</p></td></tr><tr><td><p>New Zealand</p></td><td><p>-23% at 18:30</p></td><td><p>-42% at 13:15 (lunch)</p></td></tr><tr><td><p>Brazil</p></td><td><p>-22% at 21:45</p></td><td><p>-42% at 08:00 (morning)</p></td></tr><tr><td><p>Philippines</p></td><td><p>-22% at 21:30</p></td><td><p>-29% at 06:45 (morning)</p></td></tr></table>
    <div>
      <h2>New Year’s Eve: A planetary offline moment</h2>
      <a href="#new-years-eve-a-planetary-offline-moment">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6fK4TEIFANRI6YxNUH6toS/e2ea778748511440f8a4f2103519c651/image1.png" />
          </figure><p>Midnight, December 31 is a shared offline moment worldwide, as people step away from their screens to celebrate. To provide a more accurate assessment of New Year’s Eve’s impact, we compare traffic at 00:00 on January 1 with 00:00 on December 18, avoiding distortions caused by Christmas-related patterns. This approach highlights the distinct drop in Internet activity due to New Year’s celebrations.</p><p>Across Europe, countries like Portugal (-60%) and Romania (-60%) see dramatic traffic drops, reflecting widespread offline gatherings. Spain (-56%) and Germany (-49%) also experience steep declines, emphasizing the importance of this tradition across the region. Even Northern Europe mirrors this trend, with Denmark (-41%), Norway (-39%), and Sweden (-29%) showing significant dips.</p><p>In the Americas, this offline moment is particularly pronounced in Latin America, where family and communal gatherings dominate. Argentina (-66%) and Chile (-74%) lead the region, with Brazil (-46%) and Colombia (-44%) following closely. In North America, the impact is less dramatic due to time zone variations — in this case, with millions of people spread out in distinct time zones. Canada records a 14% drop, and the United States shows a modest 12% decline compared to December 18.</p><p>In Asia and the Pacific, New Year’s Eve celebrations heavily influence Internet trends. Thailand saw a 31% drop, Indonesia 23%, and Japan 16%, also reflecting this region’s focus on communal gatherings and celebrations. Australia (-21%) and New Zealand (-11%), among the first countries to welcome the New Year, also show noticeable declines as midnight festivities take center stage.</p><p>In the Middle East and Africa, Turkey (-23%), South Africa (-32%), and Nigeria (-15%) exhibit significant offline engagement at midnight. Israel records a smaller but notable 6% dip before midnight, reflecting localized variations in celebration styles.</p><p>Of course, this offline intermission doesn’t last long. After a few hours, people return to their devices. France sees a 37% surge at 3:15 on January 1, while Turkey experiences a 36% upswing in the early hours.</p><p>Next, we present the list of locations with clear drops in traffic at midnight on New Year’s Eve, compared to December 18, ordered by percentage of drop. </p><table><tr><td><p><b>Locations</b></p></td><td><p><b>January 1, 00:00 drop compared to December 18</b></p></td><td><p><b>Locations</b></p></td><td><p><b>January 1, 00:00 drop compared to December 18</b></p></td></tr><tr><td><p>Chile</p></td><td><p>-74%</p></td><td><p>Thailand</p></td><td><p>-31%</p></td></tr><tr><td><p>Argentina</p></td><td><p>-66%</p></td><td><p>Italy</p></td><td><p>-30%</p></td></tr><tr><td><p>Romania</p></td><td><p>-60%</p></td><td><p>Sweden</p></td><td><p>-29%</p></td></tr><tr><td><p>Portugal</p></td><td><p>-60%</p></td><td><p>Vietnam</p></td><td><p>-27%</p></td></tr><tr><td><p>Spain</p></td><td><p>-56%</p></td><td><p>United Kingdom</p></td><td><p>-25%</p></td></tr><tr><td><p>Germany</p></td><td><p>-49%</p></td><td><p>Ukraine</p></td><td><p>-25%</p></td></tr><tr><td><p>Brazil</p></td><td><p>-46%</p></td><td><p>Indonesia</p></td><td><p>-23%</p></td></tr><tr><td><p>Mexico</p></td><td><p>-44%</p></td><td><p>Turkey</p></td><td><p>-23%</p></td></tr><tr><td><p>Colombia</p></td><td><p>-44%</p></td><td><p>Australia</p></td><td><p>-21%</p></td></tr><tr><td><p>Philippines</p></td><td><p>-43%</p></td><td><p>Hong Kong</p></td><td><p>-21%</p></td></tr><tr><td><p>Netherlands</p></td><td><p>-42%</p></td><td><p>Ireland</p></td><td><p>-19%</p></td></tr><tr><td><p>Poland</p></td><td><p>-41%</p></td><td><p>France</p></td><td><p>-17%</p></td></tr><tr><td><p>Denmark</p></td><td><p>-41%</p></td><td><p>Japan</p></td><td><p>-16%</p></td></tr><tr><td><p>Austria</p></td><td><p>-40%</p></td><td><p>South Korea</p></td><td><p>-16%</p></td></tr><tr><td><p>Switzerland</p></td><td><p>-39%</p></td><td><p>Nigeria</p></td><td><p>-15%</p></td></tr><tr><td><p>Norway</p></td><td><p>-39%</p></td><td><p>Canada</p></td><td><p>-14%</p></td></tr><tr><td><p>Czech Republic</p></td><td><p>-33%</p></td><td><p>Finland</p></td><td><p>-14%</p></td></tr><tr><td><p>Russia</p></td><td><p>-32%</p></td><td><p>Singapore</p></td><td><p>-13%</p></td></tr><tr><td><p>Belgium</p></td><td><p>-32%</p></td><td><p>United States</p></td><td><p>-12%</p></td></tr><tr><td><p>South Africa</p></td><td><p>-32%</p></td><td><p>China</p></td><td><p>-12%</p></td></tr></table>
    <div>
      <h2>Conclusion: A mosaic of traditions and digital habits</h2>
      <a href="#conclusion-a-mosaic-of-traditions-and-digital-habits">
        
      </a>
    </div>
    <p>What emerges from these patterns is a rich tapestry of cultural habits. While Christmas Eve and Day are central offline moments in Europe and the Americas, other regions mark their quiet days on different dates, shaped by unique holidays and customs. The insights from 50 countries and regions confirm how cultural traditions guide when people step away from screens.</p><p>As the Gregorian calendar year comes to a close, the universal appeal of stepping offline becomes clear. Whether raising glasses at the stroke of midnight, exchanging greetings, or lighting candles for festivals like Hanukkah, these moments remind us that while the Internet connects billions, cultural rhythms still shape our relationship with technology. Whether feasting with loved ones or counting down to a new year, humans everywhere find reasons to unplug — if only for a moment.</p><p>If you’re interested in more trends and insights about the Internet, check out <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>. Follow us on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky), or contact us via email.</p> ]]></content:encoded>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Christmas]]></category>
            <guid isPermaLink="false">5hrEiGd7frxGgAirAdHCM0</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare 2024 Year in Review]]></title>
            <link>https://blog.cloudflare.com/radar-2024-year-in-review/</link>
            <pubDate>Mon, 09 Dec 2024 14:05:00 GMT</pubDate>
            <description><![CDATA[ The 2024 Cloudflare Radar Year in Review is our fifth annual review of Internet trends and patterns at both a global and country/region level. ]]></description>
            <content:encoded><![CDATA[ <p>The <a href="https://radar.cloudflare.com/year-in-review/2024">2024 Cloudflare Radar Year in Review</a> is our fifth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. In this year’s review, we have added several new traffic, adoption, connectivity, and email security metrics, as well as the ability to do year-over-year and geographic comparisons for selected metrics. </p><p>Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.</p>
    <div>
      <h2>Key Findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic</h3>
      <a href="#traffic">
        
      </a>
    </div>
    <ul><li><p>Global Internet traffic grew 17.2% in 2024. <a href="#global-internet-traffic-grew-17-2-in-2024"><u>🔗</u></a></p></li><li><p>Google maintained its position as the most popular Internet service overall. OpenAI remained at the top of the Generative AI category. Binance remained at the top of the Cryptocurrency category. WhatsApp remained the top Messaging platform, and Facebook remained the top Social Media site. <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories"><u>🔗</u></a></p></li><li><p>Global traffic from Starlink grew 3.3x in 2024, in line with last year’s growth rate. After initiating service in Malawi in July 2023, Starlink traffic from that country grew 38x in 2024. As Starlink added new markets, we saw traffic grow rapidly in those locations. <a href="#global-traffic-from-starlink-grew-3-3x-in-2024-in-line-with-last-years-growth-rate-after-initiating-service-in-malawi-in-july-2023-starlink-traffic-from-that-country-grew-38x-in-2024"><u>🔗</u></a></p></li><li><p>Googlebot, Google’s web crawler, was responsible for the highest volume of request traffic to Cloudflare in 2024, as it retrieved content from millions of Cloudflare customer sites for search indexing. <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories"><u>🔗</u></a></p></li><li><p>Traffic from ByteDance’s AI crawler (Bytespider) gradually declined over the course of 2024. Anthropic’s AI crawler (ClaudeBot) first started showing signs of ongoing crawling activity in April, then declined after an initial peak in May &amp; June. <a href="#among-ai-bots-and-crawlers-bytespider-bytedance-traffic-gradually-declined-over-the-course-of-2024-while-claudebot-anthropic-was-more-active-during-the-back-half-of-the-year"><u>🔗</u></a></p></li><li><p>13.0% of TLS 1.3 traffic is using post-quantum encryption. <a href="#13-0-of-tls-1-3-traffic-is-using-post-quantum-encryption"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Adoption &amp; Usage</h3>
      <a href="#adoption-usage">
        
      </a>
    </div>
    <ul><li><p>Globally, nearly one-third of mobile device traffic was from Apple iOS devices. Android had a &gt;90% share of mobile device traffic in 29 countries/regions; peak iOS mobile device traffic share was over 60% in eight countries/regions. <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>🔗</u></a></p></li><li><p>Globally, nearly half of web requests used HTTP/2, with 20.5% using HTTP/3. Usage of both versions was up slightly from 2023. <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3"><u>🔗</u></a></p></li><li><p>React, PHP, and jQuery were among the most popular technologies used to build websites, while HubSpot, Google, and WordPress were among the most popular vendors of supporting services and platforms. <a href="#react-php-and-jquery-were-among-the-most-popular-technologies-used-to-build-websites-while-hubspot-google-and-wordpress-were-among-the-most-popular-vendors-of-supporting-services-and-platforms"><u>🔗</u></a></p></li><li><p>Go surpassed NodeJS as the most popular language used for making automated API requests. <a href="#go-surpassed-nodejs-as-the-most-popular-language-used-for-making-automated-api-requests"><u>🔗</u></a></p></li><li><p>Google is far and away the most popular search engine globally, across all platforms. On mobile devices and operating systems, Baidu is a distant second. Bing is a distant second across desktop and Windows devices, with DuckDuckGo second most popular on macOS. Shares vary by platform and country/region. <a href="#google-is-the-most-popular-search-engine-globally-across-all-platforms-on-mobile-devices-os-baidu-is-a-distant-second-bing-is-a-distant-second-across-desktop-and-windows-devices-with-duckduckgo-second-most-popular-on-macos"><u>🔗</u></a></p></li><li><p>Google Chrome is far and away the most popular browser overall. While this is also true on macOS devices, Safari usage is well ahead of Chrome on iOS devices. On Windows, Edge is the second most popular browser as it comes preinstalled and is the initial default. <a href="#google-chrome-is-the-most-popular-browser-overall-while-also-true-on-macos-devices-safari-usage-is-well-ahead-of-chrome-on-ios-devices-on-windows-edge-is-the-second-most-popular-browser"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Connectivity</h3>
      <a href="#connectivity">
        
      </a>
    </div>
    <ul><li><p>225 major Internet disruptions were observed globally in 2024, with many due to government-directed regional and national shutdowns of Internet connectivity. Cable cuts and power outages were also leading causes. <a href="#225-major-internet-outages-were-observed-around-the-world-in-2024-with-many-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity"><u>🔗</u></a></p></li><li><p>Aggregated across 2024, 28.5% of IPv6-capable requests were made over IPv6. India and Malaysia were the strongest countries, at 68.9% and 59.6% IPv6 adoption respectively. <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3"><u>🔗</u></a></p></li><li><p>The top 10 countries ranked by Internet speed all had average download speeds above 200 Mbps. Spain was consistently among the top locations across the measured Internet quality metrics. <a href="#the-top-10-countries-ranked-by-internet-speed-all-had-average-download-speeds-above-200-mbps-spain-was-consistently-among-the-top-locations-across-measured-internet-quality-metrics"><u>🔗</u></a></p></li><li><p>41.3% of global traffic comes from mobile devices. In nearly 100 countries/regions, the majority of traffic comes from mobile devices. <a href="#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices"><u>🔗</u></a></p></li><li><p>20.7% of TCP connections are unexpectedly terminated before any useful data can be exchanged. <a href="#20-7-of-tcp-connections-are-unexpectedly-terminated-before-any-useful-data-can-be-exchanged"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Security</h3>
      <a href="#security">
        
      </a>
    </div>
    <ul><li><p>6.5% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons. In the United States, the share of mitigated traffic grew to 5.1%, while in South Korea, it dropped slightly to 8.1%. In 44 countries/regions, over 10% of traffic was mitigated. <a href="#6-5-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons"><u>🔗</u></a></p></li><li><p>The United States was responsible for over a third of global bot traffic. Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google. <a href="#the-united-states-was-responsible-for-over-a-third-of-global-bot-traffic-amazon-web-services-was-responsible-for-12-7-of-global-bot-traffic-and-7-8-came-from-google"><u>🔗</u></a></p></li><li><p>Globally, Gambling/Games was the most attacked industry, slightly ahead of 2023’s most targeted industry, Finance. <a href="#globally-gambling-games-was-the-most-attacked-industry-slightly-ahead-of-2023s-most-targeted-industry-finance"><u>🔗</u></a></p></li><li><p>Log4j, a vulnerability discovered in 2021, remains a persistent threat and was actively targeted throughout 2024. <a href="#log4j-remains-a-persistent-threat-and-was-actively-targeted-throughout-2024"><u>🔗</u></a></p></li><li><p>Routing security, measured as the share of RPKI valid routes and the share of covered IP address space, continued to improve globally throughout 2024. We saw a 4.7% increase in RPKI valid IPv4 address space in 2024, and a 6.4% increase in RPKI valid routes in 2024. <a href="#routing-security-measured-as-the-share-of-rpki-valid-routes-and-the-share-of-covered-ip-address-space-continued-to-improve-globally-throughout-2024"><u>🔗</u></a></p></li></ul>
    <div>
      <h3>Email Security</h3>
      <a href="#email-security">
        
      </a>
    </div>
    <ul><li><p>An average of 4.3% of emails were determined to be malicious in 2024, although this figure was likely influenced by spikes observed in March, April, and May. Deceptive links and identity deception were the two most common types of threats found in malicious email messages. <a href="#an-average-of-4-3-of-emails-were-determined-to-be-malicious-in-2024"><u>🔗</u></a></p></li><li><p>Over 99% of the email messages processed by Cloudflare Email Security from the .bar, .rest, and .uno top level domains (TLDs) were found to be either spam or malicious in nature. <a href="#over-99-of-the-email-messages-processed-by-cloudflare-email-security-from-the-bar-rest-and-uno-top-level-domains-tlds-were-found-to-be-either-spam-or-malicious-in-nature"><u>🔗</u></a></p></li></ul>
    <div>
      <h2>Introduction</h2>
      <a href="#introduction">
        
      </a>
    </div>
    <p>Over the last four years (<a href="https://blog.cloudflare.com/cloudflare-radar-2020-year-in-review/"><u>2020</u></a>, <a href="https://blog.cloudflare.com/cloudflare-radar-2021-year-in-review/"><u>2021</u></a>, <a href="https://blog.cloudflare.com/radar-2022-year-in-review/"><u>2022</u></a>, <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023</u></a>), we have aggregated perspectives from <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> into an annual Year In Review, illustrating the Internet’s patterns across multiple areas over the course of that year. The <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review</u></a> microsite continues that tradition, featuring interactive charts, graphs, and maps you can use to explore and compare notable Internet trends observed throughout this past year.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/network"><u>network</u></a> currently spans more than 330 cities in over 120 countries/regions, serving an average of over 63 million HTTP(S) requests per second for millions of Internet properties, in addition to handling over 42 million DNS requests per second on average. The resulting data generated by this usage, combined with data from other complementary Cloudflare tools, enables Radar to provide unique near-real time perspectives on the patterns and trends around security, traffic, performance, and usage that we observe across the Internet. </p><p>The 2024 Year In Review is organized into five sections: <a href="https://radar.cloudflare.com/year-in-review/2024#traffic"><u>Traffic</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#adoption-and-usage"><u>Adoption &amp; Usage</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#connectivity"><u>Connectivity</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024#security"><u>Security</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024#email-security"><u>Email Security</u></a> and covers the period from January 1 to December 1, 2024. We have incorporated several new metrics this year, including AI bot &amp; crawler traffic, search engine and browser market share, connection tampering, and “most dangerous” top level domains (TLDs). To ensure consistency, we have kept underlying methodologies consistent with previous years’ calculations. Trends for 200 countries/regions are available on the microsite; smaller or less populated locations are excluded due to insufficient data. Some metrics are only shown worldwide, and are not displayed if a country/region is selected. </p><p>Below, we provide an overview of the content contained within the major Year In Review sections (Traffic, Adoption &amp; Usage, Connectivity, Security, and Email Security), along with notable observations and key findings. In addition, we have also published a companion blog post that specifically explores trends seen across <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><u>Top Internet Services</u></a>.</p><p>The key findings and associated discussion within this post only provide a high-level perspective on the unique insights that can be found in the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Year in Review microsite</u></a>. Visit the microsite to explore the various datasets and metrics in more detail, including trends seen in your country/region, how these trends have changed as compared to 2023, and how they compare to other countries/regions of interest. Surveying the Internet from this vantage point provides insights that can inform decisions on everything from an organization’s security posture and IT priorities to product development and strategy. </p>
    <div>
      <h2>Traffic trends</h2>
      <a href="#traffic-trends">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XlL4SnJROa2fArrtUheuo/822ede9708eb6e9aeeebce4331d62140/2627_Graph.png" />
          </figure>
    <div>
      <h3>Global Internet traffic grew 17.2% in 2024.</h3>
      <a href="#global-internet-traffic-grew-17-2-in-2024">
        
      </a>
    </div>
    <p>An inflection point for Internet traffic arguably occurred thirty years ago. The World Wide Web went mainstream in 1994, thanks to the late 1993 <a href="https://cybercultural.com/p/1993-mosaic-launches-and-the-web-is-set-free/"><u>release</u></a> of the <a href="https://www.ncsa.illinois.edu/research/project-highlights/ncsa-mosaic/"><u>NCSA Mosaic</u></a> browser for multiple popular operating systems, which included support for embedded images. In turn, “heavier” (in contrast to text-based) Internet content became the norm, and coupled with the growth in consumption through popular online services and the emerging consumer ISP industry, <a href="https://blogs.cisco.com/sp/the-history-and-future-of-internet-traffic"><u>Internet traffic began to rapidly increase</u></a>, and that trend has continued to the present.</p><p>To determine the traffic trends over time for the Year in Review, we use the average daily traffic volume (excluding bot traffic) over the second full calendar week (January 8-15) of 2024 as our baseline. (The second calendar week is used to allow time for people to get back into their “normal” school and work routines after the winter holidays and New Year’s Day. The percent change shown in the traffic trends chart is calculated relative to the baseline value — it does not represent absolute traffic volume for a country/region. The trend line represents a seven-day trailing average, which is used to smooth the sharp changes seen with data at a daily granularity. To compare 2024’s traffic trends with 2023 data and/or other locations, click the “Compare” icon at the upper right of the graph.</p><p>Throughout the first half of 2024, <a href="https://radar.cloudflare.com/year-in-review/2024?#internet-traffic-growth"><u>worldwide Internet traffic growth</u></a> appeared to be fairly limited, within a percent or two on either side of the baseline value through mid-August. However, at that time growth clearly began to accelerate, climbing consistently through the end of November, growing 17.2% for the year. This trend is similar to those also seen in 2023 and 2022, as we discussed in the <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023 Year in Review blog post</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NjOCs902pW74OQ0bx2usy/58896c0bc06b4a9c819736bde28ed3f4/traffic_-_worldwide.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, worldwide</i></sup></p><p>The West African country of <a href="https://radar.cloudflare.com/year-in-review/2024/gn?previousYear=true"><u>Guinea</u></a> experienced the most significant Internet traffic growth seen in 2024, reaching as much as 350% above baseline. Traffic growth didn’t begin in earnest until late February, and reached an initial peak in early April. It remained between 100% and 200% above baseline until September, when it experienced several multi-week periods of growth. While the September-November periods of traffic growth also occurred in 2023, they peaked at under 90% above baseline.</p><p>The impact of significant Internet outages is also clearly visible when looking at data across the year. Two significant Internet outages in <a href="https://radar.cloudflare.com/year-in-review/2024/cu#internet-traffic-growth"><u>Cuba</u></a> are clearly visible as large drops in traffic in October and November. A reported “complete disconnection” of the national electricity system on the island <a href="https://x.com/CloudflareRadar/status/1847325224208891950"><u>occurred on October 18</u></a>, lasting <a href="https://x.com/CloudflareRadar/status/1848680148813406474"><u>just over three days</u></a>. Just a couple of weeks later, on November 6, <a href="https://x.com/CloudflareRadar/status/1854291286322544752"><u>damage from Hurricane Rafael caused widespread power outages in Cuba</u></a>, resulting in another large drop in Internet traffic. Traffic has remained lower as Cuba’s electrical infrastructure <a href="https://x.com/CloudflareRadar/status/1864263679442567604"><u>continues to struggle</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rvK8AFYdcJAgQhJQUTiQw/8c4790fd06af8323636878977a9d712c/traffic_-_Cuba.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Cuba</i></sup></p><p>As we frequently discuss in Cloudflare Radar blog and social media posts, government-directed Internet shutdowns occur all too frequently, and the impact of these actions are also clearly visible when looking at long-term traffic data. In <a href="https://radar.cloudflare.com/year-in-review/2024/bd#internet-traffic-growth"><u>Bangladesh</u></a>, the government ordered the <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#bangladesh"><u>shutdown of mobile Internet connectivity</u></a> on July 18, in response to student protests. Shortly after mobile networks were shut down, fixed broadband networks were taken offline as well, resulting in a near complete loss of Internet traffic from the country. Connectivity gradually returned over the course of several days, between July 23-28.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FvubyG6qMeZ9hv1wgFayl/91d356b23788a8f9cdd970cc7e65f8fc/traffic_-_Bangladesh.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Bangladesh</i></sup></p><p>As we also noted last year, the celebration of major holidays can also have a visible impact on Internet traffic at a country level. For example, in Muslim countries including <a href="https://radar.cloudflare.com/year-in-review/2024/ae?compareWith=ID#internet-traffic-growth"><u>Indonesia and the United Arab Emirates</u></a>, the celebration of Eid al-Fitr, the festival marking the end of the fast of Ramadan, is visible as a noticeable drop in traffic around April 9-10. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aFTFP2banlfW65XkjUIZM/84bfd5db1036da1b4740843575217113/traffic_-_UAE_Indonesia.png" />
          </figure><p><sup><i>Internet traffic trends in 2024, Indonesia and United Arab Emirates</i></sup></p>
    <div>
      <h3>Google maintained its position as the most popular Internet service. OpenAI, Binance, WhatsApp, and Facebook led their respective categories. </h3>
      <a href="#google-maintained-its-position-as-the-most-popular-internet-service-openai-binance-whatsapp-and-facebook-led-their-respective-categories">
        
      </a>
    </div>
    <p>Over the last several years, the Year In Review has ranked the <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>most popular Internet services</u></a>. These rankings cover an “overall” perspective, as well as a dozen more specific categories, based on analysis of anonymized query data of traffic to our <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS resolver</u></a> from millions of users around the world. For the purposes of these rankings, domains that belong to a single Internet service are grouped together.</p><p>Google once again held the top spot overall, supported by its broad portfolio of services, as well as the popularity of the Android mobile operating system (more on that <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions"><u>below</u></a>). Meta properties Facebook, Instagram, and WhatsApp also held spots in the top 10.</p><p><a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> continued to grow in popularity throughout 2024, and in this category, OpenAI again held the top spot, building on the continued success and popularity of ChatGPT. Within Social Media, the top five remained consistent with 2023’s and 2022’s ranking, including Facebook, TikTok, Instagram, X, and Snapchat.</p><p>These categorical rankings, as well as trends seen by specific services, are explored in more detail in a separate blog post, <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><i><u>From ChatGPT to Temu: ranking top Internet services in 2024</u></i></a>.</p>
    <div>
      <h3>Global traffic from Starlink grew 3.3x in 2024, in line with last year’s growth rate. After initiating service in Malawi in July 2023, Starlink traffic from that country grew 38x in 2024.</h3>
      <a href="#global-traffic-from-starlink-grew-3-3x-in-2024-in-line-with-last-years-growth-rate-after-initiating-service-in-malawi-in-july-2023-starlink-traffic-from-that-country-grew-38x-in-2024">
        
      </a>
    </div>
    <p>SpaceX’s Starlink continues to be the leading satellite Internet service provider, bringing connectivity to unserved or underserved areas. In addition to opening up new markets in 2024, Starlink also announced relationships to provide in-flight connectivity to <a href="https://www.cnbc.com/2024/09/17/spacexs-starlink-has-2500-aircraft-under-contract.html"><u>multiple airlines</u></a>, and on <a href="https://x.com/Starlink/status/1790426484022342081"><u>cruise ships</u></a> and <a href="https://x.com/Starlink/status/1857166233969607123"><u>trains</u></a>, as well as enabling subscribers to roam with their subscription using the <a href="https://www.theverge.com/2024/7/11/24196294/starlink-mini-available-us-price-specs"><u>Starlink Mini</u></a>.</p><p>We analyzed aggregate Cloudflare traffic volumes associated with Starlink's primary <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (<a href="https://radar.cloudflare.com/as14593"><u>AS14593</u></a>) to track the growth in usage of the service throughout 2024. Similar to the traffic trends discussed above, the request volume shown on the trend line in the chart represents a seven-day trailing average. Comparisons with 2023 data can be shown by clicking the “Compare” icon at the upper right of the graph. Within comparative views, the lines are scaled to the maximum value shown.</p><p>On a <a href="https://radar.cloudflare.com/year-in-review/2024#starlink-traffic.trends"><u>worldwide</u></a> basis, steady, consistent growth was seen across the year, though it accelerates throughout November. This acceleration may have been driven by traffic associated with customer-specific large software updates. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Dy2qt4O5b3MCswkckhELA/aa29c7235497bed8c985aa9dd9b63477/traffic_-_Starlink_worldwide.png" />
          </figure><p><sup><i>Starlink traffic growth worldwide in 2024</i></sup></p><p>In many locations, there is pent-up demand for “alternative” connectivity providers such as Starlink, and in these countries/regions, we see rapid traffic growth when service becomes available, such as in <a href="https://radar.cloudflare.com/year-in-review/2024/zw#starlink-traffic.trends"><u>Zimbabwe</u></a>. Service availability was <a href="https://x.com/Starlink/status/1832392080481563037"><u>announced on September 7</u></a>, and traffic from the country began to grow rapidly almost immediately thereafter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1aLywcrB5w88flsDyK1R1q/1039d989e19dc566cf5f62e60f3f1886/traffic_-_Starlink_Zimbabwe.png" />
          </figure><p><sup><i>Starlink traffic growth in Zimbabwe in 2024</i></sup></p><p>In new markets, traffic growth continues after that initial increase. For example Starlink service became available in Malawi <a href="https://x.com/Starlink/status/1683897037639790592"><u>in July 2023</u></a>, and throughout 2024, Starlink traffic from the country grew 38x. While <a href="https://radar.cloudflare.com/year-in-review/2024/mw#starlink-traffic.trends"><u>Malawi’s 38x increase</u></a> is impressive, other countries also experienced significant growth. In the Eastern European country of <a href="https://radar.cloudflare.com/year-in-review/2024/ge#starlink-traffic.trends"><u>Georgia</u></a>, <a href="https://x.com/Starlink/status/1719581885200998485"><u>service became available on November 1, 2023</u></a>. After a slow ramp, traffic began to take off growing over 100x through 2024. In <a href="https://radar.cloudflare.com/year-in-review/2024/py#starlink-traffic.trends"><u>Paraguay</u></a>, <a href="https://x.com/Starlink/status/1737914318522581489"><u>service availability was announced on December 21</u></a>, and began to grow at the beginning of January, registering an increase of over 900x across the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6AXOON7CO7XgnWSNnezoiF/bd56192d682c574a2d242845bb0eda16/traffic_-_Starlink_Malawi.png" />
          </figure><p><sup><i>Starlink traffic growth in Malawi in 2024</i></sup></p>
    <div>
      <h3>Googlebot was responsible for the highest volume of request traffic to Cloudflare in 2024 as it retrieved content from millions of Cloudflare customer sites for search indexing. </h3>
      <a href="#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2024-as-it-retrieved-content-from-millions-of-cloudflare-customer-sites-for-search-indexing">
        
      </a>
    </div>
    <p>Cloudflare Radar shows users Internet traffic trends over a selected period of time, but at a country/region or network level. However, <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#googlebot-was-responsible-for-the-highest-volume-of-request-traffic-to-cloudflare-in-2023"><u>as we did in 2023</u></a>, we again wanted to look at the traffic Cloudflare saw over the course of the full year from the entire IPv4 Internet. To do so, we can use <a href="https://en.wikipedia.org/wiki/Hilbert_curve"><u>Hilbert curves</u></a>, which allow us to visualize a sequence of IPv4 addresses in a two-dimensional pattern that keeps nearby IP addresses close to each other, making them <a href="https://xkcd.com/195/"><u>useful</u></a> for surveying the Internet's IPv4 address space.</p><p>Using a Hilbert curve, we can <a href="https://radar.cloudflare.com/year-in-review/2024#ipv4-traffic-distribution"><u>visualize aggregated IPv4 request traffic to Cloudflare</u></a> from January 1 through December 1, 2024. Within the visualization, we aggregate IPv4 addresses at a <a href="https://www.ripe.net/about-us/press-centre/IPv4CIDRChart_2015.pdf"><u>/20</u></a> level, meaning that at the highest zoom level, each square represents traffic from 4,096 IPv4 addresses. This aggregation is done to keep the amount of data used for the visualization manageable. (While we would like to create a similar visualization for IPv6 traffic, the enormity of the full IPv6 address space would make associated traffic very <a href="https://observablehq.com/@vasturiano/hilbert-map-of-ipv6-address-space"><u>hard to see</u></a> in such a visualization, especially as such a small amount has been <a href="https://www.iana.org/numbers/allocations/"><u>allocated for assignment by the Regional Internet Registries</u></a>.)</p><p>Within the visualization, IP addresses are grouped by ownership, and for much of the IP address space shown there, a mouseover at the default zoom level will show the <a href="https://www.nro.net/about/rirs/"><u>Regional Internet Registry (RIR)</u></a> that the address block belongs to. However, there are also a number of blocks that were assigned prior to the existence of the RIR system, and for these, they are labeled with the name of the organization that owns them. Progressive zooming ultimately shows the autonomous system and country/region that the IP address block is associated with, as well as its share of traffic relative to the maximum. (If a country/region is selected, only the IP address blocks associated with that location are visible.) Overall traffic shares are indicated by shading based on a color scale, and although a number of large unshaded blocks are visible, this does not necessarily mean that the associated address space is unused, but rather that it may be used in a way that does not generate traffic to Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6gtrL1H2gUjSKH7AMSabgM/361d38f34860258449a914e26519a4b4/traffic_-_Hilbert_curve.png" />
          </figure><p><sup><i>Hilbert curve showing aggregated 2024 traffic to Cloudflare across the IPv4 Internet</i></sup></p><p>Warmer orange/red shading within the visualization represents areas of higher request volume, and buried within one of those areas is the IP address block that had the maximum request volume to Cloudflare during 2024. As it was in 2023, this address block was <a href="https://radar.cloudflare.com/routing/prefix/66.249.64.0/20"><u>66.249.64.0/20</u></a>, which belongs to Google, and is <a href="https://developers.google.com/static/search/apis/ipranges/googlebot.json"><u>one of several</u></a> used by the <a href="https://developers.google.com/search/docs/crawling-indexing/googlebot"><u>Googlebot</u></a> web crawler to retrieve content for search indexing. This use of that address space is a likely explanation for the high request volume, given the number of web properties on Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/g5rQhT7r4DsgpzYdMT3QT/0d6809d96791ee7165ada170d24156e3/traffic_-_Hilbert_curve_Googlebot.png" />
          </figure><p><sup><i>Zoomed Hilbert curve view showing the IPv4 address block that generated the highest volume of requests</i></sup></p><p>In addition to Google, owners of other prefixes in the top 20 include Alibaba, Microsoft, Amazon, and Apple. To explore the IPv4 Internet in more detail, we encourage you to go to <a href="https://radar.cloudflare.com/year-in-review/2024/#ipv4-traffic-distribution"><u>the Year in Review microsite</u></a> and explore it by dragging and zooming to move around IPv4 address space.</p>
    <div>
      <h3>Among AI bots and crawlers, Bytespider (ByteDance) traffic gradually declined over the course of 2024, while ClaudeBot (Anthropic) was more active during the back half of the year.</h3>
      <a href="#among-ai-bots-and-crawlers-bytespider-bytedance-traffic-gradually-declined-over-the-course-of-2024-while-claudebot-anthropic-was-more-active-during-the-back-half-of-the-year">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">AI bots and crawlers</a> have been in the news throughout 2024 as they voraciously consume content to train ever-evolving models. Controversy has followed them, as not all bots and crawlers respect content owner directives to restrict crawling activity. In July, Cloudflare enabled customers to <a href="https://blog.cloudflare.com/declaring-your-aindependence-block-ai-bots-scrapers-and-crawlers-with-a-single-click/"><u>block these bots and crawlers with a single click</u></a>, and during Birthday Week <a href="https://blog.cloudflare.com/cloudflare-ai-audit-control-ai-content-crawlers/"><u>we introduced AI Audit</u></a> to give website owners even more visibility into and control over how AI platforms access their content. </p><p>Tracking traffic trends for AI bots can help us better understand their activity over time — observing which are the most aggressive and have the highest volume of requests, which perform crawls on a regular basis, etc. The new <a href="https://radar.cloudflare.com/traffic#ai-bot-crawler-traffic"><u>AI bot &amp; crawler traffic graph on Radar’s Traffic page</u></a>, <a href="https://blog.cloudflare.com/bringing-ai-to-cloudflare/#ai-bot-traffic-insights-on-cloudflare-radar"><u>launched in September</u></a>, provides insight into these traffic trends gathered over the selected time period for the top known AI bots. </p><p><a href="https://radar.cloudflare.com/year-in-review/2024#ai-bot-and-crawler-traffic"><u>Looking at traffic trends</u></a> from two of those bots, we can see some interesting patterns. <a href="https://darkvisitors.com/agents/bytespider"><u>Bytespider</u></a> is a crawler operated by ByteDance, the Chinese owner of TikTok, and is reportedly used to download training data for ByteDance’s Large Language Models (LLMs). Bytespider’s crawling activity trended generally downwards over the course of 2024, with end-of-November activity approximately 80-85% lower than that seen at the start of the year. <a href="https://darkvisitors.com/agents/claudebot"><u>ClaudeBot</u></a> is Anthropic’s crawler, which downloads training data for its LLMs that power AI products like Claude. Traffic from ClaudeBot appeared to be mostly non-existent through mid-April, except for some small spikes that possibly represent test runs. Traffic became more consistently non-zero starting in late April, but after an early spike, trailed off through the remainder of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7cm0SG0GC36Z3dFu3A6p3J/10a6e32a469984b2083ee0c2ed743d53/traffic_-_AI_bots_--_NEW.png" />
          </figure><p><sup><i>Traffic trends for AI crawlers Bytespider and ClaudeBot in 2024</i></sup></p><p>Traffic trends for the full list of AI bots &amp; crawlers can be found in the <a href="https://radar.cloudflare.com/explorer?dataSet=ai.bots&amp;dt=2024-01-01_2024-12-31"><u>Cloudflare Radar Data Explorer</u></a>.</p>
    <div>
      <h3>13.0% of TLS 1.3 traffic is using post-quantum encryption.</h3>
      <a href="#13-0-of-tls-1-3-traffic-is-using-post-quantum-encryption">
        
      </a>
    </div>
    <p>The term “<a href="https://en.wikipedia.org/wiki/Post-quantum_cryptography"><u>post-quantum</u></a>” refers to a new set of cryptographic techniques designed to protect data from adversaries that have the ability to capture and store current data for decryption by sufficiently powerful quantum computers in the future. The Cloudflare Research team has been <a href="https://blog.cloudflare.com/sidh-go/"><u>exploring post-quantum cryptography since 2017</u></a>.</p><p>In October 2022, we enabled <a href="https://blog.cloudflare.com/post-quantum-for-all/"><u>post-quantum key agreement</u></a> on our network by default, but use of it requires that browsers and clients support it as well. In 2024, Google's <a href="https://developer.chrome.com/release-notes/124"><u>Chrome 124</u></a> enabled it by default on April 17, and <a href="https://radar.cloudflare.com/year-in-review/2024#post-quantum-encryption"><u>adoption grew rapidly following that release</u></a>, increasing from just over 2% of requests to around 12% within a month, and ended November at 13%. We expect that adoption will continue to grow into and during 2025 due to support in other Chromium-based browsers, growing default support in Mozilla Firefox, and initial testing in Apple Safari.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ipRtCowVftgad37ht9uMF/68958f72a47bbc179959c2d7ac6cdd72/traffic_-_post-quantum_worldwide.png" />
          </figure><p><sup><i>Growth trends in post-quantum encrypted TLS 1.3 traffic during 2024</i></sup></p>
    <div>
      <h2>Adoption &amp; Usage insights</h2>
      <a href="#adoption-usage-insights">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/177RCO2sEvFJJeJeCBzZim/68acfcc309c57ef2027e9291a5f76d2f/2627_Shield.png" />
          </figure>
    <div>
      <h3>Globally, nearly one-third of mobile device traffic was from Apple iOS devices. Android had a &gt;90% share of mobile device traffic in 29 countries/regions; peak iOS mobile device traffic share was over 60% in eight countries/regions.</h3>
      <a href="#globally-nearly-one-third-of-mobile-device-traffic-was-from-apple-ios-devices-android-had-a-90-share-of-mobile-device-traffic-in-29-countries-regions-peak-ios-mobile-device-traffic-share-was-over-60-in-eight-countries-regions">
        
      </a>
    </div>
    <p>The two leading mobile device operating systems globally are <a href="https://en.wikipedia.org/wiki/IOS"><u>Apple’s iOS</u></a> and <a href="https://en.wikipedia.org/wiki/Android_(operating_system)"><u>Google’s Android</u></a>, and by analyzing information in the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>user agent</u></a> reported with each request, we can get insight into the distribution of traffic by client operating system throughout the year. Again, we found that Android is responsible for the majority of mobile device traffic when aggregated globally, due to the wide distribution of price points, form factors, and capabilities.</p><p>Similar to <a href="https://radar.cloudflare.com/year-in-review/2023#ios-vs-android"><u>2023’s findings</u></a>, Android was once again <a href="https://radar.cloudflare.com/year-in-review/2024#ios-vs-android"><u>responsible for just over two-thirds of mobile device traffic</u></a>. Looking at the top countries for Android traffic, we find a greater than 95% share in <a href="https://radar.cloudflare.com/year-in-review/2024/sd#ios-vs-android"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/bd#ios-vs-android"><u>Bangladesh</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/tm#ios-vs-android"><u>Turkmenistan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/mw#ios-vs-android"><u>Malawi</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/pg#ios-vs-android"><u>Papua New Guinea</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/sy#ios-vs-android"><u>Syria</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/ye#ios-vs-android"><u>Yemen</u></a>, up from just two countries in 2023. Similar to last year, we again found that countries/regions with higher levels of Android usage are largely in Africa, Oceania/Asia, and South America, and that many have lower levels of <a href="https://ourworldindata.org/grapher/gross-national-income-per-capita?tab=table"><u>gross national income per capita</u></a>. In these countries/regions, the availability of lower priced “budget” Android devices supports increased adoption.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9bsuRwzYBybYpOiKqwLja/cbdafb60eab1913a91ec916899d1e807/connectivity_-_mobile_desktop.png" />
          </figure><p><sup><i>Global distribution of mobile device traffic by operating system in 2024</i></sup></p><p>In contrast, iOS adoption tops out in the 65% range in <a href="https://radar.cloudflare.com/year-in-review/2024/je#ios-vs-android"><u>Jersey</u></a>, the <a href="https://radar.cloudflare.com/year-in-review/2024/fo#ios-vs-android"><u>Faroe Islands</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/gg#ios-vs-android"><u>Guernsey</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/dk#ios-vs-android"><u>Denmark</u></a>. Adoption rates of 50% or more were seen in a total of 26 countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2024/no#ios-vs-android"><u>Norway</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/se#ios-vs-android"><u>Sweden</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/au#ios-vs-android"><u>Australia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/jp#ios-vs-android"><u>Japan</u></a>, the <a href="https://radar.cloudflare.com/year-in-review/2024/us#ios-vs-android"><u>United States</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/ca#ios-vs-android"><u>Canada</u></a>. These locations likely have a greater ability to afford higher priced devices, owing to their comparatively higher gross national income per capita.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QCfjlx0TgEotwU2wPm0hE/af1359f249aec86894b681249fe7ee70/adoption_-_Android_iOS_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest share of iOS traffic in 2024</i></sup></p>
    <div>
      <h3>Globally, nearly half of web requests used HTTP/2, with 20.5% using HTTP/3.</h3>
      <a href="#globally-nearly-half-of-web-requests-used-http-2-with-20-5-using-http-3">
        
      </a>
    </div>
    <p>HTTP (HyperText Transfer Protocol) is the core protocol that the web relies upon. <a href="https://datatracker.ietf.org/doc/html/rfc1945"><u>HTTP/1.0</u></a> was first standardized in 1996, <a href="https://www.rfc-editor.org/rfc/rfc2616.html"><u>HTTP/1.1</u></a> in 1999, and <a href="https://www.rfc-editor.org/rfc/rfc7540.html"><u>HTTP/2</u></a> in 2015. The most recent version, <a href="https://www.rfc-editor.org/rfc/rfc9114.html"><u>HTTP/3</u></a>, was completed in 2022, and runs on top of a new transport protocol known as <a href="https://blog.cloudflare.com/the-road-to-quic/"><u>QUIC</u></a>. By running on top of QUIC, <a href="https://www.cloudflare.com/learning/performance/what-is-http3/"><u>HTTP/3</u></a> can deliver improved performance by mitigating the effects of packet loss and network changes, as well as establishing connections more quickly. HTTP/3 also provides encryption by default, which mitigates the risk of attacks. </p><p>Current versions of desktop and mobile Google Chrome (and Chromium-based variants), Mozilla Firefox, and Apple Safari <a href="https://caniuse.com/?search=http%2F3"><u>all support HTTP/3 by default</u></a>. Cloudflare makes HTTP/3 <a href="https://developers.cloudflare.com/speed/optimization/protocol/http3/"><u>available for free</u></a> to all of our customers, although not every customer chooses to enable it.</p><p>Analysis of the HTTP version negotiated for each request provides insight into the distribution of traffic by the various versions of the protocol aggregated across the year. (“HTTP/1.x” aggregates requests made over HTTP/1.0 and HTTP/1.1.) At a <a href="https://radar.cloudflare.com/year-in-review/2024#http-versions"><u>global</u></a> level, 20.5% of requests in 2024 were made using HTTP/3. Another 29.9% of requests were made over the older HTTP/1.x versions, while HTTP/2 remained dominant, accounting for the remaining 49.6%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/r7KQkjdsXXEtxHoEkFQbO/efb19d1bbd58bef3d657b96555d70103/adoption_-_HTTP_versions_global.png" />
          </figure><p><sup><i>Global distribution of traffic by HTTP version in 2024</i></sup></p><p>Looking at version distribution geographically, we found eight countries/regions sending more than a third of their requests over HTTP/3, with <a href="https://radar.cloudflare.com/year-in-review/2024/re#http-versions"><u>Reunion</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/lk#http-versions"><u>Sri Lanka</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/mn#http-versions"><u>Mongolia</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/gr#http-versions"><u>Greece</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/mk#http-versions"><u>North Macedonia</u></a> comprising the top five as shown below. Eight other countries/regions, including <a href="https://radar.cloudflare.com/year-in-review/2024/ir#http-versions"><u>Iran</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/ie#http-versions"><u>Ireland</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/hk#http-versions"><u>Hong Kong</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/cn#http-versions"><u>China</u></a>, sent more than half of their requests over HTTP/1.x throughout 2024. More than half of requests were made over HTTP/2 in a total of 147 countries/regions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Zq4mMgbvw6jT6pb6LLdF7/401b98731302233b6f9674e74196e819/adoption_-_HTTP_versions_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of HTTP/3 traffic in 2024</i></sup></p>
    <div>
      <h3>React, PHP, and jQuery were among the most popular technologies used to build websites, while Hubspot, Google, and WordPress were among the most popular vendors of supporting services and platforms.</h3>
      <a href="#react-php-and-jquery-were-among-the-most-popular-technologies-used-to-build-websites-while-hubspot-google-and-wordpress-were-among-the-most-popular-vendors-of-supporting-services-and-platforms">
        
      </a>
    </div>
    <p>Modern websites and applications are extremely complex, built on and integrating on a mix of frameworks, platforms, services, and tools. In order to deliver a seamless user experience, developers must ensure that all of these components happily coexist with each other. Using <a href="https://radar.cloudflare.com/scan"><u>Cloudflare Radar’s URL Scanner</u></a>, we again scanned websites associated with the <a href="https://radar.cloudflare.com/domains"><u>top 5000 domains</u></a> to identify the <a href="https://radar.cloudflare.com/year-in-review/2024#website-technologies"><u>most popular technologies and services</u></a> used across a dozen different categories. </p><p>In looking at core technologies used to build websites, <a href="https://react.dev/"><u>React</u></a> had a commanding lead over <a href="https://vuejs.org/"><u>Vue.js</u></a> and other JavaScript frameworks, <a href="https://www.php.net/"><u>PHP</u></a> was the most popular programming technology, and <a href="https://jquery.com/"><u>jQuery</u></a>’s share was 10x other popular JavaScript libraries.</p><p>Third-party services and platforms are also used by websites and applications to support things like analytics, content management, and marketing automation. Google Analytics remained the most widely used analytics provider, WordPress had a greater than 50% share among content management systems, and for marketing automation providers, category leader HubSpot had nearly twice the usage share of Marketo and MailChimp.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fJS1OpqRlVCsZ9VOXdU89/c01320ff9d20da4ad2471de780a86033/adoption_-_top_website_technologies.png" />
          </figure><p><sup><i>Top website technologies, JavaScript frameworks category in 2024</i></sup></p>
    <div>
      <h3>Go surpassed NodeJS as the most popular language used for making automated API requests.</h3>
      <a href="#go-surpassed-nodejs-as-the-most-popular-language-used-for-making-automated-api-requests">
        
      </a>
    </div>
    <p>Many dynamic websites and applications are built on <a href="https://blog.cloudflare.com/2024-api-security-report/"><u>automated API calls</u></a>, and we can use our unique visibility into Web traffic to identify the top languages these API clients are written in. Applying heuristics to API-related requests determined to not be coming from a person using a browser or native mobile application helps us to identify the language used to build the API client.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#api-client-language-popularity"><u>Our analysis</u></a> found that almost 12% of automated API requests are made by <a href="https://go.dev/"><u>Go</u></a>-based clients, with <a href="https://nodejs.org/en/"><u>NodeJS</u></a>, <a href="https://www.python.org/"><u>Python</u></a>, <a href="https://www.java.com/"><u>Java</u></a>, and <a href="https://dotnet.microsoft.com/"><u>.NET</u></a> holding smaller shares. Compared to <a href="https://radar.cloudflare.com/year-in-review/2023#api-client-language-popularity"><u>2023</u></a>, Go’s share increased by approximately 40%, allowing it to capture the top spot, while NodeJS’s share fell by just over 30%. Python and Java also saw their shares increase, while .NET’s fell.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oq8vCSsDq57HNYCbEV59n/9373b727f7f7da45be317ba34d23dcab/adoption_-_api_client_languages.png" />
          </figure><p><sup><i>Most popular API client languages in 2024</i></sup></p>
    <div>
      <h3>Google is the most popular search engine globally, across all platforms. On mobile devices/OS, Baidu is a distant second. Bing is a distant second across desktop and Windows devices, with DuckDuckGo second most popular on macOS. </h3>
      <a href="#google-is-the-most-popular-search-engine-globally-across-all-platforms-on-mobile-devices-os-baidu-is-a-distant-second-bing-is-a-distant-second-across-desktop-and-windows-devices-with-duckduckgo-second-most-popular-on-macos">
        
      </a>
    </div>
    <p>Protecting and accelerating websites and applications for millions of customers, Cloudflare is in a unique position to measure search engine market share data. Our methodology uses HTTP’s <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer"><u>referer header</u></a> to identify the search engine sending traffic to customer sites and applications. The market share data is presented as an overall aggregate, as well as broken out by device type and operating system. (Device type and operating system data is derived from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> headers accompanying a content request.)</p><p>Aggregated at a <a href="https://radar.cloudflare.com/year-in-review/2024#search-engine-market-share"><u>global</u></a> level, Google referred the most traffic to Cloudflare customers, with a greater than 88% share across 2024. Yandex, Baidu, Bing, and DuckDuckGo round out the top five, all with single digit percentage shares. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bwTSu9NktZ9chotEmTQhs/fd231b3f13fe4709ca7480546276d2e0/adoption_-_search_engine_overall_worldwide.png" />
          </figure><p><sup><i>Overall worldwide search engine market share in 2024</i></sup></p><p>However, when drilling down by location or platform, differences are apparent in the top search engines and their shares. For example, in <a href="https://radar.cloudflare.com/year-in-review/2024/kr#search-engine-market-share"><u>South Korea</u></a>, Google is responsible for only two-thirds of referrals, while local platform <a href="https://www.naver.com/"><u>Naver</u></a> drives 29.2%, with local portal <a href="https://www.daum.net/"><u>Daum</u></a> also in the top five at 1.3%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/rxOIPPwpJSt73X1GXH8t4/5597fd261ec7fda2cf357c70479be13f/adoption_-_search_engine_overall_South_Korea.png" />
          </figure><p><sup><i>Overall search engine market share in South Korea in 2024</i></sup></p><p>Google’s dominance is also blunted a bit on Windows devices, where it drives only 80% of referrals globally. Unsurprisingly, Bing holds the second spot for Windows users, with a 10.4% share. Yandex, Yahoo, and DuckDuckGo round out the top 5, all with shares below 5%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sKOs50fTPbchv55J7gQrM/1ce8b0c1287bbd5b35d9e987e2061207/adoption_-_search_engine_overall_worldwide_Windows.png" />
          </figure><p><sup><i>Overall worldwide search engine market share for Windows devices in 2024</i></sup></p><p>For additional details, including search engines aggregated under “Other”, please refer to the quarterly <a href="https://radar.cloudflare.com/reports/search-engines"><u>Search Engine Referral Reports</u></a> on Cloudflare Radar.</p>
    <div>
      <h3>Google Chrome is the most popular browser overall. While also true on MacOS devices, Safari usage is well ahead of Chrome on iOS devices. On Windows, Edge is the second most popular browser. </h3>
      <a href="#google-chrome-is-the-most-popular-browser-overall-while-also-true-on-macos-devices-safari-usage-is-well-ahead-of-chrome-on-ios-devices-on-windows-edge-is-the-second-most-popular-browser">
        
      </a>
    </div>
    <p>Similar to our ability to measure search engine market share, Cloudflare is also in a unique position to measure browser market share. Our methodology uses information from the <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent"><u>User-Agent</u></a> and <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Client_hints"><u>Client Hints</u></a> headers to identify the browser making content requests, along with the associated operating system. Browser market share data is presented as an overall aggregate, as well as broken out by device type and operating system. Note that the shares of browsers available on both desktop and mobile devices, such as Chrome or Safari, are presented in aggregate.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#browser-market-share"><u>Globally</u></a>, we found that 65.8% of requests came from Google’s Chrome browser across 2024, and that just 15.5% came from Apple’s Safari browser. Microsoft Edge, Mozilla Firefox, and the <a href="https://www.samsung.com/us/support/owners/app/samsung-internet"><u>Samsung Internet browser</u></a> rounded out the top five, all with shares below 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bEuEbqSrAqe57gnBTeL6c/4426dc0dbc8869d05344433535e0698a/adoption_-_browser_overall_worldwide.png" />
          </figure><p><sup><i>Overall worldwide web browser market share in 2024</i></sup></p><p>Similar to the search engine statistics discussed above, differences are clearly visible when drilling down by location or platform. In some countries where iOS holds a larger market share than Android, Chrome remains the leading browser, but by a much lower margin. For example, in <a href="https://radar.cloudflare.com/year-in-review/2024/se#browser-market-share"><u>Sweden</u></a>, Chrome’s share fell to 56.2%, while Safari’s increased to 22.5%. In <a href="https://radar.cloudflare.com/year-in-review/2024/no#browser-market-share"><u>Norway</u></a>, Chrome fell to just 50%, while Safari grew to 25.6%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Dkt8A1HuUpg61G8GYkEXs/5c2649e96d2959a2606afa9d932d5b82/adoption_-_browser_overall_Norway.png" />
          </figure><p><sup><i>Overall web browser market share in Norway in 2024</i></sup></p><p>As the default browser on devices running iOS, Apple Safari was the most popular browser for iOS devices, commanding an 81.7% market share across the year, with Chrome at just 16.1%. And despite being the preinstalled default browser on Windows devices, Edge held just a 17.3% share, in comparison to Chrome’s 68.5%</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Hvnf7VPBuVTjba0P1bGRU/6d6e31c609a54c8248afe120576210aa/adoption_-_browser_overall_worldwide_iOS.png" />
          </figure><p><sup><i>Overall worldwide web browser market share for iOS devices in 2024</i></sup></p><p>For additional details, including browsers aggregated under “Other”, please refer to the quarterly <u>Browser Market Share Reports</u> on Cloudflare Radar.</p>
    <div>
      <h2>Connectivity</h2>
      <a href="#connectivity">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xC8lBdDHpahlvkJrf1nI9/7b050dc62c1628e3a5ab3a9418e572d3/2627_Rocket.png" />
          </figure>
    <div>
      <h3>225 major Internet outages were observed around the world in 2024, with many due to government-directed regional and national shutdowns of Internet connectivity.</h3>
      <a href="#225-major-internet-outages-were-observed-around-the-world-in-2024-with-many-due-to-government-directed-regional-and-national-shutdowns-of-internet-connectivity">
        
      </a>
    </div>
    <p>Throughout 2024, as we have over the last several years, we have written frequently about observed Internet outages, whether due to <a href="https://blog.cloudflare.com/east-african-internet-connectivity-again-impacted-by-submarine-cable-cuts"><u>cable cuts</u></a>, <a href="https://blog.cloudflare.com/impact-of-verizons-september-30-outage-on-internet-traffic/"><u>unspecified technical issues</u></a>, <a href="https://blog.cloudflare.com/syria-iraq-algeria-exam-internet-shutdown"><u>government-directed shutdowns</u></a>, or a number of other reasons covered in our quarterly summary posts (<a href="https://blog.cloudflare.com/q1-2024-internet-disruption-summary"><u>Q1</u></a>, <a href="https://blog.cloudflare.com/q2-2024-internet-disruption-summary"><u>Q2</u></a>, <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary"><u>Q3</u></a>). The impacts of these outages can be significant, including significant economic losses and severely limited communications. The <a href="https://radar.cloudflare.com/outage-center"><u>Cloudflare Radar Outage Center</u></a> tracks these Internet outages, and uses Cloudflare traffic data for insights into their scope and duration.</p><p>Some of the outages seen through the year were short-lived, lasting just a few hours, while others stretched on for days or weeks. In the latter category, an Internet outage in <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#haiti"><u>Haiti</u></a> dragged on for eight days in September because repair crews were barred from accessing a damaged submarine cable due to a business dispute, while shutdowns of mobile and fixed Internet providers in <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#bangladesh"><u>Bangladesh</u></a> lasted for approximately 10 days in July. In the former category, <a href="https://blog.cloudflare.com/q3-2024-internet-disruption-summary/#iraqi-kurdistan"><u>Iraq</u></a> frequently experienced multi-hour nationwide Internet shutdowns intended to prevent cheating on academic exams — these contribute to the clustering visible in the timeline during June, July, August, and September.</p><p>Within the <a href="https://radar.cloudflare.com/year-in-review/2024#internet-outages"><u>timeline</u></a> on the Year in Review microsite, hovering over a dot will display metadata about that outage, and clicking on it will open a page with additional information. Below the map and timeline, we have added a bar graph illustrating the recorded reasons associated with the observed outages. In 2024, over half were due to government-directed shutdowns. If a country/region is selected, only outages and reasons for that country/region will be displayed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/VDxaH2IkD28RXrcStCn8j/39ce7ad40f6a3d59e155ff09664f80e0/connectivity_-_Internet_outage_map.png" />
          </figure><p><sup><i>Over 200 Internet outages were observed around the world during 2024</i></sup></p>
    <div>
      <h3>Aggregated across 2024, 28.5% of IPv6-capable requests were made over IPv6. India and Malaysia were the strongest countries, at 68.9% and 59.6% IPv6 adoption respectively.</h3>
      <a href="#aggregated-across-2024-28-5-of-ipv6-capable-requests-were-made-over-ipv6-india-and-malaysia-were-the-strongest-countries-at-68-9-and-59-6-ipv6-adoption-respectively">
        
      </a>
    </div>
    <p>The IPv4 protocol still used by many Internet-connected devices was developed in the 1970s, and was never meant to handle the vast and growing scale of the modern Internet. An <a href="https://www.rfc-editor.org/rfc/rfc1883"><u>initial specification for its successor</u></a>, IPv6, was published in December 1995, evolving to a <a href="https://www.rfc-editor.org/rfc/rfc2460"><u>draft standard</u></a> three years later, offering an expanded address space intended to better support the expected growth in the number of Internet-connected devices. At this point, available IPv4 space has long since been <a href="https://ipv4.potaroo.net/"><u>exhausted</u></a>, and connectivity providers use solutions like <a href="https://en.wikipedia.org/wiki/Network_address_translation"><u>Network Address Translation</u></a> to stretch limited IPv4 resources. Hungry for IPv4 address space as their businesses and infrastructure grow, cloud and hosting providers are acquiring blocks of IPv4 address space for <a href="https://auctions.ipv4.global/"><u>as much as \$30 - \$50 per address</u></a>. </p><p>Cloudflare has been a vocal and active advocate for IPv6 since 2011, when we announced our <a href="https://blog.cloudflare.com/introducing-cloudflares-automatic-ipv6-gatewa/"><u>Automatic IPv6 Gateway</u></a>, which enabled free IPv6 support for all of our customers. In 2014, we enabled <a href="https://blog.cloudflare.com/i-joined-cloudflare-on-monday-along-with-5-000-others"><u>IPv6 support by default for all of our customers</u></a>, but not all customers choose to keep it enabled for a variety of reasons. Note that server-side support is only half of the equation for driving IPv6 adoption, as end user connections need to support it as well. (In reality, it is a bit more complex than that, but server and client side support across applications, operating systems, and network environments are the two primary requirements. From a network perspective, implementing IPv6 also brings a number of other <a href="https://www.catchpoint.com/benefits-of-ipv6"><u>benefits</u></a>.) By analyzing the IP version used for each request made to Cloudflare, aggregated throughout the year, we can get insight into the distribution of traffic by the various versions of the protocol.</p><p>At a <a href="https://radar.cloudflare.com/year-in-review/2024#ipv6-adoption"><u>global</u></a> level, 28.5% of IPv6-capable (“<a href="https://www.techopedia.com/definition/19025/dual-stack-network"><u>dual-stack</u></a>”) requests were made over IPv6, up from 26.4% in <a href="https://radar.cloudflare.com/year-in-review/2024?previousYear=true"><u>2023</u></a>. <a href="https://radar.cloudflare.com/year-in-review/2024/in#ipv6-adoption"><u>India</u></a> was again the country with the highest level of IPv6 adoption, at 68.9%, carried in large part by <a href="https://radar.cloudflare.com/adoption-and-usage/as55836?dateStart=2024-01-01&amp;dateEnd=2024-12-01"><u>94% IPv6 adoption at Reliance Jio</u></a>, one of the country’s largest Internet service providers. India was followed closely by <a href="https://radar.cloudflare.com/year-in-review/2024/my#ipv6-adoption"><u>Malaysia</u></a>, where 59.6% of dual-stacked requests were made over IPv6 during 2024, thanks to <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=ases&amp;loc=MY&amp;dt=14d&amp;metric=ip_version%2FIPv6"><u>strong IPv6 adoption rates across leading Internet providers</u></a> within the country. IPv6 adoption in India was up from 66% in <a href="https://radar.cloudflare.com/year-in-review/2024/in?previousYear=true#ipv6-adoption"><u>2023</u></a>, and in Malaysia, it was up from 57.3% <a href="https://radar.cloudflare.com/year-in-review/2024/my?previousYear=true#ipv6-adoption"><u>last year</u></a>. <a href="https://radar.cloudflare.com/year-in-review/2024/sa#ipv6-adoption"><u>Saudi Arabia</u></a> was the only other country with an IPv6 adoption rate above 50% this year, at 51.8%, whereas that list also included <a href="https://radar.cloudflare.com/year-in-review/2023/vn#ipv6-adoption"><u>Vietnam</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/gr#ipv6-adoption"><u>Greece</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/fr#ipv6-adoption"><u>France</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2023/uy#ipv6-adoption"><u>Uruguay</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2023/th#ipv6-adoption"><u>Thailand</u></a> in 2023. Thirty four countries/regions, including many in Africa, still have IPv6 adoption rates below 1%, while a total of 96 countries/regions have adoption rates below 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48L0qRLujnWQRuJ8ZMa8Ed/ac5209577812dd556d275279d4740041/connectivity_-_IPv6_adoption.png" />
          </figure><p><sup><i>Global distribution of traffic by IP version in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/NjeXm7lfs7ZGM3Gn5ToZM/3b401894664cb22347db1a8d8a2bfdc8/connectivity_-_IPv6_adoption_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of IPv6 traffic in 2024</i></sup></p>
    <div>
      <h3>The top 10 countries ranked by Internet speed all had average download speeds above 200 Mbps. Spain was consistently among the top locations across measured Internet quality metrics.</h3>
      <a href="#the-top-10-countries-ranked-by-internet-speed-all-had-average-download-speeds-above-200-mbps-spain-was-consistently-among-the-top-locations-across-measured-internet-quality-metrics">
        
      </a>
    </div>
    <p>As more and more of our everyday lives move online, including entertainment, work, education, finance, shopping, and even basic social and personal interaction, the quality of our Internet connections is arguably more important than ever, necessitating higher connection speeds and lower latency. Although Internet providers continue to evolve their service portfolios to offer increased connection speeds and reduced latency in order to support growth in use cases like videoconferencing, live streaming, and online gaming, consumer adoption is often mixed due to cost, availability, or other issues. By aggregating the results of <a href="https://speed.cloudflare.com/"><u>speed.cloudflare.com</u></a> tests taken during 2024, we can get a geographic perspective on <a href="https://developers.cloudflare.com/radar/glossary/#connection-quality"><u>connection quality</u></a> metrics including average download and upload speeds, and average idle and loaded latencies, as well as the distribution of the measurements.</p><p>In <a href="https://radar.cloudflare.com/year-in-review/2024#internet-quality"><u>2024</u></a>, Spain was a leader in download speed (292.6 Mbps) and upload speed (192.6 Mbps) metrics, and placed second globally for loaded latency (78.6 ms). (Loaded latency is the round-trip time when data-heavy applications are being used on the network.) Spain’s leadership in these connection quality metrics is supported by the strong progress that the country has made <a href="https://ec.europa.eu/newsroom/dae/redirection/document/106695"><u>towards achieving the EU’s “Digital Decade” objectives</u></a>, including fixed very high capacity network (VHCN) deployment, fiber-to-the-premises (FTTP) coverage, and 5G coverage with the latter two <a href="https://www.trade.gov/country-commercial-guides/spain-digital-economy"><u>reaching</u></a> 95.2% and 92.3% respectively. High speed fiber broadband connections are also relatively affordable, with research showing major providers offering 100 Mbps, 300 Mbps, 600 Mbps, and 1 Gbps packages, with the latter priced between €30 and €46 per month. The figures below for <a href="https://radar.cloudflare.com/year-in-review/2024/es#internet-quality"><u>Spain</u></a> show the largest clusters of speed measurements around the 100 Mbps mark, with slight bumps also visible around 300 Mbps, suggesting that the former package has the highest subscription rate, followed by the latter. Further, they show these connections are also relatively low latency, with 87% of idle latency measurements below 50 ms and 65% of loaded latency measurements below 100 ms, providing users with good <a href="https://www.screenbeam.com/wifihelp/wifibooster/how-to-reduce-latency-or-lag-in-gaming-2/#:~:text=Latency%20is%20measured%20in%20milliseconds,%2C%2020%2D40ms%20is%20optimal."><u>gaming</u></a> and <a href="https://www.haivision.com/glossary/video-latency/#:~:text=Low%20latency%20is%20typically%20defined,and%20streaming%20previously%20recorded%20events."><u>videoconferencing/streaming</u></a> experiences.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51PcbNyPpAQX79gYg0SxIU/a784aaadd65822d3384f1463570a6129/connectivity_-_Spain_bandwidth.png" />
          </figure><p><sup><i>Measured download/upload speed distribution in Spain in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Refsg6ctWdHNzscsoIDDF/75da3336fa1e31fd71a2188787944a57/connectivity_-_Spain_latency.png" />
          </figure><p><sup><i>Measured idle/loaded latency distribution in Spain in 2024</i></sup></p>
    <div>
      <h3>41.3% of global traffic comes from mobile devices. In nearly 100 countries/regions, the majority of traffic comes from mobile devices.</h3>
      <a href="#41-3-of-global-traffic-comes-from-mobile-devices-in-nearly-100-countries-regions-the-majority-of-traffic-comes-from-mobile-devices">
        
      </a>
    </div>
    <p>With approximately <a href="https://www.statista.com/topics/840/smartphones/#topicOverview"><u>70% of the world’s population using smartphones</u></a>, and <a href="https://www.pewresearch.org/internet/fact-sheet/mobile/"><u>91% of Americans owning a smartphone</u></a>, these mobile devices have become an integral part of both our personal and professional lives, providing us with Internet access from nearly any place at any time. In some countries/regions, mobile devices primarily connect to the Internet via Wi-Fi, while other countries/regions are “mobile first”, where 4G/5G services are the primary means of Internet access.</p><p>Analysis of information contained with the user agent reported with each request to Cloudflare enables us to categorize it as coming from a mobile, desktop, or other type of device. Aggregating this categorization throughout the year at a <a href="https://radar.cloudflare.com/year-in-review/2024#mobile-vs-desktop"><u>global</u></a> level, we found that 41.3% of traffic came from mobile devices, with 58.7% coming from desktop devices such as laptops and “classic” PCs. These traffic shares were in line with those measured in both <a href="https://radar.cloudflare.com/year-in-review/2023#mobile-vs-desktop"><u>2023</u></a> and 2022, suggesting that mobile device usage has achieved a “steady state”. Over 77% of traffic came from mobile devices in <a href="https://radar.cloudflare.com/year-in-review/2024/sd#mobile-vs-desktop"><u>Sudan</u></a>, <a href="https://radar.cloudflare.com/year-in-review/2024/cu#mobile-vs-desktop"><u>Cuba</u></a>, and <a href="https://radar.cloudflare.com/year-in-review/2024/sy#mobile-vs-desktop"><u>Syria</u></a>, making them the countries/regions with the largest mobile device traffic share in 2024. Other countries/regions that had more than 50% of traffic come from mobile devices were concentrated in the Middle East/Africa, the Asia Pacific region, and South/Central America. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9bsuRwzYBybYpOiKqwLja/cbdafb60eab1913a91ec916899d1e807/connectivity_-_mobile_desktop.png" />
          </figure><p><sup><i>Global distribution of traffic by device type in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KRujuREGMTBvLHVAHonuU/ad575fdd822ee3ee0bcabd41a96ef736/connectivity_-_mobile_desktop_top_5.png" />
          </figure><p><sup><i>Countries/regions with the largest shares of mobile device usage in 2024</i></sup></p>
    <div>
      <h3>20.7% of TCP connections are unexpectedly terminated before any useful data can be exchanged.</h3>
      <a href="#20-7-of-tcp-connections-are-unexpectedly-terminated-before-any-useful-data-can-be-exchanged">
        
      </a>
    </div>
    <p>Cloudflare is in a unique position to help measure the health and behaviors of Internet networks around the world. One way we do this is passively measuring rates of connections to Cloudflare that appear <i>anomalous</i>, meaning that they are unexpectedly terminated before any useful data exchange occurs. The underlying causes of connection anomalies are varied and range from DoS attacks to quirky client behavior to third-party connection tampering (e.g., when a network monitors and selectively disrupts connections to filter content).</p><p>Connection anomalies are symptoms — visible signs that “something abnormal” is happening in a network, but the underlying root cause is not always clear from the outset. However, we can gain a better understanding by incorporating previously-reported network behaviors, active measurements and on-the-ground reports, and macro trends across networks. Additional details on such analysis can be found in the blog posts <a href="https://blog.cloudflare.com/connection-tampering/"><i><u>A global assessment of third-party connection tampering</u></i></a> and<a href="https://blog.cloudflare.com/tcp-resets-timeouts/"> <i><u>Bringing insights into TCP resets and timeouts to Cloudflare Radar</u></i></a>.</p><p>Insights into TCP connection anomalies were <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>launched on Cloudflare Radar</u></a> in September, with the plot lines in the associated graph corresponding to the stage of the TCP connection in which the connection anomalously closed (using shorthand, the first three messages we typically receive from the client in a TCP connection are “SYN” and “ACK” packets to establish a connection, and then a “PSH” packet indicating the requested resource). In aggregate <a href="https://radar.cloudflare.com/year-in-review/2024#tcp-connection-anomalies"><u>globally</u></a>, over 20% of connections to Cloudflare were terminated unexpectedly, with the largest share (nearly half) being closed “Post SYN” — that is, after our server has received a client’s SYN packet, but before we have received a subsequent acknowledgement (ACK) from the client or any useful data that would follow the acknowledgement. These terminations can often be attributed to DoS attacks or Internet scanning. Post-ACK (3.1% globally) and Post-PSH (1.4% globally) anomalies are more often associated with connection tampering, especially when they occur at high rates in specific networks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11XcEAXkMgOhytTbCsf21J/159fa2459ebc6b9c268bd5d8455213ba/connectivity_-_TCP_connection_anomalies.png" />
          </figure><p><sup><i>Trends in TCP connection anomalies by stage in 2024</i></sup></p>
    <div>
      <h2>Security</h2>
      <a href="#security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CkCPZHGlR8gQQQrXt0b5H/cfd3faabbe406fd348b8751825bc43e5/2627_Shield_Globe.png" />
          </figure>
    <div>
      <h3>6.5% of global traffic was mitigated by Cloudflare's systems as being potentially malicious or for customer-defined reasons.</h3>
      <a href="#6-5-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons">
        
      </a>
    </div>
    <p>To <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/"><u>protect customers from threats</u></a> posed by malicious bots used to attack websites and applications, Cloudflare mitigates this attack traffic using <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS</u></a> mitigation techniques or <a href="https://developers.cloudflare.com/waf/managed-rules/"><u>Web Application Firewall (WAF) Managed Rules</u></a>. For a variety of other reasons, customers may also want Cloudflare to mitigate traffic using techniques like <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/"><u>rate-limiting</u></a> requests, or <a href="https://developers.cloudflare.com/waf/tools/ip-access-rules/"><u>blocking all traffic from a given location</u></a>, even if it isn’t malicious. Analyzing traffic to Cloudflare’s network throughout 2024, we looked at the overall share that was mitigated for any reason, as well as the share that was blocked as a DDoS attack or by WAF Managed Rules. </p><p>In 2024, <a href="https://radar.cloudflare.com/year-in-review/2024#mitigated-traffic"><u>6.5% of global traffic was mitigated</u></a>, up almost one percentage point from <a href="https://radar.cloudflare.com/year-in-review/2023#mitigated-traffic"><u>2023</u></a>. Just 3.2% was mitigated as a DDoS attack, or by WAF Managed Rules, a rate slightly higher than in 2023. More than 10% of the traffic originating from 44 countries/regions had mitigations generally applied, while DDoS/WAF mitigations were applied to more than 10% of the traffic originating from just seven countries/regions.</p><p>At a country/region level, <a href="https://radar.cloudflare.com/year-in-review/2024/al?#mitigated-traffic"><u>Albania</u></a> had one of the highest mitigated traffic shares throughout the year, at 42.9%, while <a href="https://radar.cloudflare.com/year-in-review/2024/ly#mitigated-traffic"><u>Libya</u></a> had one of the highest shares of traffic that was mitigated as a DDoS attack or by WAF Managed Rules, at 19.2%. In <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#just-under-6-of-global-traffic-was-mitigated-by-cloudflares-systems-as-being-potentially-malicious-or-for-customer-defined-reasons-in-the-united-states-3-65-of-traffic-was-mitigated-while-in-south-korea-it-was-8-36"><u>2023’s Year in Review blog post</u></a>, we highlighted the United States and Korea. This year, the share of mitigated traffic grew to 5.0% in the <a href="https://radar.cloudflare.com/year-in-review/2024/us?#mitigated-traffic"><u>United States</u></a> (up from 3.65% in 2023), while in <a href="https://radar.cloudflare.com/year-in-review/2024/kr?#mitigated-traffic"><u>South Korea</u></a>, it dropped slightly to 8.1%, down from 8.36%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GJ5r18m6Tpor4n2scVRQ5/cc85d08dc2aa496d677d8bfc9439417d/security_-_mitigated_traffic_worldwide.png" />
          </figure><p><sup><i>Trends in mitigated traffic worldwide in 2024</i></sup></p>
    <div>
      <h3>The United States was responsible for over a third of global bot traffic. Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google.</h3>
      <a href="#the-united-states-was-responsible-for-over-a-third-of-global-bot-traffic-amazon-web-services-was-responsible-for-12-7-of-global-bot-traffic-and-7-8-came-from-google">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/"><u>Bot</u></a> traffic describes any non-human Internet traffic, and by monitoring traffic suspected to be from bots site and application owners can spot and, if necessary, block potentially malicious activity. However, not all bots are malicious — bots can also be helpful, and Cloudflare maintains a list of <a href="https://radar.cloudflare.com/traffic/verified-bots"><u>verified bots</u></a> that includes those used for things like search engine indexing, performance testing, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/"><u>availability monitoring</u></a>. Regardless of intent, we analyzed where bot traffic was originating from in 2024, using the IP address of a request to identify the network (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a>) and country/region associated with the bot making the request. Cloud platforms remained among the leading sources of bot traffic due to a number of factors. These include the ease of using automated tools to quickly provision compute resources, the relatively low cost of using these compute resources in an ephemeral manner, the broadly distributed geographic footprint of cloud platforms, and the platforms’ high-bandwidth Internet connectivity.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#bot-traffic-sources"><u>Globally</u></a>, we found that 68.5% of observed bot traffic came from the top 10 countries in 2024, with the United States responsible for half of that total, over 5x the share of second place Germany. (In comparison to 2023, the US share was up slightly, while Germany’s was down slightly.) Among cloud platforms that originate bot traffic, Amazon Web Services was responsible for 12.7% of global bot traffic, and 7.8% came from Google. Microsoft, Hetzner, Digital Ocean, and OVH all also contributed more than a percent each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qlyS355w5LDtoBDtb1qXE/8354c2b07c0af46121a0c667e6d687e4/security_-_bot_distribution_by_source_country.png" />
          </figure><p><sup><i>Global bot traffic distribution by source country in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6euMUlCDcfOInLiCpssg2t/54eb345624346f24ab984bbe6b1c9f67/security_-_bot_distribution_by_source_network.png" />
          </figure><p><sup><i>Global bot traffic distribution by source network in 2024</i></sup></p>
    <div>
      <h3>Globally, Gambling/Games was the most attacked industry, slightly ahead of 2023’s most targeted industry, Finance.</h3>
      <a href="#globally-gambling-games-was-the-most-attacked-industry-slightly-ahead-of-2023s-most-targeted-industry-finance">
        
      </a>
    </div>
    <p>The industries targeted by attacks often shift over time, depending on the intent of the attackers. They may be trying to cause financial harm by attacking ecommerce sites during a busy shopping period, gain an advantage against opponents by attacking an online game, or make a political statement by attacking government-related sites. To identify industry-targeted attack activity during 2024, we analyzed mitigated traffic for customers that had an associated industry and vertical within their customer record. Mitigated traffic was aggregated weekly by source country/region across 19 target industries.</p><p>Companies in the Gambling/Games industry were, in aggregate, the <a href="https://radar.cloudflare.com/year-in-review/2024#most-attacked-industries"><u>most attacked during 2024</u></a>, with 6.6% of global mitigated traffic targeting the industry. The industry was slightly ahead of Finance, which led 2023’s aggregate list. (Both industries are shown at 6.6% in the Summary view due to rounding.)  Gambling/Games sites saw the largest shares of mitigated traffic in January and the first week of February, possibly related to National Football League playoffs in the United States, heading into the <a href="https://blog.cloudflare.com/super-bowl-lviii/"><u>Super Bowl</u></a>.</p><p>Attacks targeting Finance organizations were most active in May, reaching a peak of 15.3% of mitigated traffic the week of May 13. This is in line with the figure in our <a href="https://radar.cloudflare.com/reports/ddos-2024-q2#id-9-top-attacked-industries"><i><u>DDoS threat report for Q2 2024</u></i></a> that shows that Financial Services was the most attacked industry by request volume during the quarter in South America and the Middle East region.</p><p>As we have seen in the past, peak attack activity varied by industry on a weekly basis. The highest peaks for the year were seen in attacks targeting People &amp; Society organizations (19.6% of mitigated traffic, week of January 1), the Autos &amp; Vehicles industry (29.7% of mitigated traffic, week of January 15), and the Real Estate industry (27.5% of mitigated traffic, week of August 26).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qjMffdMn6uV7OEFhE5l0F/397672a455b62f712946e30130969657/security_-_targeted_industries.png" />
          </figure><p><sup><i>Global mitigated traffic share by industry in 2024, summary view</i></sup></p>
    <div>
      <h3>Log4j remains a persistent threat and was actively targeted throughout 2024.</h3>
      <a href="#log4j-remains-a-persistent-threat-and-was-actively-targeted-throughout-2024">
        
      </a>
    </div>
    <p>In December 2021, we published a <a href="https://blog.cloudflare.com/tag/log4j/"><u>series of blog posts about the Log4j vulnerability</u></a>, highlighting the threat that it posed, our observations of attempted exploitation, and the steps we took to protect customers. Two years on, in our <a href="https://blog.cloudflare.com/radar-2023-year-in-review/"><u>2023 Year in Review</u></a>, we <a href="https://blog.cloudflare.com/radar-2023-year-in-review/#even-as-an-older-vulnerability-log4j-remained-a-top-target-for-attacks-during-2023-however-http-2-rapid-reset-emerged-as-a-significant-new-vulnerability-beginning-with-a-flurry-of-record-breaking-attacks"><u>noted</u></a> that even as an older vulnerability, Log4j remained a top target for attacks during 2023, with related attack activity significantly higher than other commonly exploited vulnerabilities.</p><p>In 2024, three years after the initial Log4j disclosure, we found that Log4j remains an active threat. This year, we compared normalized daily attack activity for Log4j with attack activity for Atlassian Confluence Code Injection, a vulnerability we <a href="https://radar.cloudflare.com/year-in-review/2023#commonly-exploited-vulnerabilities"><u>examined in the 2023 Year in Review</u></a>, as well as aggregated daily attack activity for multiple <a href="https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures"><u>CVEs</u></a> related to <a href="https://capec.mitre.org/data/definitions/115.html"><u>Authentication Bypass</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-remote-code-execution/"><u>Remote Code Execution</u></a> vulnerabilities published in 2024.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024#commonly-exploited-vulnerabilities"><u>Log4j attack activity</u></a> appeared to trend generally upwards across the year, with several significant spikes visible during the first half of the year, and then again in October and November. In terms of the difference in activity, Log4j ranges from approximately 4x to over 20x the activity seen for Atlassian Confluence Code Injection, and as much as 100x the aggregated activity seen for Authentication Bypass or Remote Code Injection vulnerabilities.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YdyQ3qMUh10zLAHLefcdU/8a723a1970652c293a1f6c59efe51a99/security_-_vulnerabilities_Log4J.png" />
          </figure><p><sup><i>Global attack activity trends for commonly exploited vulnerabilities in 2024</i></sup></p>
    <div>
      <h3>Routing security, measured as the share of RPKI valid routes and the share of covered IP address space, continued to improve globally throughout 2024. </h3>
      <a href="#routing-security-measured-as-the-share-of-rpki-valid-routes-and-the-share-of-covered-ip-address-space-continued-to-improve-globally-throughout-2024">
        
      </a>
    </div>
    <p>As the routing protocol that underpins the Internet, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol (BGP)</u></a> communicates routes between networks, enabling traffic to flow between source and destination. BGP, however, relies on trust between networks, and incorrect information shared between peers, whether or not it was shared intentionally, can send traffic to the wrong place, potentially with <a href="https://blog.cloudflare.com/bgp-leaks-and-crypto-currencies/"><u>malicious results</u></a>. <a href="https://blog.cloudflare.com/rpki/"><u>Resource Public Key Infrastructure (RPKI)</u></a> is a cryptographic method of signing records that associate a BGP route announcement with the correct originating autonomous system (AS) number, providing a way of ensuring that the information being shared originally came from a network that is allowed to do so. (It is important to note that this is only half of the challenge of implementing routing security, because network providers also need to validate these signatures and filter out invalid announcements to prevent sharing them further.)</p><p>Cloudflare has long been an advocate for routing security, including being a founding participant in the <a href="https://www.manrs.org/2020/03/new-category-of-cdns-and-cloud-providers-join-manrs-to-improve-routing-security/"><u>MANRS CDN and Cloud Programme</u></a> and providing a <a href="https://isbgpsafeyet.com/"><u>public tool</u></a> that enables users to test whether their Internet provider has implemented BGP safely. Building on insights available in the <a href="https://radar.cloudflare.com/routing"><u>Routing page</u></a> on Cloudflare Radar, we analyzed data from <a href="https://ftp.ripe.net/rpki/"><u>RIPE NCC's RPKI daily archive</u></a> to determine the share of RPKI valid routes (as opposed to those route announcements that are <a href="https://rpki.readthedocs.io/en/latest/about/help.html"><u>invalid or whose status is unknown</u></a>) and how that share has changed over the course of 2024, as well as determining the share of IP address space covered by valid routes. The latter metric is of interest because a route announcement covering a significant amount of IP address space (millions of IPv4 addresses, for example) has a greater potential impact than an announcement covering a small block of IP address space (hundreds of IPv4 addresses, for example).</p><p>At a <a href="https://radar.cloudflare.com/year-in-review/2024#routing-security"><u>global</u></a> level during 2024, we saw a 6.4 percentage point increase (from 43.4% to 49.8%) in valid IPv4 routes, and a 3.2 percentage point increase (from 53.7% to 56.9%) in valid IPv6 routes. Given the trajectory, it is likely that over half of IPv4 routes will be RPKI valid by the end of calendar year 2024. Looking at the global share of IP address space covered by valid routes, we saw a 4.7 percentage point increase (from 38.9% to 43.6%) for IPv4, and a 3.3 percentage point increase (from 57.6% to 60.9%) for IPv6.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ojjIa2U45vvsbha8v6ITk/2c61631ded62b80481d47e1da8a5d2cc/security_-_routing_global_valid_routes.png" />
          </figure><p><sup><i>Shares of global RPKI valid routing entries by IP version in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rCCmsaqULazLsBgoXZLLC/9aa265e9658d71bd7ee113423c6945ca/security_-_routing_global_valid_ip_address_space.png" />
          </figure><p><sup><i>Shares of globally announced IP address space covered by RPKI valid routes in 2024</i></sup></p><p><a href="https://radar.cloudflare.com/year-in-review/2024/es#routing-security"><u>Spain</u></a> started 2024 with less than half of its routes (both IPv4 and IPv6) RPKI valid. However, the share of valid routes grew significantly on February 15, when <a href="https://radar.cloudflare.com/as12479"><u>AS12479 (Orange Espagne)</u></a> signed records associated with 98% of their IP address prefixes that were previously in an <a href="https://www.ripe.net/manage-ips-and-asns/resource-management/rpki/bgp-origin-validation/"><u>“unknown” (or NotFound) state of RPKI validity</u></a>, thus converting these prefixes from unknown to valid. That drove an immediate increase for IPv4 to 76%, reaching 81% validity by December 1, and an immediate increase for IPv6 to 91%, reaching 92.9% validity by December 1. A notable change in covered IP address space was observed in <a href="https://radar.cloudflare.com/year-in-review/2024/cm#routing-security"><u>Cameroon</u></a>, where covered IPv4 space more than doubled at the end of January, growing from 32% to 82%. This was due to <a href="https://radar.cloudflare.com/as36912"><u>AS36912 (Orange Cameroun)</u></a> signing records associated with all of their IPv4 address prefixes, changing the associated IP address space to RPKI valid. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5e7SUVIju8fidAEBkIOSq4/2085f3237411eca0816a3d2862e9e3df/security_-_routing_Spain_valid_routes.png" />
          </figure><p><sup><i>IPv4 and IPv6 shares of RPKI valid routes for Spain in 2024</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/G9adlberrdCmDnB3MupQa/6c866261fc478334673115d6dd01fd76/security_-_routing_Cameroon_valid_ipv4_address_space.png" />
          </figure><p><sup><i>Share of IPv4 address space covered by RPKI valid routes for Cameroon in 2024</i></sup></p>
    <div>
      <h2>Email Security</h2>
      <a href="#email-security">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vC1TSUDDHpepgs2Yv3Lpx/eb43b5c0a203d7ec0a74939c23684ae5/2627_Shield_Plane.png" />
          </figure>
    <div>
      <h3>An average of 4.3% of emails were determined to be malicious in 2024. </h3>
      <a href="#an-average-of-4-3-of-emails-were-determined-to-be-malicious-in-2024">
        
      </a>
    </div>
    <p>Despite the growing enterprise use of collaboration/messaging apps, email remains an important business application and is a very attractive entry point into enterprise networks for attackers. Attackers will send targeted malicious emails that attempt to impersonate an otherwise legitimate sender (such as a corporate executive), that try to get the user to click on a deceptive link, or that contain a dangerous attachment, among other types of threats. <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> protects customers from email-based attacks, including those carried out through targeted malicious email messages. During<a href="https://radar.cloudflare.com/year-in-review/2024#malicious-emails"><u> 2024</u></a>, an average of 4.3% of emails analyzed by Cloudflare were found to be malicious. Aggregated at a weekly level, spikes above 14% were seen in late March, early April, and mid-May. We believe that these spikes were related to targeted “backscatter” attacks, where the attacker flooded a target with undeliverable messages, which then bounced the messages to the victim, whose email had been set as the reply-to: address.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/693EaEyePShBH8CZ7cZWv1/c08e0acd6f8a6a15b730b1cd90bf6283/email_-_malicious_worldwide.png" />
          </figure><p><sup><i>Global malicious email share trends in 2024</i></sup></p>
    <div>
      <h3>Deceptive links and identity deception were the two most common types of threats found in malicious email messages. </h3>
      <a href="#deceptive-links-and-identity-deception-were-the-two-most-common-types-of-threats-found-in-malicious-email-messages">
        
      </a>
    </div>
    <p>Attackers use a variety of techniques, which we refer to as threat categories, when they use malicious email messages as an attack vector. These categories are defined and explored in detail in our <a href="https://blog.cloudflare.com/2023-phishing-report/"><u>phishing threats report</u></a>. In our analysis of malicious emails, we have found that such messages may contain multiple types of threats. In reviewing a weekly aggregation of threat activity trends for these categories, we found that, <a href="https://radar.cloudflare.com/year-in-review/2024#top-email-threats"><u>averaged across 2024</u></a>, 42.9% of malicious email messages contained deceptive links, with the share reaching 70% at times throughout the year. Activity for this thread category was spiky, with low points seen in the March to May timeframe, and a general downward trend visible from July through November.</p><p>Identity deception was a similarly active threat category, with such threats also found in up to 70% of analyzed emails several weeks throughout the year. Averaged across 2024, 35.1% of emails contained attempted identity deception. The activity pattern for this threat category appears to be somewhat similar to deceptive links, with a number of the peaks and valleys occurring during the same weeks. At times, identity deception was a more prevalent threat in analyzed emails than deceptive links, as seen in the graph below.</p><p>Among other threat categories, extortion saw the most significant change throughout the year. After being found in 86% of malicious emails during the first week of January, its share gradually trended lower throughout the year, finishing November under 10%.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/47EGZSEcRbUY67bsnYTSip/81ce3c89beefe1ddbe66f68710366c87/email_-_threat_category.png" />
          </figure><p><sup><i>Global malicious email threat category trends for Deceptive Links and Identity Deception in 2024</i></sup></p>
    <div>
      <h3>Over 99% of the email messages processed by Cloudflare Email Security from the .bar, .rest, and .uno top level domains (TLDs) were found to be either spam or malicious in nature.</h3>
      <a href="#over-99-of-the-email-messages-processed-by-cloudflare-email-security-from-the-bar-rest-and-uno-top-level-domains-tlds-were-found-to-be-either-spam-or-malicious-in-nature">
        
      </a>
    </div>
    <p>In March 2024, we <a href="https://blog.cloudflare.com/email-security-insights-on-cloudflare-radar/"><u>launched a set of email security insights on Cloudflare Radar</u></a>, including visibility into so-called “dangerous domains” — those top level domains (TLDs) that were found to be the sources of the most spam or malicious email among messages analyzed by Cloudflare Email Security. The analysis is based on the sending domain’s TLD, found in the <code>From</code>: header of an email message. For example, if a message came from <code>sender@example.com</code>, then <code>example.com</code> is the sending domain, and .com is the associated TLD.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024?#most-observed-tlds"><u>In aggregate across 2024</u></a>, we found that the <a href="https://icannwiki.org/.bar"><code><u>.bar</u></code></a>, <a href="https://icannwiki.org/.rest"><code><u>.rest</u></code></a>, and <a href="https://icannwiki.org/.uno"><code><u>.uno</u></code></a> TLDs were the “most dangerous”, each with over 99% of analyzed email messages characterized as either spam or malicious. (These TLDs are all at least a decade old, and each sees at least some usage, with <a href="https://research.domaintools.com/statistics/tld-counts/"><u>between 20,000 and 60,000 registered domain names</u></a>.)  Sorting by malicious email share, the <a href="https://icannwiki.org/.ws"><code><u>.ws</u></code></a> ccTLD (country code top level domain) belonging to Western Samoa came out on top, with over 90% of analyzed emails categorized as malicious. Sorting by spam email share, <a href="https://icannwiki.org/.quest"><code><u>.quest</u></code></a> is the biggest offender, with over 88% of emails originating from associated domains characterized as spam.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30rfi3V9NkY31itUpHQ9is/d1cbb9fce0ecf5a1c3a237f2694c5a13/email_-_dangerous_tlds.png" />
          </figure><p><sup><i>TLDs originating the largest total shares of malicious and spam email in 2024</i></sup></p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The Internet is an amazingly complex and dynamic organism, constantly changing, growing, and evolving.</p><p>With the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review</u></a>, we are providing insights into the change, growth, and evolution that we have measured and observed throughout the year. Trend graphs, maps, tables, and summary statistics provide our unique perspectives on Internet traffic, Internet quality, and Internet security, and how key metrics across these areas vary around the world and over time.</p><p>We strongly encourage you to visit the <a href="https://radar.cloudflare.com/year-in-review/2024"><u>Cloudflare Radar 2024 Year In Review microsite</u></a> and explore the trends for your country/region, and to consider how they impact your organization so that you are appropriately prepared for 2025. In addition, for insights into the top Internet services across multiple industry categories, we encourage you to read the companion Year in Review blog post, <a href="https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/"><i><u>From ChatGPT to Temu: ranking top Internet services in 2024</u></i></a>.</p><p>If you have any questions, you can contact the Cloudflare Radar team at radar@cloudflare.com or on social media at <a href="https://twitter.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>https://noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky).</p>
    <div>
      <h2>Acknowledgements</h2>
      <a href="#acknowledgements">
        
      </a>
    </div>
    <p>As it is every year, it truly is a team effort to produce the data, microsite, and content for our annual Year in Review, and I’d like to acknowledge those team members that contributed to this year’s effort. Thank you to: Jorge Pacheco, Sabina Zejnilovic, Carlos Azevedo, Mingwei Zhang (Data Analysis); André Jesus, Nuno Pereira (Front End Development); João Tomé (Most popular Internet services); Jackie Dutton, Kari Linder, Guille Lasarte (Communications); Eunice Giles (Brand Design); Jason Kincaid (blog editing); and Paula Tavares (Engineering Management), as well as countless other colleagues for their answers, edits, support, and ideas.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4oLkLHLIZ1vibq8dtPJP6F</guid>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[From ChatGPT to Temu: ranking top Internet services in 2024]]></title>
            <link>https://blog.cloudflare.com/radar-2024-year-in-review-internet-services/</link>
            <pubDate>Mon, 09 Dec 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ The 2024 popular Internet services landscape highlights rising generative AI, e-commerce shifts, and the continued dominance of platforms like Google and Facebook, as revealed by Cloudflare’s rankings ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Since the late 1990s, millions have relied on the Internet for searching, communicating, shopping, and working, though 2.6 billion people (about 31% of the <a href="https://www.un.org/development/desa/pd/sites/www.un.org.development.desa.pd/files/undesa_pd_2024_wpp_2024_advance_unedited_0.pdf"><u>global population</u></a>) <a href="https://time.com/7094574/x-taara/"><u>still lack Internet access</u></a>. Over the years, use of the Internet has evolved from email and static sites to social media, streaming, e-commerce, cloud tools, and more recently AI chatbots, reflecting its constant adaptation to users' needs. This post explores how people interacted online in 2024, based on Cloudflare’s observations and a review of the year’s <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/"><u>DNS</u></a> trends.</p><p>Building on similar reports we’ve done over the past several years, we have compiled a ranking of the top Internet properties of 2024, with the same categories included in <a href="https://blog.cloudflare.com/radar-2023-year-in-review-internet-services/"><u>2023</u></a>, including Generative AI. In addition to our <b>overall</b> ranking, we chose 9 categories to focus on:</p><ol><li><p><a href="#ready-to-face-the-generative-ai-era"><b><u>Generative AI</u></b></a></p></li><li><p><a href="#social-media-snapchat-closing-in-on-x"><b><u>Social Media</u></b></a></p></li><li><p><a href="#e-commerce-temu-means-growth"><b><u>Ecommerce</u></b></a><b></b></p></li><li><p><a href="#video-streaming-youtube-and-netflix-remain-uncontested-leaders"><b><u>Video Streaming</u></b></a></p></li><li><p><a href="#the-news-globo-and-bbc-global-perspectives"><b><u>News</u></b></a></p></li><li><p><a href="#messaging-whatsapp-rules-telegram-rises"><b><u>Messaging</u></b></a><b></b></p></li><li><p><a href="#metaverse-gaming-roblox-leads-steam-grows-oculus-is-out"><b><u>Metaverse &amp; Gaming</u></b></a><b></b></p></li><li><p><a href="#financial-services-stripe-keeps-lead-black-friday-impact"><b><u>Financial Services</u></b></a><b></b></p></li><li><p><a href="#crypto-binance-is-back-and-the-impact-of-us-elections"><b><u>Cryptocurrency Services</u></b></a></p></li></ol><p>As we have done since <a href="https://blog.cloudflare.com/radar-2022-year-in-review/"><u>2022</u></a>, our analysis uses anonymized DNS query data from our <a href="https://1.1.1.1/"><u>1.1.1.1</u></a> public <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/"><u>DNS resolver</u></a>, used by millions globally. We aggregate domains for each service (e.g., twitter.com, t.co, and x.com for X) and identify the sites that provide services to humans, thus excluding technical domains like root-servers.net. Rankings reflect relative popularity within categories, not absolute traffic. Therefore, a drop in rank doesn’t always indicate less traffic to a specific Internet service — it may simply reflect increased competition from other services, leading to a change in rank.</p><p><a href="https://radar.cloudflare.com/year-in-review/2024?#internet-services"><u>This part</u></a> of the 2024 Cloudflare Radar Year in Review highlights shifts in Internet services, with rising platforms like Temu, GitHub Copilot, and WeChat reflecting changing user preferences. ChatGPT (OpenAI) also played a more prominent role in the generative AI space and in our Overall ranking, nearly reaching the Top 50. Major events like the Paris Olympics and US elections influenced rankings as well, boosting Olympics-related sites and news platforms like CNN and Fox News.</p><p>This year, we’re also including a by-country/region perspective on the most popular Internet services for the first time, showing the Top 10 Overall for 132 countries/regions. At the bottom of this post, we highlight trends found in this localized data, including how ChatGPT performed best in Singapore.</p><p>Keep reading for a detailed look at the evolution of trends throughout the year. For more, visit our <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>2024 Cloudflare Radar Year in Review microsite</u></a>. Along with the lists of most popular Internet services, the Year in Review microsite and its <a href="https://blog.cloudflare.com/radar-2024-year-in-review/"><u>associated blog post</u></a> explore a number of additional metrics.</p>
    <div>
      <h2>Google is again #1. Facebook, Apple and TikTok follow</h2>
      <a href="#google-is-again-1-facebook-apple-and-tiktok-follow">
        
      </a>
    </div>
    <p>Since <a href="https://blog.cloudflare.com/popular-domains-year-in-review-2021/"><u>2021</u></a>, we’ve started our review of rankings with an Overall Top 10 list, showcasing the most popular Internet services globally based on DNS traffic from our 1.1.1.1 resolver. Unsurprisingly, Google (including services like Google Maps and Google Calendar) remained the #1 Internet service in 2024. Since introducing our ranking method <a href="https://blog.cloudflare.com/radar-2022-year-in-review/"><u>two years ago</u></a>, no other service has come close to challenging Google’s top spot. It’s important to note that Apple and Microsoft are similar to Google in that their main domains (apple.com or microsoft.com) are used for many different services. We include other services separately, such as Outlook or iCloud, which use their own specific domains.</p>
    <div>
      <h3>Top 10 most popular Internet services in 2024, overall</h3>
      <a href="#top-10-most-popular-internet-services-in-2024-overall">
        
      </a>
    </div>
    <ol><li><p>Google</p></li><li><p>Facebook</p></li><li><p>Apple</p></li><li><p>TikTok</p></li><li><p>Amazon Web Services</p></li><li><p>Microsoft</p></li><li><p>Instagram</p></li><li><p>YouTube</p></li><li><p>Amazon</p></li><li><p>WhatsApp</p></li></ol><p>Beyond Google, Facebook consistently held the #2 spot throughout 2024. Last year, it competed with Apple for that position. Apple, which uses domains like apple.com for services related to its software and devices, was generally #3. However, TikTok challenged that position on several days since late August. Amazon Web Services (AWS), differentiated from Amazon by domains like amazonaws.com, performed better this year compared to 2023. It held the #5 spot but often traded places with Microsoft during the year.</p><p>Instagram also rose in the rankings. It was around #8 in 2023 and steadily improved. Now, it holds the #7 spot, ahead of YouTube.</p><p>Amazon remained at #9 for most of the year, the same as in 2023. WhatsApp, owned by Meta, appeared in the Top 10 for the first time, taking the #10 spot.</p><p>Close to the Top 10 were Apple’s iCloud, Netflix (which performs better on weekends), and Microsoft’s Outlook.</p><p>In the chart below, you can follow the evolution of the top Internet services in our Overall ranking throughout the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6x6pJNS7XzCpeIQzilXnry/a3ec9f3a9ce6072fe9a4edb0973bc38c/unnamed.png" />
          </figure><p>In 2022, X (then known as Twitter) ranked as high as #10 in our overall ranking and was close to Instagram. It never reached the top 10 in 2023, and in 2024, X dropped further, to #14 or #15. More on X’s performance in the <a href="#social-media-snapchat-closing-in-on-x"><u>Social Media category below</u></a>.</p>
    <div>
      <h2>Ready to face the Generative AI era?</h2>
      <a href="#ready-to-face-the-generative-ai-era">
        
      </a>
    </div>
    <p>Generative AI gained global attention in late 2022 with the launch of ChatGPT, and became a global phenomenon <a href="https://blog.cloudflare.com/radar-2023-year-in-review-internet-services/"><u>during 2023</u></a>. By 2024, ChatGPT (OpenAI) continues to be by far the most popular service in this category, which includes chatbots, coding bots, and more. Other generative AI services had more stable rankings compared to 2023.</p>
    <div>
      <h3>Top 10 Generative AI services in 2024</h3>
      <a href="#top-10-generative-ai-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>ChatGPT (OpenAI)</p></li><li><p>Character.AI</p></li><li><p>Codeium</p></li><li><p>QuillBot</p></li><li><p>Claude (Anthropic)</p></li><li><p>Perplexity</p></li><li><p>GitHub Copilot</p></li><li><p>Wordtune</p></li><li><p>Poe</p></li><li><p>Tabnine</p></li></ol><p>Significant changes occurred below ChatGPT’s first place ranking throughout the year. Character.AI, an AI-driven chatbot platform, maintained a strong #2 position, staying ahead of Codeium, a code-generation AI tool that has improved its position since June, and Quillbot, an AI writing and paraphrasing tool.</p><p>Claude, the AI chatbot from Anthropic, rose in the rankings, particularly after March 4, when the new model, <a href="https://www.anthropic.com/news/claude-3-family"><u>Claude 3</u></a>, was introduced, and again later <a href="https://www.anthropic.com/news/claude-europe"><u>in May</u></a> when it became available in Europe. It reached #5 in June. Perplexity, an AI-driven search and Q&amp;A platform, started the year outside the Top 10 but ended close to Claude. It surpassed Claude for the first time on November 6, 2024, the day after the U.S. elections, reaching #6.</p><p>This next chart shows movement among the Generative AI services that were more popular later in the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4VnUCNBk5TJdBvufqgumm7/6407dd6b978259bc4d962045245e2658/unnamed__1_.png" />
          </figure>
    <div>
      <h2>GitHub Copilot’s rise to the Top 10</h2>
      <a href="#github-copilots-rise-to-the-top-10">
        
      </a>
    </div>
    <p>Several new players entered the Top 10 AI rankings in 2024, showing strong growth. GitHub Copilot, an AI-powered coding assistant, experienced the fastest rise, entering the Top 10 in September (after reaching the Top 20 in June) and staying mostly between #5 and #3 by November, as the next chart shows. Similarly, Suno AI, an AI-powered audio and music generation platform, entered the Top 10 in April, briefly dropped out, but stabilized between #6 and #10 after October — in November, it ranked #6 on weekends.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41xZ0xKeuMrn7lpy9D4OUx/2fff166b62c58c2f71036befec3025d5/BLOG-1033_4.png" />
          </figure><p>Some platforms lost ground in the rankings. Wordtune, an AI writing assistant, peaked at #4 during mid-year but declined afterward. Tabnine, another AI-powered coding assistant, held the #5 spot for months but slipped after July. In contrast, Sider AI, a coding assistant, entered the Top 20 in March and finished the year around #12. Poe, an AI chatbot platform, ranked #5 in 2023 and between #5 and #6 before June, but ended 2024 moving around #10, performing better during weekends.</p><p>Google Gemini, Google’s AI assistant and model, performed better on weekdays and started the year ranking between #7 and #10, but dropped out of the Top 10 after July as newer AI platforms gained momentum. Hugging Face, an open-source AI and machine learning platform, mostly fluctuated between #7 and #9 during the year, peaking at #4 on August 18 around the time <a href="https://huggingface.co/models?pipeline_tag=text-to-image"><u>several models</u></a> were updated, and and as it reached its milestone of <a href="https://x.com/huggingface/status/1825620479895547992"><u>5 million</u></a> users. However, it fell out of the Top 10 by September.</p><p>Midjourney, an AI-powered platform for generating images, performed well until June, when it was close to the Top 10. Additionally, the OpenAI API ranked #18 in the Generative AI category on May 14-15, coinciding with OpenAI’s announcement of GPT-4o <a href="https://openai.com/index/gpt-4o-and-more-tools-to-chatgpt-free/"><u>availability</u></a>, including in the API.</p>
    <div>
      <h2>ChatGPT’s growth to the Top 50 of our Overall category</h2>
      <a href="#chatgpts-growth-to-the-top-50-of-our-overall-category">
        
      </a>
    </div>
    <p>Notable trends that we observed when looking at trends for Generative AI services within our larger Overall ranking include:</p><ul><li><p>ChatGPT continued its growth in 2024, similar to 2023. In early 2023, it ranked around #200 and ended the year near the top 100. In 2024, it started close to the top 100, reached the top 60 in May with the <a href="https://openai.com/index/gpt-4o-and-more-tools-to-chatgpt-free/"><u>release of the 4o model</u></a>, and has been near the top 50 since September, aligning with the return of workers and students to their routines. It ranks higher on weekdays, averaging #56, and drops on weekends.</p></li><li><p>Comparing ChatGPT with other known and non-AI related websites, by late November, ChatGPT ranked ahead of Weather.com, Temu, eBay, Telegram, Google Calendar, and Prime Video, but trailed Disney Plus</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Z1fGk8wyn890pveYDe13n/99b0def62c6c4c0f31445c584ab195ea/BLOG-1033_5.png" />
          </figure><p>Character.ai also showed a clear growth trend in our Overall ranking, from outside the top 200 earlier in the year, to above #180 after July, performing better in August, reaching as high as #161. The AI-driven chatbot platform performed better on weekends than on weekdays, the opposite of ChatGPT.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7J8T8Xwg6KTfMwOl9OBvcP/bf9c5644d28052f3cd40c0b871f42d5c/BLOG-1033_6.png" />
          </figure><ul><li><p>Codeium entered the top 300 in July. It ranked higher on weekdays than weekends.</p></li></ul>
    <div>
      <h2>Social media: Snapchat closing in on X</h2>
      <a href="#social-media-snapchat-closing-in-on-x">
        
      </a>
    </div>
    <p>According to <a href="https://datareportal.com/social-media-users"><u>Kepios</u></a>, there are an estimated 5.22 billion social media users worldwide in 2024 (up from 4.95 billion last year), representing 63.8% of the global population. Social media continues to play a major role in daily life, serving as a key platform for communication, information, and attention.</p><p>Once again, social media giants like Facebook, TikTok, and Instagram dominate, ranking among the top 10 most popular Internet services overall.</p>
    <div>
      <h3>Top 10 Social Media services in 2024</h3>
      <a href="#top-10-social-media-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Facebook</p></li><li><p>TikTok</p></li><li><p>Instagram</p></li><li><p>X</p></li><li><p>Snapchat</p></li><li><p>LinkedIn</p></li><li><p>Discord</p></li><li><p>Kwai</p></li><li><p>Pinterest</p></li><li><p>Reddit</p></li></ol><p>In the Social Media category rankings, the top seven remain unchanged from last year. However, there are notable developments in this category. In 2022, X briefly challenged Instagram for the #3 spot during a few days. Since 2023, X has held a solid #4 position, with Snapchat closing in and reaching #4 for the first time on several days in September and October.</p><p>LinkedIn stayed steady at #6, followed by Discord. Kwai, a Chinese video app popular in Brazil (with 60 million <a href="https://valorinternational.globo.com/business/news/2024/04/16/tiktok-rival-prepares-expansion-in-brazil.ghtml"><u>reported</u></a> users) and other countries, rose from #10 last year to #8. Further down the list, Pinterest kept its #9 rank, while Reddit, previously #8 in 2023, dropped to #10 this year, but peaked at #7 on November 26, just before Black Friday and Thanksgiving in the US. Here’s the Social Media Top 10 chart for 2024:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yVlAeKVHUuty7yOenw6Zc/01ed16245eb54109bc64360df1fb69c3/unnamed__2_.png" />
          </figure><p>Our global ranking also highlights several non-Western platforms in the Top 20. These include Douyin (#11), the Chinese version of TikTok; VK (#12), often referred to as the Russian Facebook; and TikTok rivals <a href="https://www.ipsos.com/en-id/uncovering-growth-short-video-indonesia"><u>popular in Southeast Asia</u></a> SnackVideo (#13) by Chinese <a href="https://en.wikipedia.org/wiki/Kuaishou"><u>Kuaishou</u></a> (that also owns Kwai). OnlyFans appeared consistently in the Top 20 starting in September, ranking around #18 and surpassing Tumblr by late November.</p><p>The #18 spot was briefly held by X alternative Threads (by Instagram) in late September and by Bluesky starting November 18. Mastodon-related servers reached as high as #19 for several days since late August. Here’s a look at X (on top) and its alternatives in this category:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5H4FGA8SrEEAaqqOXdSNTM/f84622ade5bb280d07b23cc1c3b648e7/BLOG-1033_8.png" />
          </figure>
    <div>
      <h2>Alternatives to X: Bluesky, Threads, and Mastodon</h2>
      <a href="#alternatives-to-x-bluesky-threads-and-mastodon">
        
      </a>
    </div>
    <p>Let’s move beyond the Social Media category to see how these platforms performed in our Overall ranking, where bigger shifts between services are evident.</p><p>As we’ve seen, Threads, Bluesky, and Mastodon (via an aggregation of popular <a href="https://en.wikipedia.org/wiki/Mastodon_(social_network)"><u>servers</u></a>) didn’t break into the Top 10 of the Social Media category. However, in the Overall ranking, Mastodon servers, bundled together, consistently ranked between #208 and #248, performing better on weekends.</p><p>Bluesky entered the Top 250 in September 2024, and gained additional attention after the <a href="https://en.wikipedia.org/wiki/Bluesky#Post-election_growth"><u>US elections</u></a>. It rose sharply after November 14, peaking at #193 on November 20, and has since stabilized around #220. </p><p>Threads entered the Top 250 in August 2024, peaking at #183 on September 24 before dropping out in October. In 2023, Threads peaked at #227 in early July but fell out of the Top 250 by late August. It’s worth noting that Threads also uses Instagram’s cdninstagram.com for images and videos, which may influence Threads position in our DNS rankings (that said, Instagram wasn’t impacted by Threads appearance in our rankings).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FPuxB6AVFEDyotkayVGYw/cc7b8b2a0ddfc0e6e5975d73028b6acd/BLOG-1033_9.png" />
          </figure><p>Here are some other trends we observed among social media apps, and how they did in our Overall ranking:</p><ul><li><p><b>Instagram</b>’s best day (#6 in the Overall ranking) was August 5, 2024, coinciding with the week the app was <a href="https://www.reuters.com/world/middle-east/turkey-meet-instagram-officials-after-access-ban-minister-says-2024-08-05/"><u>banned in Turkey</u></a>.</p></li><li><p><b>X</b>’s best day of the year in our ranking was April 14, when it reached #12. This coincided with Arsenal losing the top position in the English football/soccer <a href="https://en.wikipedia.org/wiki/Premier_League"><u>Premier League</u></a> (the <a href="https://www.dailymail.co.uk/sport/football/article-13980099/Premier-League-watched-league-world-study-finds.html"><u>most-watched sports league in the world</u></a>) to Manchester City, which went on to win its fourth title in a row. Last year, we noted how football/soccer in England impacted X’s ranking. X also reached #13 on August 9 and 10, during the final weekend of the <a href="https://en.wikipedia.org/wiki/2024_Summer_Olympics"><u>Paris 2024 Olympics</u></a>.</p></li><li><p><b>X</b> performed better on weekdays, while <b>LinkedIn</b> ranked higher between Mondays and Wednesdays. <b>Snapchat</b> and <b>Discord</b> performed better on weekends.</p></li><li><p><b>Reddit</b> consistently stayed in our Top 50 in 2024, showing growth from around #45 to #40 by November, with a peak at #38 on November 26. It performed better between Mondays and Wednesdays.</p></li><li><p><b>Quora</b> displayed a downward trend in our ranking, dropping from around #140 to #160. It performed better between Mondays and Wednesdays. </p></li><li><p><b>Tinder</b>, which performs better on Sundays, started the year around #150 but eventually dropped below #160.</p></li><li><p><b>Tumblr</b> followed a similar pattern, dropping out of the Top 200, where it was in early 2024, to outside the ranking entirely since September. Tumblr performed better on weekends.</p></li><li><p><b>OnlyFans</b> showed growth in our Overall ranking, sitting around the Top 220 with a peak at #213 on December 1. It performed better on weekends.</p></li></ul>
    <div>
      <h2>E-commerce: Temu means growth</h2>
      <a href="#e-commerce-temu-means-growth">
        
      </a>
    </div>
    <p>The importance of e-commerce continues to grow, as highlighted in our recent <a href="https://blog.cloudflare.com/from-deals-to-ddos-exploring-cyber-week-2024-internet-trends"><u>Cyber Week 2024 blog post</u></a>. Amazon leads the category, followed by Taobao, the Chinese marketplace, holding a steady #2 spot as it also did in 2023. New to #3 is AliExpress, the global online retail giant from China.</p>
    <div>
      <h3>Top 10 E-commerce services in 2024</h3>
      <a href="#top-10-e-commerce-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Amazon</p></li><li><p>Taobao</p></li><li><p>AliExpress</p></li><li><p>Shopify</p></li><li><p>Temu</p></li><li><p>Alibaba</p></li><li><p>eBay</p></li><li><p>Shein</p></li><li><p>Mercado Libre</p></li><li><p>Wildberries (RU)</p></li></ol><p>Compared to 2023, eBay lost its #3 spot globally and dropped down to #7, despite starting 2024 at #3 for several days. AliExpress claimed #3, followed by Shopify (#4), the Canadian platform hosting numerous online stores, and Temu (#5). Temu, the low-cost, fast-fashion marketplace launched in the US in September 2022, ended 2023 at #7 but rose to #5 in 2024, occasionally reaching #4 since August. Alibaba dropped to #6 in September.</p><p>Shein, the Chinese fast-fashion brand, continued its growth and overtook Mercado Libre (#8) in November. A surprise this year was Wildberries, often called Russia’s “Amazon,”  that has been <a href="https://tech.news.am/eng/news/499/wildberries-starts-direct-sales-of-products-from-armenia-to-other-countries.html"><u>expanding</u></a> to several neighboring countries (including some in <a href="https://ecommercenews.eu/wildberries-launches-in-france-italy-and-spain/"><u>Europe</u></a>). It climbed to #10 in September, surpassing OLX (which held #10 for several months), Rakuten, and Lazada.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25LFh2rFpp3eaVXVdK4Qfm/ccbe39b79da5808f45043945defe7001/BLOG-1033_10.png" />
          </figure>
    <div>
      <h2>The Black Friday overall effect</h2>
      <a href="#the-black-friday-overall-effect">
        
      </a>
    </div>
    <p>Looking at how e-commerce sites performed in our Overall ranking, we observed the following trends:</p><ul><li><p><b>Amazon</b> fluctuated between #9 and #10 after October, returning to #9 on November 30 and December 1, during the Black Friday weekend. It often performed better on weekends.</p></li><li><p><b>Shopify</b>’s best day of the year was Black Friday, November 29, when it reached #55. The global e-commerce platform performed better during weekdays.</p></li><li><p><b>Temu</b>, known for low-cost products, started 2024 outside the Top 100 but climbed into the Top 70 by year-end. It performed best in late October and early November, peaking at #63, with a Black Friday spike to #65.</p></li><li><p><b>Shein</b>, the Chinese fast-fashion brand, showed growth, nearing the Top 100 in early 2024 before dropping to the Top 140 between June and October. It rebounded in November, peaking at #83 on Black Friday. A similar trend was observed in 2023, when it ended the year around the Top 120. Here’s the comparison between recent players Temu and Shein:</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33EruzBOGpz5dMKVae9i5F/4a4d04afdd014db124e5531309eb475e/BLOG-1033_11.png" />
          </figure><ul><li><p><b>eBay</b> consistently ranked between #72 and #80, peaking at #62 on October 5-6 and again in late November, just before Black Friday. It often performed better on weekends.</p></li><li><p><b>Mercado Libre</b>, the Latin American marketplace, had its best day on Black Friday, November 29, reaching #100.</p></li><li><p><b>Adidas</b> entered the Top 250, ranking #232 on Black Friday, November 29.</p></li><li><p><b>Target</b> performed well in November, peaking at #133 on November 27, the day before Thanksgiving in the US, and at #127 on December 1. It often performed better on Sundays.</p></li><li><p><b>Walmart</b> improved its performance from September onward, with its best days on November 25-26, reaching #150.</p></li><li><p><b>Ikea</b>, the Swedish furniture retailer, peaked at #247 on June 29.</p></li></ul>
    <div>
      <h2>Video streaming: YouTube and Netflix remain uncontested leaders</h2>
      <a href="#video-streaming-youtube-and-netflix-remain-uncontested-leaders">
        
      </a>
    </div>
    <p>The relevance of video streaming platforms shows no signs of fading. In 2024, the Top 3 rankings stayed unchanged from 2023, with YouTube firmly holding the #1 spot, followed by Netflix. Among paid streaming services, Netflix leads, trailed by Disney Plus and Amazon Prime Video. Other paid streaming services are outside the Top 10, including, in ranked order: HBO/Max, Hulu, Peacock, and Paramount Plus.</p>
    <div>
      <h3>Top 10 — Video streaming services 2024</h3>
      <a href="#top-10-video-streaming-services-2024">
        
      </a>
    </div>
    <ol><li><p>YouTube</p></li><li><p>Netflix</p></li><li><p>Twitch</p></li><li><p>Roku</p></li><li><p>Disney Plus</p></li><li><p>Amazon Prime Video</p></li><li><p>Vimeo</p></li><li><p>Plex.TV</p></li><li><p>Pluto TV</p></li><li><p> Bigo Live</p></li></ol><p>Twitch, a live-streaming platform for gaming, kept the #3 spot, as it did in 2023 and 2022. Roku, a digital media player that also offers streaming services, ranked #4, maintaining its position from last year. Similarly, Disney Plus (#5) and Amazon Prime Video (#6) held their spots, while Hulu dropped out of the Top 10.</p><p>The creative video platform Vimeo showed clear popularity growth since May, followed by recent players like Plex TV, a media platform with streaming that performed better starting in October, and Pluto TV, a free ad-supported streaming service that also showed growth throughout the year. Bigo Live, a live-streaming social platform, entered the Top 10 rankings in May. </p><p>Next, the Top 10 overtime perspective:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3WIn3kVYqJqUvd4QTzHTem/94c6c99cce6fce1ac253dc326857d3c5/BLOG-1033_12.png" />
          </figure><p>Throughout the year, Disney Plus occasionally challenged Roku, especially on weekends, a trend similar to what was observed in 2023.</p><p>Looking at how video streaming services performed in our Overall ranking, we found:</p><ul><li><p><b>Netflix</b> consistently ranked #12 on most weekends, particularly Sundays, through late May and resumed the same trend after August. Netflix, Disney Plus, Prime Video, and HBO/Max were more popular on weekends, especially Sundays.</p></li><li><p><b>Disney Plus</b> ranged between #50 and #60, with a strong start to the year and a spike to #51 on September 22, coinciding with the premiere of the new Marvel show <a href="https://screenrant.com/agatha-all-along-tv-review/"><u>Agatha All Along</u></a>.</p></li><li><p><b>Prime Video</b> had its best day in the rankings on May 25, at #56, the day the movie <a href="https://www.yahoo.com/entertainment/amazon-prime-video-schedule-may-200600787.html"><u>Bombshell</u></a> with Nicole Kidman premiered on the platform.</p></li><li><p><b>HBO/Max</b> was consistently around the Top 100 until August. but dropped out after October.</p></li><li><p><b>Peacock</b> had an inconsistent presence in the Top 250 but reappeared in late July during the Paris 2024 Olympics, reaching #176 on July 28. That was one of the busiest days for Olympic events, as detailed in our <a href="https://blog.cloudflare.com/paris-2024-olympics-recap/"><u>blog post on the event</u></a>.</p></li><li><p><b>Paramount Plus</b> was mostly outside the Top 250 this year but peaked at #216 on February 11, the day of the <a href="https://en.wikipedia.org/wiki/Super_Bowl_LVIII"><u>Super Bowl</u></a>, which the platform streamed.</p></li></ul>
    <div>
      <h2>The News: Globo and BBC global perspectives</h2>
      <a href="#the-news-globo-and-bbc-global-perspectives">
        
      </a>
    </div>
    <p>News organizations are vital for keeping the public informed, especially during crises. With that in mind, this ranking of news services, some of which are well-established news outlets while others are news aggregators, also highlights a few newsworthy trends.</p>
    <div>
      <h3>Top 10 News services in 2024</h3>
      <a href="#top-10-news-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Globo</p></li><li><p>BBC</p></li><li><p>NY Times</p></li><li><p>CNN</p></li><li><p>Fox News</p></li><li><p>Google News</p></li><li><p>Yahoo Finance</p></li><li><p>Daily Mail</p></li><li><p>RT</p></li><li><p>NewsBreak</p></li></ol><p>This year’s rankings in the news category mirrored 2023 at the top. Globo, the <a href="https://en.wikipedia.org/wiki/Grupo_Globo"><u>Brazilian media giant</u></a> — one of the largest in Latin America and globally — encompassing radio, TV, newspapers, and magazines, stayed #1, followed by the British BBC at #2, that operates <a href="https://www.bbc.com/aboutthebbc/whatwedo/worldservice"><u>globally and in 42 languages</u></a>. </p><p>The New York Times rose to #3 this year (it was #5 in 2023), overtaking CNN (#4) and Fox News (#5), which dropped from its position at #3 in 2023 and this year came behind CNN.</p><p>Several prominent outlets, such as the Washington Post, The Guardian, NPR, and the Wall Street Journal, fell out of the Top 10 this year. These outlets had higher rankings in late 2023 following the start of the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel"><u>Hamas-Israel conflict</u></a> on October 7. News aggregators gained prominence, with Google News (#6) and also Yahoo Finance (#7), focused on financial news (and that came in front of Yahoo News), and NewsBreak (#10), a US-based local news app, entering the Top 10. </p><p>The British Daily Mail, which has also <a href="https://podnews.net/update/mail-podcasts-us"><u>expanded</u></a> its focus <a href="https://x.com/DailyMail"><u>to the US</u></a> and <a href="https://www.dailymail.co.uk/auhome/index.html"><u>Australia</u></a>, ranked #8, followed by RT, the <a href="https://en.wikipedia.org/wiki/RT_(TV_network)"><u>Russian news TV network</u></a> with a global presence. RT <a href="https://x.com/rtnoticias_br"><u>launched</u></a> its Brazil/Portuguese version in late 2023 and was recently highlighted in a <a href="https://www.npr.org/2024/09/25/nx-s1-5114246/russia-today-rt-election-influence-tenet-indictment"><u>report</u></a> and an <a href="https://www.state.gov/alerting-the-world-to-rts-global-covert-activities/"><u>alert</u></a> from the US Department of State regarding its global operations.</p><p>The US elections impacted rankings. CNN climbed to #2 on November 5, election day, and reached #1 on November 6, while Fox News peaked at #3. NBC News also improved, reaching #11 on November 5 and #7 the following day. Associated Press ranked #8 on November 5 as well. Here’s the News ranking:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VrN4qkmRQbWpEgNpVf9xF/bcb5455da83adc008d4b03ebbb36de01/BLOG-1033_13.png" />
          </figure>
    <div>
      <h2>US elections, attacks and protests</h2>
      <a href="#us-elections-attacks-and-protests">
        
      </a>
    </div>
    <p>Notable news trends we identified in our larger Overall ranking include:</p><ul><li><p>As we’ve seen in the News category, the US elections on November 5, 2024, caused CNN, Fox News, and others to jump in our rankings. This trend was also evident in the Overall ranking for the following media outlets, listed by performance. November 6 was the best day of 2024 for each:</p><ul><li><p><b>CNN</b>: #105 on November 5; #72 on November 6</p></li><li><p><b>Fox News</b>: #153 on November 5; #92 on November 6</p></li><li><p><b>BBC</b>: #115 on November 5, and #97 on November 6</p></li><li><p><b>NY Times</b>: #149 on November 5; #98 on November 6</p></li><li><p><b>NBC News</b>: #160 on November 6</p></li><li><p><b>Associated Press</b>: #166 on November 6</p></li><li><p><b>Google News</b>: #250 on November 5; #228 on November 6</p></li><li><p><b>Wall Street Journal</b>: #241 on November 6</p></li><li><p><b>Washington Post</b>: #245 on November 6</p></li></ul></li></ul><p>In the next chart we show rankings for CNN, Fox News, the BBC, and NY Times:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fyn60CqLd0GLhX5xLq9fM/be754873b6a79e7622b3bff5e46c1d9f/BLOG-1033_14.png" />
          </figure><ul><li><p>Brazil made <a href="https://www.france24.com/en/americas/20240225-thousands-of-brazilians-pour-into-streets-to-denounce-coup-probe-against-ex-president-bolsonaro"><u>headlines</u></a> in late February when thousands of <a href="https://oglobo.globo.com/politica/noticia/2024/02/25/apoiadores-de-bolsonaro-ocupam-avenida-paulista-em-ato-convocado-pelo-ex-presidente.ghtml"><u>Bolsonaro supporters protested</u></a> to defend the former president against investigations. During this period, Globo moved up the rankings, reaching #60 on February 24-25, 2024.</p></li><li><p><b>WP</b>, the news aggregator from Poland, had its best day on July 26 (#188), coinciding with <a href="https://www.euractiv.com/section/global-europe/news/polish-mps-allow-security-forces-to-use-arms-with-impunity/"><u>Polish lawmakers</u></a> voting to allow security forces to use lethal weapons with “<a href="https://www.euractiv.com/section/global-europe/news/polish-mps-allow-security-forces-to-use-arms-with-impunity/"><u>impunity</u></a>”, particularly at the tense border with Belarus. WP peaked again on November 6 (#180), the day after the US elections, when the result of the election was mentioned in <a href="https://notesfrompoland.com/2024/11/06/polish-opposition-chant-trumps-name-in-parliament-after-us-election-victory/"><u>Poland’s parliament</u></a>. Its third and final peak was on Black Friday, November 29, again at #180.</p></li><li><p><b>Rambler</b>, the Russian news aggregator, peaked at #218 on February 23, 2024, the day after the <a href="https://en.wikipedia.org/wiki/Crocus_City_Hall_attack"><u>Moscow concert hall attack</u></a> and the same day Vladimir Putin <a href="http://en.kremlin.ru/events/president/news/73703"><u>addressed the nation</u></a>.</p></li></ul>
    <div>
      <h2>Messaging: WhatsApp rules &amp; Telegram rises</h2>
      <a href="#messaging-whatsapp-rules-telegram-rises">
        
      </a>
    </div>
    <p>Messaging remains relevant, especially for <a href="https://internetlab.org.br/en/news/new-research-indicates-that-the-impact-of-information-in-messaging-apps-has-a-deep-connection-with-other-media-habits/"><u>specific</u></a> communication purposes. Apple’s iMessage is excluded from this category because it lacks a unique domain name for traffic analysis. With that in mind, WhatsApp retained its position as the top messaging service in 2024, consistent with 2023 and 2022.</p>
    <div>
      <h3>Top Messaging services in 2024</h3>
      <a href="#top-messaging-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>WhatsApp</p></li><li><p>QQ</p></li><li><p>Telegram</p></li><li><p>Viber</p></li><li><p>WeChat</p></li><li><p>Signal</p></li><li><p>LINE</p></li><li><p>KakaoTalk</p></li><li><p>eitaa.com</p></li><li><p>Facebook Messenger</p></li></ol><p>Following WhatsApp at #2 is, for the second year in a row, the Chinese service QQ, also known as <a href="https://en.wikipedia.org/wiki/Tencent_QQ"><u>Tencent QQ</u></a>, which includes games and mobile payments and is popular in Asia. Telegram, widely used in Eastern Europe and Asia, took the #3 spot from Viber in June. Viber remains popular in Eastern Europe, Asia, and the Middle East.</p><p>WeChat rose this year, securing #5 in October and surpassing Signal, which held that position for most of the year but dropped to #6 (the same position in which it ended 2023). LINE from Japan ranked #7, while new entries to the Top 10 included South Korea’s KakaoTalk (#8) and Iran’s eitaa.com (#9), a messaging application, designed for both mobile and desktop platforms, that is popular in Iran and among the Farsi (Persian) language <a href="https://en.wikipedia.org/wiki/Iranian_diaspora"><u>diaspora</u></a>.</p><p>Facebook Messenger rounded out the Top 10 at #10.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zzbNj7yWjrSVKtE7GXKah/83cc0677e91df949d6198727a835f0c7/BLOG-1033_15.png" />
          </figure><p>Here are other messaging trends from our Overall ranking:</p><ul><li><p><b>WhatsApp</b>, as noted, performed better this year, growing in popularity since late July, stabilizing at #9 by mid-October, and performing better during weekdays.</p></li><li><p><b>Telegram’s</b> best days were between July 16-18, during developments in the Ukraine war, including the Russian Black Sea Fleet leaving Crimea. Telegram is widely used by <a href="https://www.lemonde.fr/en/international/article/2024/10/24/on-telegram-russian-messengers-of-war_6730371_4.html"><u>thousands of Russian ‘war correspondents,’</u></a> as recently <a href="https://www.lemonde.fr/en/pixels/article/2024/08/26/panic-mounts-on-pro-war-russian-telegram-channels-after-pavel-durov-s-arrest_6721621_13.html"><u>reported</u></a>.</p></li><li><p><b>Eitaa</b>, the Iranian cloud-based messaging app, peaked at #185 in our Overall ranking on April 14, 2024, the day of <a href="https://en.wikipedia.org/wiki/April_2024_Iranian_strikes_against_Israel"><u>Iranian strikes against Israel</u></a>, which we covered in a <a href="https://blog.cloudflare.com/internet-traffic-analysis-iran-israel-april-attack/"><u>blog post on Internet trends</u></a>.</p></li><li><p><b>WeChat</b> spiked in our Overall ranking (#116) on July 30, 2024, coinciding with <a href="https://www.reuters.com/world/china/chinas-leaders-vow-step-up-policy-support-economy-2024-07-30/"><u>Chinese leaders pledging to tilt stimulus efforts towards consumers</u></a>.</p></li></ul>
    <div>
      <h2>Metaverse &amp; Gaming: Roblox leads, Steam grows, Oculus is out</h2>
      <a href="#metaverse-gaming-roblox-leads-steam-grows-oculus-is-out">
        
      </a>
    </div>
    <p>Gaming and metaverse both involve immersing players in other worlds. Leaving concepts aside, we’ve grouped gaming and the metaverse into the same category since 2022. Roblox dominated this category again in 2024, retaining its top spot, followed by Microsoft’s Xbox at #2. Epic Games, the creator of Fortnite, ranked third.</p>
    <div>
      <h3>Top 10 Metaverse &amp; Gaming services in 2024</h3>
      <a href="#top-10-metaverse-gaming-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Roblox</p></li><li><p>Xbox/Xbox Live</p></li><li><p>Epic Games/Fortnite</p></li><li><p>Steam</p></li><li><p>PlayStation</p></li><li><p>Electronic Arts</p></li><li><p>Blizzard</p></li><li><p>Riot Games/League of Legends</p></li><li><p>Minecraft</p></li><li><p>Garena</p></li></ol><p>Xbox/Xbox Live held #2 consistently, but Epic Games/Fortnite contested the position earlier in the year and again in November. Steam was a surprise this year, jumping to #4, ahead of PlayStation. It even rose to #2 in late March and early April, coinciding with the launch of a <a href="https://blog.playstation.com/2024/03/25/stellar-blade-demo-arrives-march-29/"><u>new demo</u></a>. Other platforms on the rise included Electronic Arts, Blizzard, and Riot Games/League of Legends.</p><p>Minecraft made the Top 10 at #9, performing best on July 5, 6, and 10, when it reached #7. Garena, the Singaporean game developer and publisher, entered the Top 10 for the first time. Oculus, Meta’s VR headset and metaverse service, dropped out of the Top 10 to #11, after ending 2023 at #5. It performed better earlier in the year (until April) and in late November.</p><p>Here’s the top chart across 2024:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1w3JyOWKJY6oMIGUrwve2A/8f6530eb7dc701bb645a578f66dc034e/BLOG-1033_16.png" />
          </figure><p>Here are other metaverse and gaming trends from our Overall ranking:</p><ul><li><p><b>Roblox’s</b> best day in 2024 was January 21, when it reached #20. The platform performed better on weekends, especially Sundays, similar to other popular gaming platforms like Xbox/Xbox Live, Epic Games/Fortnite, Steam, and PlayStation.</p></li><li><p><b>Epic Games/Fortnite’s</b> best day was January 1, 2024.</p></li><li><p><b>Xbox/Xbox Live</b> (#37) and <b>PlayStation</b> (#43) had their best day on November 2, 2024, the day before the <a href="https://www.gematsu.com/2024/07/aero-the-acro-bat-rascal-rival-revenge-coming-to-ps5-xbox-series-ps4-xbox-one-and-switch-on-november-1"><u>launch</u></a> of the new version of the classic game <a href="https://en.wikipedia.org/wiki/Aero_the_Acro-Bat"><u>Aero the Acro-Bat: Rascal Rival Revenge</u></a>.</p></li><li><p><b>Steam’s</b> best day was August 24, 2024, during the week of <a href="https://www.si.com/videogames/guides/gamescom-2024-all-publishers-developers"><u>Gamescom</u></a> 2024 in Germany. Several new games were <a href="https://www.pcgamer.com/new-games-2024-upcoming-pc-releases/"><u>released</u></a> that week, including Tactical Breach Wizards and Dustborn.</p></li><li><p><b>Minecraft</b>, celebrating its 15th anniversary in May 2024, had its best days on June 15 (#90), following the release of the <a href="https://www.minecraft.net/en-us/article/tricky-trials-update-official-release-date"><u>Tricky Trials game update</u></a> by Mojang Studios, and August 17 (#90), coinciding with the release of <a href="https://gamerant.com/minecraft-snapshot-24w33a-bundle-feature-patch-notes/?utm_source=chatgpt.com"><u>Minecraft: Java Edition Snapshot 24w33a</u></a>.</p></li></ul>
    <div>
      <h2>Financial services: Stripe keeps lead, Black Friday impact</h2>
      <a href="#financial-services-stripe-keeps-lead-black-friday-impact">
        
      </a>
    </div>
    <p>Financial services cover everything from traditional banking to cryptocurrencies and tax tools. Stripe, the Irish-American payment platform, kept its #1 spot for the second year, after overtaking PayPal in this category in 2023.</p>
    <div>
      <h3>Top 10 Financial Services in 2024</h3>
      <a href="#top-10-financial-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Stripe</p></li><li><p>TradingView</p></li><li><p>Alipay</p></li><li><p>PayPal</p></li><li><p>Nubank (BR)</p></li><li><p>Binance</p></li><li><p>Coinbase</p></li><li><p>Banco do Brasil</p></li><li><p>Bradesco Bank</p></li><li><p>Itau</p></li></ol><p>PayPal spent only a few days at #2 and a few others at #3 this year, but ultimately dropped to #4. TradingView, a platform specializing in tools for traders and investors, climbed to #2, followed by AliPay, the Chinese mobile and online payment platform, which secured #3.</p><p>Nubank, the Brazilian <a href="https://en.wikipedia.org/wiki/Neobank"><u>neobank</u></a> (only online) and considered to be the most <a href="https://www.bloomberg.com/news/articles/2024-05-28/nubank-dethrones-itau-to-become-most-valuable-latin-america-bank"><u>valuable</u></a>, <a href="https://www.financemagnates.com/fintech/payments/nubank-sets-sights-on-becoming-latin-americas-largest-fintech/"><u>one of the biggest</u></a> Latin America <a href="https://www.bloomberg.com/news/articles/2024-05-08/nubank-surpasses-100-million-clients-across-latin-america"><u>financial groups</u></a> and the <a href="https://qz.com/nubank-digital-bank-mexico-latin-america-1851096374"><u>world's biggest digital bank</u></a>, entered the Top 10 at #5, while Binance rose to #6 (up from #8 last year). Binance also peaked at #3 on November 12-13, following the US elections, as Bitcoin reached new highs. In the crypto space, Coinbase joined the Top 10 for the first time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Dg1CQsb2cf61l02gzkwjy/10d67fd6e85b2ec9c6a8982135c0affe/BLOG-1033_17.png" />
          </figure><p>Brazil’s <a href="https://coinlaw.io/online-banking-usage-statistics/"><u>growth</u></a> in online banking, <a href="https://seon.io/resources/neobanking-index/"><u>digital banks</u></a>, and <a href="https://www.thunes.com/insights/trends/how-digital-payments-drive-brazils-economic-transformation/"><u>payments</u></a> in Latin America has driven traditional banks to expand their digital presence. In 2024, Banco do Brasil, Bradesco, and Itaú performed well and rose into the Top 10, moving more than ever to the online space including in partnership with each other (as detailed in these two (<a href="https://clickpetroleoegas.com.br/bancos-tradicionais-com-os-dias-contados-banco-do-brasil-e-itau-estao-perdendo-terreno-para-os-bancos-digitais/"><u>1</u></a>), (<a href="https://br.cointelegraph.com/news/bradesco-joins-itau-and-banco-do-brasil-to-test-loans-with-rwa-tokens-based-on-cdbs-on-drex"><u>2</u></a>) articles in Portuguese).</p><p>And here’s the crypto perspective in this Financial services category:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RYeSg7btuzZZKQjg1S9RU/9181d0a9598d27d761004b29e3080c90/BLOG-1033_18.png" />
          </figure><p>Next, we highlight other financial services trends from our Overall ranking:</p><ul><li><p><b>Stripe’s</b> best days were just before Black Friday, on November 18-19 and November 25, reaching #81 during those days. Stripe performed better on weekends and maintained consistent rankings throughout the year.</p></li><li><p><b>PayPal</b> ranked higher around Black Friday week, peaking at #89 on November 21 and on Black Friday, November 29.</p></li><li><p>Brazilian bank <b>Nubank </b>performed best a few days before Carnival in Brazil (February 10-14), reaching #87 on February 1 and 3 and #92 on February 10. It also ranked well on Black Friday, November 29, peaking at #90.</p></li></ul>
    <div>
      <h2>Crypto: Binance is back (and the impact of US elections)</h2>
      <a href="#crypto-binance-is-back-and-the-impact-of-us-elections">
        
      </a>
    </div>
    <p>In addition to our Financial Services category, we evaluated cryptocurrency-related services specifically. Despite a few <a href="https://en.wikipedia.org/wiki/Cryptocurrency_bubble#2021%E2%80%932024_crash"><u>crashes over recent years</u></a>, the crypto sector continued to evolve in 2024, experiencing a late-year boom, as we explore below. Binance and Coinbase retained the top two spots, while OKX climbed to #3 this year.</p>
    <div>
      <h3>Top 10 Cryptocurrency services in 2024</h3>
      <a href="#top-10-cryptocurrency-services-in-2024">
        
      </a>
    </div>
    <ol><li><p>Binance</p></li><li><p>Coinbase</p></li><li><p>OKX</p></li><li><p>2miners.com</p></li><li><p>CoinMarketCap</p></li><li><p>Coingecko</p></li><li><p>Bybit</p></li><li><p>Exodus</p></li><li><p>Tonkeeper</p></li><li><p>NiceHash</p></li></ol><p>CoinGecko, a cryptocurrency data platform, dropped to #6, making way for OKX in late August, while new entrant 2miners.com rose to #4. CoinMarketCap ranked #5, followed by several dynamic new entrants in the Top 10:</p><ul><li><p><b>Bybit</b> (#7): A cryptocurrency exchange offering spot and derivatives trading.</p></li><li><p><b>Exodus</b> (#8): A user-friendly, multi-asset cryptocurrency wallet.</p></li><li><p><b>Tonkeeper</b> (#9): A secure wallet for managing Toncoin and related assets.</p></li></ul><p>NiceHash, a platform connecting cryptocurrency miners and buyers, performed better in 2023, but dropped from #5 to #10 this year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gsv2DRL58AbAl0wsVtNcy/49a79f64fab898eee1e29a8d893c57bc/BLOG-1033_19.png" />
          </figure><p>The US elections also had an apparent effect on the Overall ranking:</p><ul><li><p><b>Binance</b> entered the Top 100 for the first time on September 26, when Bitcoin <a href="https://www.binance.com/en/square/post/14124731668666"><u>surged past</u></a> $65,000, driven by positive US employment data and China’s announcement of economic stimulus measures. It peaked at #97 on November 13, following the US elections and Donald Trump’s victory, as <a href="https://www.wsj.com/finance/currencies/bitcoin-price-90000-charts-9141d469"><u>Bitcoin's price</u></a> surpassed $90,000 for the first time.</p></li><li><p><b>Coinbase’s</b> best day was November 21, reaching #131, as Bitcoin <a href="https://www.reuters.com/technology/bitcoin-breaks-95000-first-time-optimism-over-trump-crypto-plans-2024-11-21/?utm_source=chatgpt.com"><u>approached</u></a> $100,000 (which it surpassed on December 4, although our ranking only covers up to December 1).</p></li><li><p><b>OKX</b> peaked at #149 on November 22, and <b>CoinMarketCap</b> reached #176 on November 23.</p></li><li><p><b>CoinGecko’s</b> best day was November 11, the week following the US elections, when it climbed to #137.</p></li></ul>
    <div>
      <h2>Other overall trends: Olympics, Tesla, GitHub, and more</h2>
      <a href="#other-overall-trends-olympics-tesla-github-and-more">
        
      </a>
    </div>
    <p>Outside the categories we reviewed as part of the Year in Review, several notable trends emerged in our Overall ranking:</p><ul><li><p>The Paris 2024 Summer Olympics (July 26–August 11, 2024) appeared in our Top 250 Overall ranking, with <b>Olympics</b>-related sites debuting on July 27 (#195), the first full day of events. The peak was on July 30 (#177), driven by Léon Marchand’s swimming performances and the US women’s artistic gymnastics medal, as <a href="https://blog.cloudflare.com/paris-2024-olympics-recap/"><u>detailed in our Olympics blog post</u></a>. The final day in the Top 250 was August 11 (#217).
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7fw1wyOxSjdFH06m29o3Zv/359cdb5b089f0f2b1949a7e6eb9d46b1/BLOG-1033_20.png" />
          </figure><p></p></li><li><p><b>Spotify</b> ranked between #17 and #18 this year, performing best in October, spending most of the month at #17. However, as our list ends on December 1, we are not tracking the impact of the recently launched Spotify Wrapped.</p></li><li><p><b>Tesla</b> entered the Top 250 after October. Its best day was October 12 (#245), following the Cybercab robotaxi reveal. It also ranked higher on November 17 (#246), after a post-US elections <a href="https://www.cnbc.com/2024/11/17/stock-futures-open-little-changed-as-traders-await-nvidia-earnings-live-updates.html"><u>stock rally</u></a>.</p></li><li><p><b>GitHub’s</b> best day was November 8 (#31), coinciding with its <a href="https://github.blog/changelog/2024-11-08-organizations-can-now-enable-2fa-requirement-without-removing-non-compliant-members-ga/"><u>announcement</u></a> of enhanced security protocols, including mandatory <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/"><u>two-factor authentication (2FA)</u></a> for organizations.</p></li><li><p><b>NBA</b> appeared in the Top 250 until early March, with its best day on February 4, during <a href="https://champsorchumps.us/scores/nba/february-4-2024?utm_source=chatgpt.com"><u>these games</u></a>.</p></li><li><p><b>Nike</b> ranked only once, on March 26 (#236), during the annual Air Max Day celebration.</p></li><li><p><b>Brazil’s </b>official <b>Judiciary </b>site peaked at #105 on October 6, during the first round of municipal elections.</p></li><li><p><b>Ticketmaster</b> peaked at #169 on October 8, during a <a href="https://colitco.com/ticketmaster-global-outage-australian-f1-fans/"><u>major service disruption</u></a>, followed by October 9 (#170), the day Australian F1 tickets went on sale.</p></li><li><p><b>Intuit’s</b> best day was April 15 (#121), US Tax Day, consistent with <a href="https://blog.cloudflare.com/us-tax-day-2022-how-leaving-it-to-the-last-day-impacts-tax-sites/"><u>previous years</u></a>.</p></li><li><p><b>Weather.com</b> peaked at #61 between August 4–6, during <a href="https://en.wikipedia.org/wiki/Hurricane_Debby_(2024)"><u>Hurricane Debby</u></a>’s landfall in Florida.</p></li><li><p>The best day for <b>IMDb</b> (the Internet Movie Database)<b> </b>was January 1 (#220).</p></li><li><p><b>Example.com</b>, <a href="https://www.iana.org/help/example-domains"><u>a domain used for documentation purposes</u></a>, ranked between #24 and #56.</p></li></ul>
    <div>
      <h2>Insights by country/region</h2>
      <a href="#insights-by-country-region">
        
      </a>
    </div>
    <p>Regarding our newly country/region-specific Popular Internet Services overall lists (available on the Year in Review <a href="https://radar.cloudflare.com/year-in-review/2024#internet-services"><u>microsite</u></a>), we observed that Google ranked #1 in nearly all countries. However, there are other notable highlights we feel are worth sharing:</p>
    <div>
      <h3>Social Media</h3>
      <a href="#social-media">
        
      </a>
    </div>
    <ul><li><p><b>TikTok</b> was ranked #1 in Iraq, Kosovo, and Libya, and #2 in over 30 countries/regions across different continents. Examples include Azerbaijan, Bolivia, Belarus, Colombia, Costa Rica, Dominican Republic, Ecuador, Ghana, Indonesia, Kenya, Kuwait, Kazakhstan, Palestine, Ukraine, Venezuela, and South Africa.</p></li><li><p><b>Facebook</b> was #1 in Myanmar and #2 in 69 other countries. <a href="https://apnews.com/article/myanmar-censorship-virtual-private-network-facebook-79fb4cc0c3c4317844d0c00b0be1d9d1"><u>Myanmar</u></a>, where the government is known to block several websites, fell to the bottom of <a href="https://thediplomat.com/2024/10/military-ruled-myanmar-falls-to-bottom-of-internet-freedom-ranking/"><u>Freedom House’s Internet freedom ranking this year</u></a>.</p></li><li><p><b>Instagram</b> performed well in several countries, ranking among the top five in 18 countries/regions.</p></li><li><p><b>X</b> showed strong performance in Japan, where it is widely known, ranking #3 in 2024. It also ranked within the top 10 in 23 countries/regions.</p></li><li><p><b>Reddit</b> did not make the Top 10 in any country but performed best in Iceland (#26) and the United States (#28).</p></li><li><p><b>Kwai</b>, the social media platform, performed best in Brazil, ranking #7 overall.</p></li><li><p><b>Snapchat</b> performed well in Iraq and Kosovo (#4) and in Libya, Palestine, and Saudi Arabia (#5).</p></li></ul>
    <div>
      <h3>ChatGPT  </h3>
      <a href="#chatgpt">
        
      </a>
    </div>
    <ul><li><p><b>ChatGPT</b> did not reach the Top 10 in any country but made it into the Top 50 in 47 countries. It performed best in Singapore (#35), Kyrgyzstan, Sri Lanka (#36), Switzerland, Taiwan (#37), Ethiopia (#38), Japan, Iceland, and Haiti (#40).</p></li></ul>
    <div>
      <h3>Video streaming </h3>
      <a href="#video-streaming">
        
      </a>
    </div>
    <ul><li><p><b>YouTube</b> ranked in the Top 10 in 113 countries/regions, and reached the Top 5 in countries like Bangladesh (#4), and Armenia, Georgia, Guyana, Kenya, Peru, Qatar, Ukraine, and Uganda (#5).</p></li><li><p><b>Netflix</b> made the Top 10 in 17 countries/regions, performing best in Colombia and Ecuador (#8) and in Bolivia, Chile, Honduras, Nicaragua, and Trinidad and Tobago (#9).</p></li></ul>
    <div>
      <h3>Messaging </h3>
      <a href="#messaging">
        
      </a>
    </div>
    <ul><li><p><b>WhatsApp</b> made the Top 10 in 90 countries/regions and ranked in the Top 5 in over 35, reaching #4 in regions such as Latin America, Southeast Asia, and the Middle East, including Brazil, Colombia, Dominican Republic, Guyana, Indonesia, Laos, Peru, Pakistan, Paraguay, Uganda, and Venezuela.</p></li><li><p><b>LINE</b>, the messaging app by Naver, made the Top 10 in Thailand (#8).</p></li><li><p><b>Viber</b>, the messaging service, ranked in the Top 10 in Myanmar (#5), Ukraine (#9), and Bosnia and Herzegovina (#10).</p></li><li><p><b>Zalo.me</b>, the Vietnamese multi-platform messaging app, ranked #6 in Vietnam.</p></li><li><p><b>Yandex</b>, the Russian search engine and portal, ranked highest in Belarus and Russia (#3), as well as in Kazakhstan, Latvia, and Uzbekistan (#5).</p></li></ul>
    <div>
      <h3>Other trends </h3>
      <a href="#other-trends">
        
      </a>
    </div>
    <ul><li><p><b>Yahoo</b> appeared only in Japan’s Top 10.</p></li><li><p><b>Temu</b>, which showed notable growth in 2024, did not feature in the Top 10 in any country/region, but placed in the Top 30 in Oman (#18), Bahrain (#25), Kuwait (#26), the Dominican Republic, and Qatar (#27).</p></li><li><p><b>Roblox</b> appeared in the Top 10 in only three countries/regions: Philippines (#7), Kosovo (#8), and Trinidad and Tobago (#10).</p></li><li><p><b>Wikipedia</b> reached the #10 spot in Bangladesh and Ukraine.</p></li><li><p><b>Microsoft Office 365</b> performed best in Europe, ranking #4 in Slovenia, #5 in Portugal, and #6 in Austria, Belgium, Switzerland, Denmark, Norway, as well as in Australia and New Zealand.</p></li><li><p><b>Microsoft Outlook</b> showed strong performance in Australia (#7), Denmark, New Zealand, and Slovenia (#8).</p></li><li><p><b>Naver</b>, the South Korean platform and search engine, ranked #4 in South Korea.</p></li></ul>
    <div>
      <h2>Wrap up 2024: AI, e-commerce, and crypto tides</h2>
      <a href="#wrap-up-2024-ai-e-commerce-and-crypto-tides">
        
      </a>
    </div>
    <p>The Internet continues to shape how we socialize, work, and stay informed. Our 2024 rankings highlight the enduring dominance of platforms like Google, Facebook, and TikTok, alongside the rapid rise of generative AI services like OpenAI’s ChatGPT, with new players like GitHub Copilot and Claude making strides.</p><p>In social media, X shows declining influence, while Threads, Bluesky, and Mastodon are carving out niches but remain far from overtaking established platforms. Temu continues to rise in e-commerce, while Shein and AliExpress strengthened their global positions. In cryptocurrency, Binance regained momentum as Bitcoin surged, and newer players entered the scene. Gaming saw Roblox maintain its lead, with Steam experiencing notable growth.</p><p>Events like the Paris 2024 Summer Olympics, US elections, and war-related attacks also shaped Internet trends, emphasizing how global events influence online activity. These trends mirror real-world developments and set the stage for an interconnected, tech-driven future.</p><p>On a final note, creating rankings is a team effort that comes with its own challenges and requires careful attention and frequent updates. We welcome your <a><u>feedback</u></a> and suggestions for new categories to explore in the Year in Review.</p><p><i>(Our data scientist, Sabina Zejnilovic, played a crucial role in gathering the Internet services data.)</i></p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <guid isPermaLink="false">1bFqI2J5pfAs7dEpRp8auV</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
    </channel>
</rss>