Overview
- The 40‑second barrage hit 10.6 billion packets per second and was autonomously filtered by Cloudflare’s mitigation systems.
- Cloudflare said the target was a single IP address belonging to an unnamed European network infrastructure company.
- The company has not identified the operator and says the attack may have involved the Aisuru botnet, which remains unconfirmed.
- Telemetry showed traffic from over 404,000 unique source IPs across more than 14 ASNs with non‑spoofed addresses in a UDP carpet‑bomb pattern hitting roughly 31,000 destination ports per second and peaking near 47,000.
- The incident extends a 2025 pattern of escalating DDoS peaks following 11.5 Tbps and 7.3 Tbps events, with extreme packet rates posing acute challenges for routers, firewalls and load balancers.