Enterprise Threat Monitor
Phishing
Malware
Command & Control
Fullscreen
Light Theme
Print
Threat Breakdown - Last Hour
Breakdown by Threat Type
Average Threats Per Hour Trends
-
- avg threats per hour, all time
The Threat Log lists a sample of the of malware, phishing, and command
and control threats in the previous hour. Hover over any of the
items in the log to get information on the threat type and the source and destination locations of the
requests.
This Donut Chart breaks down the malware, phishing, and command and
control threats mitigated by Akamai in the last hour. This
threat profile can change rapidly. The column chart on the left shows the longer-term enterprise threat
trends going back up to 30 days.
This Column Chart breaks down the malware, phishing, and command and
control threats mitigated by Akamai over time. You can
toggle the length of time using the links below. The available options are 24 hours, 7 days and 30 days.
Please refer to the donut chart next to the column chart to get an idea of what threats we’ve observed in
the past hour.
The charts below take a deeper look at the malware, phishing, and command and control
threats mitigated by Akamai over time. The bullet
charts show threats per hour for each time period, the vertical white line is the all-time average for this
threat, the inner bar represents the average threats per hour – the color - green or red - indicates
whether or not the value for that time period is above or below the all-time average. The sparklines show a
linear trend for the threat type for the given time period.
The threat map shows the geographic location of where a user request is being made from and the intended
geographic destination location if the request had not been blocked by Enterprise Threat Protector. The
arrows are colored to indicate the type of threat being displayed. The dots are a a representative sample
of the source locations that have made a request or requests for malicious domains. To show a threat arrow,
double click on the dot.