diff --git a/src/content/docs/radar/reference/quarterly-ddos-reports.mdx b/src/content/docs/radar/reference/quarterly-ddos-reports.mdx index ffd015364da6254..73eaf0bef41eab8 100644 --- a/src/content/docs/radar/reference/quarterly-ddos-reports.mdx +++ b/src/content/docs/radar/reference/quarterly-ddos-reports.mdx @@ -20,7 +20,7 @@ Find the latest quarterly DDoS threat reports in the [**Reports**](https://radar Cloudflare's main DDoS system, the [DDoS Managed Ruleset](/ddos-protection/managed-rulesets/), generates real-time fingerprints for DDoS attacks that it automatically detects and mitigates. While there may be multiple fingerprints generated for a single DDoS attack, or attack campaign, we count unique fingerprints that resulted in mitigation to get an understanding of the number of DDoS attacks for a given period of time. While in some cases, we can see an 'explosion' of fingerprints due to randomized DDoS attacks, for the most part, this figure gives us a reliable indicator to track over time. -Currently, the number of DDoS attacks does not take into consideration the [Advanced TCP Protetion system](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) or the [Advanced DNS Protection system](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). We also don't take into account any mitigations by customer-created rules or configuration. +Currently, the number of DDoS attacks does not take into consideration the [Advanced TCP Protection system](/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/) or the [Advanced DNS Protection system](/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/). We also don't take into account any mitigations by customer-created rules or configuration. ### How we calculate ransom DDoS attack insights