Help Center>
Anti-DDoS Service>
FAQs>
CNAD Basic (Anti-DDoS) FAQs>
About Anti-DDoS>
How Do I Determine My Workloads Are Under an Attack?
Updated on 2024-03-07 GMT+08:00
How Do I Determine My Workloads Are Under an Attack?
To check whether a public IP address is attacked, perform the following operations:
- For details about how to query attack traffic information and anomaly events within 24 hours, see Method 1: Viewing Monitoring Reports.
- For details about how to query information about public IP addresses attacked within one month, see Method 2: Viewing the Security Report.
Method 1: Viewing Monitoring Reports
- Log in to the management console.
- Select a region in the upper part of the page, click
in the upper left corner of the page, and choose . The Anti-DDoS page is displayed.
- Click the Public IP Addresses tab, locate the row that contains the IP address of which you want to view its monitoring report, and click View Monitoring Report.
Figure 1 Viewing a monitoring report
- Check whether there are attack traffic and anomaly events.
- On the Traffic tab page, check whether there is attack traffic displayed in the corresponding time range. If there is, the public IP address is attacked.
- Check whether there are abnormal events in the event list at the bottom. If there are abnormal events, the public IP address is attacked.
Figure 2 Monitoring reports
Method 2: Viewing the Security Report
- Log in to the management console.
- Select a region in the upper part of the page, click
in the upper left corner of the page, and choose . The Anti-DDoS page is displayed.
- Click the Security Report tab, select a time range, and check whether the queried public IP address is in Top 10 Attacked Public IP Addresses.
If the public IP address is in Top 10 Attacked Public IP Addresses, the public IP address is attacked.
Figure 3 Security report
Parent topic: About Anti-DDoS
About Anti-DDoS FAQs
- What Is the Million-level IP Address Blacklist Database?
- How Will Anti-DDoS Be Triggered to Scrub Traffic?
- What Are the Restrictions of Using Anti-DDoS?
- What Is the Protection Capacity of Anti-DDoS?
- What Data Can Be Provided by Anti-DDoS?
- Which Regions Does Anti-DDoS Support?
- What Can Be Protected by Anti-DDoS?
- Can Anti-DDoS Be Used Across Clouds or By Multiple Accounts?
- How Do I Determine My Workloads Are Under an Attack?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbotmore