All Products
Search
Document Center

Anti-DDoS:Query advanced mitigation logs

Last Updated:Mar 31, 2026

The Adv. Mitigation Logs page shows how your advanced mitigation sessions have been consumed. Each row represents a DDoS attack event and shows whether it used a session, the attack's peak bandwidth, and the events that occurred during the attack window. Use this page to audit session usage and review historical attack activity.

Prerequisites

Before you begin, make sure that:

  • Advanced mitigation sessions are included free of charge with your instance, or you have purchased global advanced mitigation sessions

  • Your instance is one of the supported types:

    ProductSupported plans
    Anti-DDoS Pro (the Chinese mainland)Pro
    Anti-DDoS Premium (outside the Chinese mainland)Insurance mitigation plan, Unlimited mitigation plan, Sec-CMA (including Sec-CMA 1.0, Sec-CMA (Basic), Sec-CMA 2.0 (Insurance), and Sec-CMA 2.0 (Unlimited))

Query limits

LimitDetails
Query time rangeLast 90 days
View event detailsAvailable only for attacks within the last 30 days. For older events, the View Events button is dimmed and event details cannot be accessed.

View advanced mitigation logs

  1. Log on to the Anti-DDoS Proxy console.

  2. In the top navigation bar, select the region of your instance.

    • Anti-DDoS Proxy (Chinese Mainland): Select Chinese Mainland.

    • Anti-DDoS Proxy (Outside Chinese Mainland): Select Outside Chinese Mainland.

  3. In the left-side navigation pane, choose Investigation > Adv. Mitigation Logs.

  4. On the Adv. Mitigation Logs page, select the target instance and the time range for your query.

    The log table displays the following fields:

    FieldDescription
    Protection TimeThe time range during which the DDoS attack event occurred.
    InstanceThe ID of the instance to which the attacked asset's public IP address is added.
    Peak VolumeThe peak bandwidth of the DDoS attack.
    Included EventsThe number of blackhole filtering events or scrubbing events that occurred during the attack window.
    StatusWhether the attack event consumed an advanced mitigation session. Used means the attack has ended and a session was consumed. In Use means the attack is ongoing and a session is currently being consumed.
    ActionsFor attacks within the last 30 days, click View Events to open the Attack Analysis page and review event details. For more information, see View information on the Attack Analysis page.

What's next