All Products
Search
Document Center

Anti-DDoS:Query operation logs

Last Updated:Mar 31, 2026

Operation logs record key actions taken on your Anti-DDoS Proxy instance, such as instance purchases, blackhole filtering deactivations, and packet capture task management. You can query logs from the console for up to 180 days.

Covered operations

Not all actions are logged — only the following operation types are recorded.

TypeRecorded operations
IPPurchase and release of instances; deactivation of blackhole filtering; traffic blocking and unblocking; changes of the scrubbing mode for Layer 4 traffic; changes of the mitigation mode for HTTP flood attacks; changes of the burstable protection bandwidth
Anti-DDoS planConsumption of Anti-DDoS plans
ECSReleases of the IP addresses of ECS instances
Burstable clean bandwidthEnabling and disabling of the burstable clean bandwidth feature; changes of the metering method; changes of the burstable clean bandwidth
Burstable QPSEnabling and disabling of the burstable QPS feature; changes of the metering method
Analysis on captured packetsCreation of packet capture tasks; deletion of packet capture tasks; deletion of packet capture files; automatic deletion of packet capture files upon expiration

Prerequisites

Before you begin, ensure that you have:

View operation logs

  1. Log on to the Anti-DDoS Proxy console.

  2. In the top navigation bar, select the region of your instance.

    • Anti-DDoS Proxy (Chinese Mainland): select Chinese Mainland.

    • Anti-DDoS Proxy (Outside Chinese Mainland): select Outside Chinese Mainland.

  3. In the left-side navigation pane, choose Investigation > Operation Logs.

  4. On the Operation Logs page, specify a type and a time range, then click the search icon to view matching logs.