Languages
use cases
Modernize applications
Modernize security
Modernize networks
CxO topics
Industries
Resources
Engage
products
SASE and workspace security
Application security
Application performance
Networking
plans & pricing
Global services
documentation
Products
Artificial Intelligence
Compute
Media
Storage & database
Plans & Pricing
Partnership Types
Build
Explore
Support
Company info
Trust, Privacy, & Safety
Public Interest
Network Flow
How it works
Use cases
Cloud-based network flow monitoring
Network Flow provides end-to-end network traffic visibility, real-time alerts, and DDoS attack identification — all from a single, integrated dashboard.
Someone from Cloudflare will be in touch with you shortly.
In submitting this form, you agree to receive information from Cloudflare related to our products, events, and special offers. You can unsubscribe from such messages at any time. We never sell your data, and we value your privacy choices. Please see our Privacy Policy for information.
With real-time traffic data, you can quickly confirm your security policies, identify new vulnerabilities, and analyze shifting traffic patterns — as soon as they arise.
Our powerful DDoS mitigation services monitor your network for threats and notify you of incoming attacks.
View all alerts and insights within a single dashboard — allowing you to easily analyze your network traffic across different cloud environments.
Try out Network Flow for free in less than 30 minutes with our easy onboarding wizard and quick setup process
HOW IT WORKS
With Network Flow, you can send your network flow data from your routers to Cloudflare’s network edge — spanning over 330 locations worldwide.
We receive and parse your data, then automatically provide analytics and alerts on your network traffic patterns, helping you instantly improve your security posture and visibility.
Top Network Flow use cases
Provision virtual network services on the fly and get combined analytics across all network flow types.
See exactly what threats are aimed at your network and apply our automatic attack mitigation services via Magic Transit.
Maintain end-to-end visibility across all of your internal network traffic — and boost your monitoring, troubleshooting, and maintenance efforts with detailed analytics.
Blog
Developer docs