In 2024, attack traffic primarily originates from regions such as the U.S. and China, where exposed infrastructure (e.g., un-hardened reflection sources) is often exploited by attackers as a staging ground for reflection attacks. Although the attack traffic in these regions is larger, it does not mean that the attacks come directly from these regions. Enterprises should strengthen infrastructure protection, especially to prevent common reflection protocols (e.g., DNS, NTP, etc.) from being abused, take measures to close unnecessary ports, harden service authentication, and deploy necessary traffic filtering policies to reduce the risk of Internet services becoming the source of reflection attacks. Meanwhile, for globally deployed application services, it is recommended to adopt a distributed access architecture and protection mechanism, and localize traffic processing to isolate the risk of attacks between different regions as much as possible.