Cloudflare Radar2025 Year in Review for Timor-Leste

The Cloudflare Radar 2025 Year in Review shines a light on the Internet's patterns and trends as observed through Cloudflare's global network.

We encourage you to explore the data below, and you can also review key findings in the Overview and Popular Internet Services blog posts.

Traffic

Internet Traffic Growth

Internet connectivity is critically important to everyday communication, commerce, entertainment, and transportation. Our ongoing reliance on the Internet is reflected in continued global Internet traffic growth.

This trend line starts mid-January, allowing for Internet activity to normalize following the return to work and school after the New Year.

Traffic

Internet Services

Generative AI continued its meteoric rise in 2025, as Claude, Perplexity, and Gemini are now the main rivals to ChatGPT. On social media, after the juggernauts Facebook, Instagram, and TikTok, Snapchat is now outperforming X, while in the metaverse, Roblox still holds its crown. Our category-specific lists represent the zeitgeist of Internet activity throughout the year and include both familiar and unexpected names. Overall, Google remains at the top of the ranking, but Instagram, and YouTube climbed in our top 10 in 2025.

The ranking methodology used here is based on aggregate data from 1.1.1.1.

Traffic

IPv4 Traffic Distribution

A Hilbert curve has unique visualization properties that make it useful for surveying the Internet's IPv4 address space.

Cloudflare Radar allows you to see Internet traffic at a country/region or autonomous system level. By using a Hilbert curve, we can get a holistic look at where traffic is coming from across the entire IPv4 Internet. The visualization below shows aggregate traffic to Cloudflare from January 1 to December 2, 2025, with IP addresses aggregated at a /20 level. That means that at the highest zoom level, each cell represents traffic from 4,096 IPv4 addresses.

Zoom and drag to explore areas of interest. If an ASN is selected, prefix shading is relative to the traffic seen for that ASN, not global traffic as a whole.

Traffic

Post-Quantum Encryption

"Post-quantum" (PQ) refers to a set of cryptographic techniques designed to protect encrypted data from "harvest now, decrypt later" attacks by adversaries that have the ability to capture and store current data for future decryption by sufficiently advanced quantum computers. The Cloudflare Research team has been working on post-quantum cryptography since 2017, and regularly publishes updates on the state of the post-quantum Internet.

In October 2022, we enabled post-quantum key agreement on our network by default, but use of it requires that the browser support it as well. We have observed rapid growth in usage as browsers have enabled default support for it.

Adoption & Usage

iOS vs Android

Apple's iOS and Google's Android remain the two most widely used mobile device operating systems. However, adoption varies significantly around the world: peak Android traffic share is 97%, while peak iOS traffic share is 70%.

Here we look at the distribution of iOS and Android across traffic seen by Cloudflare in Timor-Leste during 2025. Traffic from other mobile operating systems was negligible and is not included in this analysis.

Visualization type

Adoption & Usage

HTTP Versions

HTTP (HyperText Transfer Protocol) is the core protocol that the web relies upon. HTTP/1.0 was first standardized in 1996, HTTP/1.1 in 1999, and HTTP/2 in 2015. The most recent version, HTTP/3, was completed in 2024, and runs on top of QUIC, a new transport protocol. Using QUIC allows it to mitigate the effects of packet loss, establish connections more quickly, and provide encryption by default.

Here we look at the distribution of HTTP versions across request traffic seen by Cloudflare from Timor-Leste during 2025.

Visualization type

Adoption & Usage

Search Engine Market Share

Protecting and accelerating websites and applications for millions of customers, Cloudflare is in a unique position to measure search engine market share data. Our methodology uses the Referer header to identify the search engine sending traffic to customer sites and applications. Search engine market share data is presented as an overall aggregate, as well as broken out by device type and operating system.

For additional details, please refer to the quarterly Search Engine Referral Reports on Cloudflare Radar.

Adoption & Usage

Browser Market Share

Protecting and accelerating websites and applications for millions of customers, Cloudflare is in a unique position to measure browser market share. Our methodology uses information from the User Agent and Client-Hints HTTP headers to identify the browser making content requests, along with the associated operating system. Browser market share data is presented as an overall aggregate, as well as broken out by device type and operating system.

For additional details, please refer to the quarterly Browser Market Share Reports on Cloudflare Radar.

Connectivity

Internet Outages

The Internet plays an increasingly significant role in people's lives, but not everyone has reliable Internet access. Outages can result from events like natural disasters and cable cuts, or can occur when a government deliberately shuts down Internet connectivity.

The Cloudflare Radar Outage Center tracks these Internet disruptions, and uses Cloudflare traffic data for insights into their scope and duration.

Connectivity

IPv6 Adoption

Cloudflare has long advocated for IPv6 adoption because it plays a critical role in the scalability of the Internet. Due to the limited availability of IPv4 address space, some cloud providers have chosen to levy what is effectively an IPv4 tax for the use of IPv4 addresses. (Spoiler: Cloudflare can help customers avoid having to pay it.)

We analyzed requests for dual-stacked content that were made over IPv6 during 2025 to calculate aggregate IPv6 adoption rates at a country/region level. Network-level IPv6 adoption rates can be found on Cloudflare Radar.

Visualization type

Connectivity

Internet Quality

Although Internet connections are most often marketed and sold with a focus on download speed, upload speed and latency are also important as we spend more time using videoconferencing and livestreaming tools. Even with high speed connections, high latency can significantly impact Internet connection quality and the user experience.

Here we present a distribution of download speed, upload speed, idle latency, and loaded latency measurements from speed.cloudflare.com tests taken by users in Timor-Leste throughout 2025.

Connectivity

Mobile vs Desktop

In 2025, it is estimated that over 70% of the world's population uses a smartphone, and in many countries, they are the primary means of Internet access.

This year, we found that nearly 117 countries/regions had a majority of traffic from mobile devices.

Here we look at the distribution of mobile and desktop device usage across traffic seen by Cloudflare from Timor-Leste during 2025.

Visualization type

Security

Mitigated Traffic

Customers may choose to mitigate traffic for a variety of reasons, even if the traffic isn't suspected to be malicious. However, for malicious traffic, DDoS mitigation techniques and Web Application Firewall (WAF) Managed Rules are two of the most effective defences against Application Layer (Layer 7) attacks. These attacks can knock an unprotected web site offline or attempt to steal customer data.

Here we show the percentage of traffic from Timor-Leste mitigated by Cloudflare on a daily basis during 2025, as well as the percentage of traffic mitigated as a DDoS attack or by WAF Managed Rules.

Security

Bot Traffic Sources

Bot traffic describes any non-human Internet traffic, and monitoring bot traffic can help spot potential malicious activities. Of course, bots can be helpful too, and Cloudflare maintains a list of verified bots to help keep the Internet healthy.

Looking at bot traffic observed by Cloudflare in 2025 at a country/region level, we found that there was significant variability in the concentration of bot activity by network.

Security

Most Attacked Verticals

While we can't predict which vertical attackers will target the most, we do know that they all get attacked. No matter the vertical, your best bet is to keep your guard up.

The bars represent the percentage of mitigated traffic from Timor-Leste that is targeting each category, calculated on a weekly basis. The default view shows the summary for the year.

Security

Routing Security

One important step towards improving Internet routing security has been the adoption of Resource Public Key Infrastructure (RPKI), a cryptographic method of signing records that associate a BGP route announcement with the correct originating AS number (ASN). This enables network providers to validate BGP announcements and reject invalid routes.

Over the course of 2025, the global share of RPKI valid IPv4 routes grew to 53.9%, up 3.9 percentage points from 2024.

The trends presented are based on routes announced by autonomous systems in Timor-Leste.