The Monitor tab

Monitor tab provides an overview of the real-time logged attacks by WAF and displays top five IPs, attack categories, and URIs. It offers timeline graph to represent the peak throughput. The page attributes can be customized for sites and number of days.


Attacks blocked by Custom Rules

It shows a count of created Custom Rules, Attacks Blocked due to customs rules, and Vulnerabilities detected in pen testing.


Attacks By IP

  1. Attacks By IP table displays logged IP addresses from where the attacks are encountered on the website, IP Reputation whether that IP is good or bad, attacks count, Severity of the attack, Country name from which country the attacks are happening and Details.



  2. In Attacks By IP table, find the IP of which information needs to be viewed and then click Details to the respective IP to view the details in detail.

  3. Attack from IP pop-up window will appear displaying violations details of that particular IP.



  4. Mouse over on nodes in the graph, which will show event name, date & time and count respectively.



  5. Click Whitelist IP to allow traffic from the IP or click Blacklist IP to drop traffic from the IP or click Blacklist Country to drop traffic from the country.



  6. To view attack payload of the particular attack category in the pop-up window, find the category of which attack payload needs to be viewed and then click Details to the respective category to view the payload. Attack Payload pop-up will appear.


Attacks By Category

  1. Attacks By Category table displays logged attacks Category, attacks count, Severity of the attack, and Details.



  2. In Attacks By Category table, find the category of which information needs to be viewed and then click Details to the respective attack category to view the details in detail.




  3. Attack Categories Details pop-up window will appear displaying violations details of that particular attack category.

  4. Mouse over on nodes in the graph, which will show event name, date, time and count, respectively.



  5. To view attack payload of the particular IP Address in the pop-up window, find the IP of which attack payload needs to be viewed and then click Details to the respective IP Address to view the payload. Attack Payload pop-up will appear.



Attacks By URI

  1. Attacks By URI table displays logged URIs from where the attacks are happening on the website, Attacks count, Severity of the attack and Details.




  2. In Attacks By URI table, find the URI of which information needs to be viewed and then click Details to the respective URI to view the details in detail.

  3. Attack URI Details pop-up window will appear displaying violations details of that particular URI.



  4. Click Whitelist URI to allow traffic from the URI.



  5. Mouse over on nodes in the graph, which will show event name, date, time and count, respectively.



  6. To view attack payload of the particular IP Address in the pop-up window, find the IP of which attack payload needs to be viewed and then click Details to the respective IP Address to view the payloadAttack Payload pop-up will appear.



How did we do?