Attack Monitoring
Overview
The Attacks section provides visibility into malicious activities detected by the WAF. It helps users monitor attack sources, review blocked or allowed malicious requests, and investigate security incidents.
This section includes three main views:
Events – summarizes attack activity grouped by source IP
Logs – displays every individual malicious request
Detail View – shows full information for a specific attack event
Attacks – Events View
The Events tab provides a high-level overview of detected attacks, grouped by attacker IP address.
For each source IP, users can see:
Source IP address and country
Targeted application
Number of detected attacks
Attack duration
Time when the attack started
Filtering options allow users to narrow down results by:
IP address
Domain
Port
Time range
This view is useful for:
Identifying repeated attackers
Detecting large-scale or ongoing attack waves
Quickly assessing the severity of an attack source
Attacks – Logs View
The Logs tab provides request-level visibility into every detected malicious request.
For each request, users can review:
Action taken by the WAF (Blocked or Allowed)
Detected attack type (e.g., XSS, SQL Injection)
Full request path containing the malicious payload
Attacker’s IP address
Timestamp of the request
Logs can be filtered by:
Action (Blocked / Allowed / All)
Port
IP address
Domain
Attack type
Time range
This view is commonly used for:
Deep threat investigation
Analyzing false positives
Fine-tuning WAF security rules
Attack Detail
The Attack Detail view provides full information for a single malicious request.
It displays:
Full URL that triggered detection
Action taken (Blocked or Allowed)
Attack type
Attacker IP address and geolocation
Detected payload
Detection module
Timestamp
Attack ID
Below the summary information, the interface shows the raw HTTP request, including:
HTTP method
Request headers
Request payload
Depending on system configuration, a Response tab may also be available.
This view is used for:
Verifying whether the WAF correctly detected and handled the attack
Understanding the structure and intent of malicious payloads
Collecting evidence for security incident reports
Investigating repeated or advanced attack patterns
Last updated

