Allow List | A list of items (typically websites, IP addresses, email addresses, etc.) that are allowed to access the system. |
Attack Score | A number between 1 (potentially malicious) and 99 (potentially clean) used to classify the likelihood that incoming requests are malicious. Allows you to detect new attack techniques before they become public. |
Block List | A list of items (typically websites, IP addresses, email addresses, etc.) that are blocked from accessing the system. |
Content Objects | Content objects are any binary parts of the request body that do not match any of these content types: text/html, text/x-shellscript, application/json, text/csv, or text/xml. |
Exposed Credentials | Exposed credentials are sensitive authentication information that has been exposed in some way (e.g., due to misconfiguration, data breach, or simple human error) allowing other parties to access digital resources. Credentials may include usernames, passwords, API keys, authentication tokens, or private keys. |
Firewall | A firewall is a security system that monitors and controls network traffic based on a set of security rules. |
Mitigated Requests | Requests that have had a terminating action (such as block or challenge) applied. |
Paranoia Level | Classifies rules based on their aggressiveness according to the OWASP managed rule set. |
Rate Limiting | Rate limiting is a technique used in computer systems to control the rate at which requests are processed. It can be used as a security measure to prevent attacks or limit resource usage in source servers. |
Threat Score | A score from 0 (zero risk) to 100 (high risk) that classifies visitor IP reputation. IP reputation is calculated based on Project Honeypot, external public IP information, and internal threat intelligence from WAF managed rules and DDoS. |