On the Events page, you can view events generated for blocked attacks and logged only attacks. You can view details of WAF events, including the time an event occurs, origin server IP address, geographic location of the origin server IP address, malicious load, and hit rule.
The website to be protected has been connected to WAF.
Parameter |
Parameters |
---|---|
Event Type |
Type of the attack. By default, All is selected. You can view logs of all attack types or select an attack type to view corresponding attack logs. |
Protective Action |
The options are Block, Log only, and Verification code. |
Source IP Address |
Public IP address of the web visitor/attacker By default, All is selected. You can view logs of all attack source IP addresses, select an attack source IP address, or enter an attack source IP address to view corresponding attack logs. |
URL |
Attacked URL. |
Event ID |
ID of the event. |
Parameter |
Description |
Example Value |
---|---|---|
Time |
When the attack occurred |
2021/02/04 13:20:04 |
Source IP Address |
Public IP address of the web visitor/attacker |
None |
Geolocation |
Location where the IP address of the attack originates from |
- |
Domain Name |
Attacked domain name |
www.example.com |
URL |
Attacked URL |
/admin |
Malicious Load |
The location or part of the attack that causes damage or the number of times that the URL was accessed. NOTE:
|
id=1 and 1='1 |
Event Type |
Type of attack |
SQL injection |
Protective Action |
Protective actions configured in the rule. The options are Block, Log only, and Verification code. NOTE:
If an access request matches a web tamper protection rule, information leakage prevention rule, or data masking rule, the protective action is marked as Mismatch. |
Block |
Status Code |
HTTP status code returned on the block page. |
418 |
To view event details, click Details in the Operation column of the event list.