Details
From the Attacker Database, Trusted List, and Response Overview 'More Info' allows you look at in-depth behaviour of a specific item, such as actions taken by a specific IP address
Last updated
From the Attacker Database, Trusted List, and Response Overview 'More Info' allows you look at in-depth behaviour of a specific item, such as actions taken by a specific IP address
Last updated
This report creates an in-depth traffic report for a specific item within either your Attacker Database , Trusted List or any attacker fingerprint selected from the Response Overview. A breakdown of the traffic from the item is shown including where the requests came from, what proportion of the requests had mitigating actions applied and a breakdown of those requests displayed in stacked vertical bar charts. There is also an option to quickly block/unblock or trust a request.
At the bottom of the page, there is a "Decision Logic" table which shows the attack signals and attacker activity associated with the item, if applicable.
If the item is also contained within a Know Attack Signal list that the datastream is subscribed to, a message appears on the page.
Observe how the request was handled by Netacea over a period of time
See additional stats for the request e.g. how many IP address were associated with the User Agent
Quickly mitigate a request from the screen
Observe what attack signals and activities were associated with any detected threats, if applicable
Date Ranges
Datastream(s)
Control Name
Options
Date range
Ability to choose the timeframe to report on
Datastream
This indicates the Datastream this item has been seen on
The time series bar chart shows behaviour of the selected item over time. Underneath the graph, you also get the count of all IP Addresses, User Agents, User IDs, Data Centres and Organisations originating from the selected item.
The "Decision Logic" table outlines identified attack signals and associated attacker activity which categorised using the Blade Framework. This means that clicking on either one of the `Attack Phases
`, Attack Techniques
or Attack Tactics
, a new tab opens showing Blade's description.