- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
This topic describes how to use Attacker Explorer to investigate and block Flagged Attackers.
Datadog Application Security Management (ASM) identifies attackers as suspicious and flagged. With Attacker Explorer, you can investigate and take action against the attackers.
Suspicious Attackers: IP addresses that have sent attack traffic in the last 24 hours up to a maximum threshold.
Flagged Attackers: IP addresses that have sent attack traffic, exceeding the threshold of Suspicious Attackers, in the last 24 hours. Flagged Attackers should be reviewed and blocked.
To understand the difference between the different explorers, review these approaches:
Each explorer focuses on a specific use case:
To start reviewing attackers, go to Attacker Explorer.
There are two sections to the Attacker Explorer:
Click on any row to view the history and attributes of the IP.
IPs can be blocked or added to the Passlist from the IP drawer.
To block an individual IP temporarily or permanently, do the following:
Block
on the row.You can select multiple IPs and block them temporarily or permanently using the Attacker Explorer’s Compare and Block option.
Compare and Block provides metrics about the IPs to help you block with safety and confidence. For example, Similarity Overview and Activity, described later in this topic.
To compare and block IPs in bulk, do the following:
Filter the list of Attackers with a search or facets.
Select multiple IPs.
Select the Compare and Block option.
In the following example, the selected IPs are from the same location and appear to be related. The Compare and Block option opens the Block selected attackers view, showing metrics and attributes for the selected IP addresses.
To block attackers, click Block.
When you select the Compare and Block option, the Block selected attackers view opens, showing metrics and attributes for the selected IP addresses.
The Block selected attackers view metrics are explained in the following sections.
Contains the IPs selected from the explorer. Deselecting an IP removes it from the metrics sections and Block action.
Each column exists to help block with confidence and safety. The provided attributes are also used by ASM’s Attacker Similarity feature.
The time scope for activity is 30 days.
The signals associated with the IP addresses over the selected time.
The traces associated with the IP addresses over the selected time.
Benign traffic is sampled APM traffic which are traces without business logic or attack traffic detections.
Attack traffic is all ASM traces, inclusive of business logic.
This adds the IP addresses to the Denylist for the specified duration.