{"_id":"55e4c9333325e60d007fbeb8","category":{"_id":"55e4c701177b6e0d003330fa","pages":["55e4c718177b6e0d003330fb","55e4c7ea40cda60d003bad38","55e4c823e252ac0d00303a54","55e4c9333325e60d007fbeb8","55e4c97540cda60d003bad3e","55e4c9903325e60d007fbebc","55e4c9c33325e60d007fbebe","55e4c9ce40cda60d003bad41"],"project":"55db8f8f1a91690d007ad975","version":"55db8f901a91690d007ad978","__v":8,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-08-31T21:28:33.497Z","from_sync":false,"order":2,"slug":"dashboard","title":"Dashboard"},"__v":11,"githubsync":"","parentDoc":null,"project":"55db8f8f1a91690d007ad975","user":"55dc702d7fa0290d00559106","version":{"_id":"55db8f901a91690d007ad978","project":"55db8f8f1a91690d007ad975","__v":17,"createdAt":"2015-08-24T21:41:36.034Z","releaseDate":"2015-08-24T21:41:36.034Z","categories":["55db8f901a91690d007ad979","55db9856b3d6540d00886426","55dc751b00a8811900c230e3","55dc766255be9f21004ee250","55dc769200a8811900c230ed","55e4c701177b6e0d003330fa","55f4915caf0bc71900a53130","55f491b2be9c2b2100f0635d","560b22739c7be70d00100bd8","57488c53e8c6a420000b729c","574cefd95953e20e00f40f9f","5798edfd7700d30e00ad250c","579ac88234b5fd0e00b9e140","57c81c6d690c200e0047b72e","57d9b8fbda17c30e003897f1","57d9b90e608ea00e00f358d8","57d9b91cda17c30e003897f4"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"1.0.0","version":"1.0"},"updates":[],"next":{"pages":[],"description":""},"createdAt":"2015-08-31T21:37:55.695Z","link_external":false,"link_url":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":4,"body":"[block:callout]\n{\n  \"type\": \"info\",\n  \"body\": \"Keep in mind that this menu and all the options are also available per app. Just click on your app name to expand the list, and see the same time frame for all your applications.\"\n}\n[/block]\nNow that you have all the necessary information about the attacks on your application, you can get more information about the attackers themselves.\n\nAt the top of this section, you'll see the number of attackers during the selected period. As with any chart in the dashboard, you can click on the small dots to drill down on the specific day or hour​.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/e8d2f5a-Attackers.png\",\n        \"Attackers.png\",\n        1414,\n        471,\n        \"#1d454a\"\n      ]\n    }\n  ]\n}\n[/block]\nIf you scroll down, you'll see a report in the same form you had in the overview, and the attacks section, showing information as date and time, username, IP, ​number of attacks, threat types, and a linear graph about the timing of the attacks with some grouping and search functions.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/4173d35-Screen_Shot_2017-10-02_at_12.42.14_PM.png\",\n        \"Screen Shot 2017-10-02 at 12.42.14 PM.png\",\n        2076,\n        552,\n        \"#f1f2f2\"\n      ]\n    }\n  ]\n}\n[/block]\nIf you click on an attacker username or ip​, it will show a granular view of what this hacker tried to do within your application.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/FhVsP74RwW92s2ynKDHH_2015-09-02_1113.png\",\n        \"2015-09-02_1113.png\",\n        \"1179\",\n        \"504\",\n        \"#23a284\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nThe screenshot above is another graph providing the same information but showcased differently: perfect to create a report, or for visual people. \n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/n67otSCTYqkThcsCY4EA_2015-09-02_1406.png\",\n        \"2015-09-02_1406.png\",\n        \"1163\",\n        \"502\",\n        \"#4db0ab\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nIf you scroll down, you get a chart highlighting the number of treats, and their duration over time. If you mouse over the colored bubble, you'll get more details.​\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/2JBLqKERToazJo4HsH9q_2015-09-02_1408.png\",\n        \"2015-09-02_1408.png\",\n        \"1163\",\n        \"504\",\n        \"#4eb0ac\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nAgain, you can click on the bubble to get more details about those specific attacks. It will take you to the detailed view of the attack section. The third part​ of that section gives you a quick overview of request count by threat type: the bigger the square, the more attempt the hacker tried with this threat. It may help you prioritize your code review, and fix the most critical one first.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/MZDV9zGRRdKNzrlvDojC_2015-09-02_1419.png\",\n        \"2015-09-02_1419.png\",\n        \"1163\",\n        \"506\",\n        \"#e34b3b\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]\nAt the end of this section, there is the same detailed report you get in all sections, sort by attacks done by this attacker. It provides the same information than the attacks report.​\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/0uBNMateRqjFnGslomVQ_2015-09-02_1421.png\",\n        \"2015-09-02_1421.png\",\n        \"1179\",\n        \"503\",\n        \"#1fa588\",\n        \"\"\n      ]\n    }\n  ]\n}\n[/block]","excerpt":"","slug":"attackers","type":"basic","title":"Attackers"}
[block:callout] { "type": "info", "body": "Keep in mind that this menu and all the options are also available per app. Just click on your app name to expand the list, and see the same time frame for all your applications." } [/block] Now that you have all the necessary information about the attacks on your application, you can get more information about the attackers themselves. At the top of this section, you'll see the number of attackers during the selected period. As with any chart in the dashboard, you can click on the small dots to drill down on the specific day or hour​. [block:image] { "images": [ { "image": [ "https://files.readme.io/e8d2f5a-Attackers.png", "Attackers.png", 1414, 471, "#1d454a" ] } ] } [/block] If you scroll down, you'll see a report in the same form you had in the overview, and the attacks section, showing information as date and time, username, IP, ​number of attacks, threat types, and a linear graph about the timing of the attacks with some grouping and search functions. [block:image] { "images": [ { "image": [ "https://files.readme.io/4173d35-Screen_Shot_2017-10-02_at_12.42.14_PM.png", "Screen Shot 2017-10-02 at 12.42.14 PM.png", 2076, 552, "#f1f2f2" ] } ] } [/block] If you click on an attacker username or ip​, it will show a granular view of what this hacker tried to do within your application. [block:image] { "images": [ { "image": [ "https://files.readme.io/FhVsP74RwW92s2ynKDHH_2015-09-02_1113.png", "2015-09-02_1113.png", "1179", "504", "#23a284", "" ] } ] } [/block] The screenshot above is another graph providing the same information but showcased differently: perfect to create a report, or for visual people. [block:image] { "images": [ { "image": [ "https://files.readme.io/n67otSCTYqkThcsCY4EA_2015-09-02_1406.png", "2015-09-02_1406.png", "1163", "502", "#4db0ab", "" ] } ] } [/block] If you scroll down, you get a chart highlighting the number of treats, and their duration over time. If you mouse over the colored bubble, you'll get more details.​ [block:image] { "images": [ { "image": [ "https://files.readme.io/2JBLqKERToazJo4HsH9q_2015-09-02_1408.png", "2015-09-02_1408.png", "1163", "504", "#4eb0ac", "" ] } ] } [/block] Again, you can click on the bubble to get more details about those specific attacks. It will take you to the detailed view of the attack section. The third part​ of that section gives you a quick overview of request count by threat type: the bigger the square, the more attempt the hacker tried with this threat. It may help you prioritize your code review, and fix the most critical one first. [block:image] { "images": [ { "image": [ "https://files.readme.io/MZDV9zGRRdKNzrlvDojC_2015-09-02_1419.png", "2015-09-02_1419.png", "1163", "506", "#e34b3b", "" ] } ] } [/block] At the end of this section, there is the same detailed report you get in all sections, sort by attacks done by this attacker. It provides the same information than the attacks report.​ [block:image] { "images": [ { "image": [ "https://files.readme.io/0uBNMateRqjFnGslomVQ_2015-09-02_1421.png", "2015-09-02_1421.png", "1179", "503", "#1fa588", "" ] } ] } [/block]