Querying Attack Event Logs by ID
Function Description
This API is used to query attack event logs by ID.
URI
Request
Request parameters
None
Response
Parameter |
Type |
Description |
---|---|---|
id |
String |
Specifies the event ID. |
time |
Integer |
Specifies the attack time since Unix Epoch in milliseconds. |
policy_id |
String |
Specifies the policy ID. |
sip |
String |
Specifies an attack source IP address. |
host |
String |
Specifies an attacked domain name. |
host_id |
String |
Specifies a domain name ID. |
url |
String |
Specifies the attacked URL, excluding a domain name. |
attack |
String |
Specifies the attack type. |
rule |
String |
Specifies the ID of the matched rule. |
payload |
String |
Specifies the hit load. |
action |
String |
Specifies the protective action.
|
payload_location |
String |
Specifies the location in the request packet where the attack occurs. The options are as follows: body, url, params, and header. |
request_line |
String |
Specifies the attack request method. |
headers |
Object |
Specifies the attack request header. |
cookie |
String |
Specifies the cookie. |
body |
String |
Specifies the body of an attack request. |
Example
Event ID 0000-0000-0000-13-56ef71f5745764348192f844658dd144 is used as an example.
{ "id": "0000-0000-0000-13-56ef71f5745764348192f844658dd144", "time": 1499817600, "policy_id": "xxx", "sip": "X.X.1.1", "host": "a.com", "host_id": "123", "url": "/login", "attack": "sqli", "rule": "20001", "payload": "1 or 1=1", "action": "block", "payload_location": "params", "request_line": "GET / ", "headers": { "Connection": "keep-alive", "User-Agent": "curl" }, "cookie": "sid=123; uid=456", "body": "user=admin&pass=abc123" }
Status Code
For details about error status codes, see Status Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot