Newbie517762 Lv5Posted 27 Dec 2023 09:31
  
Hi,

Analyze the firewall logs for the public IP to find the attack's source IP.
Also, check the "Web Application Protection_Best Practice" link.
This attack protection includes application hiding, password protection, privilege control, data leak prevention, HTTP request anomaly detection, and scanner blocking.

I Can Help:

Change

Moderator on This Board

0
2
4

Started Topics

Followers

Follow

67
14
3

Started Topics

Followers

Follow

3
0
2

Started Topics

Followers

Follow

1
131
3

Started Topics

Followers

Follow

Board Leaders