Skip to content

Dashboard

Wallarm automatically collects metrics on processed traffic and represents them on the widgets in the Dashboard section of Wallarm Console. The dashboard allows any user to analyze malicious and legitimate traffic trends and get application vulnerability status for a period of time.

Metrics are presented in the following widgets:

  • Statistics for the current month and the speed of request encountering

  • Normal and malicious traffic

  • Attack types

  • API protocols

  • Attack sources

  • Attack targets

  • Vulnerability Scanner

You can filter widget data by applications and time period. By default, widgets represent statistics on all applications for the last month.

Any widget allows to open the event list the statistics have been collected on.

Getting started with Wallarm

If you registered the Wallarm account in the US Cloud, you would be able to explore core Wallarm features in the Playground with read-only access to the Wallarm Console sections. Use it to try out major features of the Wallarm platform without having to deploy any components to your environment.

The Dashboard section also includes the Get started button for new users. When you click the button, you will get a list of helpful product discovery options with the following among them:

  • The Onboarding tour option will provide you with deployment options supported by Wallarm and links to relevant deployment instructions.
  • The Wallarm Playground option will forward you to the Wallarm Console playground with read-only access to its sections. This option is available only for users of the US Cloud.

Statistics for the current month and the speed of request encountering

The widget displays the following data:

  • Monthly request quota specified in the subscription plan

  • The number of detected hits and blocked ones during the current month

  • The real-time speed at which requests and hits are encountered

Current month statistics

Normal and malicious traffic

The widget displays the following data:

  • The amount of traffic

  • The number of requests, hits, and incidents

  • The estimated cost of attacks for the attacker: the value considers the approximate cost of IP address renting and an attack duration

Normal and malicious traffic

Attack types

This widget displays the top types of detected attacks which helps to analyze the patterns of malicious traffic and attacker behavior.

Using this data, you can analyze the vulnerability of your services to different attack types and take appropriate measures to improve service security.

Attack types

API protocols

This widget displays statistics on API protocols used by attackers. Wallarm can identify the following API protocols:

  • GraphQL

  • gRPC

  • WebSocket

  • REST API

  • SOAP

  • XML-RPC

  • JSON-RPC

  • WebDAV

Using the widget, you can analyze malicious requests sent via certain protocols and assess the vulnerability of your system to such requests.

Attack types

Attack sources

This widget displays the statistics on the attack source groups:

  • Location of attack sources

  • Source types, e.g. Tor, Proxy, VPN, etc.

  • Service providers, e.g. AWS, GCP, etc.

This data can help to define abusive attack sources and enable the blocking of requests originating from them by using grey or black lists of IP addresses.

You can view data on each source group on separate tabs.

Attack sources

Attack targets

This widget displays domains and applications being attacked the most. The following metrics are displayed for each object:

  • The number of detected incidents

  • The number of detected hits

  • Trends: change in the hit number for a selected period and for the same previous period. For example: if you check the statistics for the last month, the trend displays the difference in the hits number between the last and previous months as a percentage

You can view data on domains and applications on separate tabs.

Attack targets

Vulnerability Scanner

The Scanner widget shows statistics on vulnerabilities detected in public assets:

  • The number of vulnerabilities of all risk levels detected over the selected period

  • The number of active vulnerabilities of all risk levels at the end of the selected period

  • Changes in the number of vulnerabilities of all risk levels for the selected period

Scanner widget