RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats.
It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
RequestShield helps security teams detect and mitigate threats by analyzing access logs in real-time. It’s ideal for:
/admin
)requests
, geoip2
, abuseipdb
).Use this API key in the config.py file under the [API] section to enable abuse database lookups.
config.py
to set: # DEFAULT (compile)
config_file["DEFAULT"] = {
"geoip_db": str(path / "GeoLite2-Country.mmdb"),
"log_file": str(path / "./logs/access.log"),
"max_requests_per_minute": int(changeme),
"risky_country": str("changeme"),
"unusual_status_codes": str("changeme")
}
# API (compile)
config_file["API"] = {
"abuseipdb_api_key": "changeme"
}
# WHITELIST (compile)
config_file["WHITELIST"] = {
"ips": "changeme"
}
For more information click here.
What Are Bash Comments? In Bash scripting, comments are notes in your code that the…
When you write a Bash script in Linux, you want it to run correctly every…
Introduction If you’re new to Bash scripting, one of the first skills you’ll need is…
What is Bash Scripting? Bash scripting allows you to save multiple Linux commands in a file and…
When it comes to automating tasks on Linux, Bash scripting is an essential skill for both beginners…
Learn how to create and use Bash functions with this complete tutorial. Includes syntax, arguments,…