RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats.
It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
RequestShield helps security teams detect and mitigate threats by analyzing access logs in real-time. It’s ideal for:
/admin
)requests
, geoip2
, abuseipdb
).Use this API key in the config.py file under the [API] section to enable abuse database lookups.
config.py
to set: # DEFAULT (compile)
config_file["DEFAULT"] = {
"geoip_db": str(path / "GeoLite2-Country.mmdb"),
"log_file": str(path / "./logs/access.log"),
"max_requests_per_minute": int(changeme),
"risky_country": str("changeme"),
"unusual_status_codes": str("changeme")
}
# API (compile)
config_file["API"] = {
"abuseipdb_api_key": "changeme"
}
# WHITELIST (compile)
config_file["WHITELIST"] = {
"ips": "changeme"
}
For more information click here.
Nmap (Network Mapper) is a free tool that helps you find devices on a network,…
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…
While file extensions in Linux are optional and often misleading, the file command helps decode what a…
The touch command is one of the quickest ways to create new empty files or update timestamps…
Handling large numbers of files is routine for Linux users, and that’s where the find command shines.…
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy…