RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential security threats.
It uses factors like geolocation, abuse history, request volume, and suspicious request paths to assign a risk score to each IP, providing actionable insights for security monitoring.
RequestShield helps security teams detect and mitigate threats by analyzing access logs in real-time. It’s ideal for:
/admin)requests, geoip2, abuseipdb).Use this API key in the config.py file under the [API] section to enable abuse database lookups.
config.py to set: # DEFAULT (compile)
config_file["DEFAULT"] = {
"geoip_db": str(path / "GeoLite2-Country.mmdb"),
"log_file": str(path / "./logs/access.log"),
"max_requests_per_minute": int(changeme),
"risky_country": str("changeme"),
"unusual_status_codes": str("changeme")
}
# API (compile)
config_file["API"] = {
"abuseipdb_api_key": "changeme"
}
# WHITELIST (compile)
config_file["WHITELIST"] = {
"ips": "changeme"
} For more information click here.
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…
Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…
Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…
Social media is a key part of our daily lives, with millions of users sharing…
What Are Data Brokers? Data brokers are companies that collect, aggregate, and sell personal information,…