Shared Host Active Attack Blocking

Active attack blocking works with small business hosting plans to help businesses limit the attack surface from web application attacks. Our tools will monitor your location for attacks. At the first sign of an attack our tools can be configured to alert or, actively block the offending set of IP addresses from further harming your location. If you would like to learn more about active attack scanning for your host, please feel free to

Active Attack Blocking & How it Works

Active attack blocking works with tools developed by, Network Defense Solutions, Inc. to scan and ingest your logs (if available through your host). If any of our tools detect web application based attacks they will either block the offending IP address indefinitely or alert the administrators (via e-mail alert) that a threat actor is attempting to access your web location.

If active attack blocking is enabled, weekly Network Defense Solutions will analyze any IP addresses which may have made contact with your location and provide a report based on the threat actors IP address. Report information includes geographic location, if other users within our threat defense ecosystem have seen it before and, if it has been part of any recent breaches.

Customers may also choose to remove aging IP addresses or other threat actors if they have not been seen within X amount of days.



What is Included

Active Attack Blocking includes a set of tools that run both server-side and client-side for the customer enrolled within the active attack blocking program. Customers can modify, create or, delete blocking rules as well as backup blocking rules to deploy on other web sites that the customer maintains. The customer will be given desktop tools which connect to the systems and act as an easy to use WYSIWYG (What you see is what you get) editor to help you quickly create rules for your web site.

Weekly or, monthly reporting can also be created for the customers enrolled within the program to review and see where attacks are originating from. This can also assist in creating larger policies for blocking, logging or both!



If you would like more information about the program or how it can help protect your web location, please feel free to reach out. Our turn around time is normally 1-2 hours and one of our representatives would be glad to assist you.



{loadformmaker 16}

Login Form