GET
/
waap
/
v1
/
domains
/
{domain_id}
/
requests
/
{request_id}
/
details
curl --request GET \
  --url https://api.gcore.com/waap/v1/domains/{domain_id}/requests/{request_id}/details \
  --header 'APIKey: <api-key>'
{
  "id": "96763b8fb655e9f18a2e04097b704e39-458959",
  "path": "/new_index",
  "method": "GET",
  "action": "block",
  "rule_id": "86",
  "rule_name": "SQL Injection",
  "user_agent": {
    "full_string": "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.1.1599.114 Safari/537.36 Puffin/4.5.0IT",
    "client": "Firefox",
    "client_version": "44.3",
    "base_browser": "Chrome",
    "base_browser_version": "47.0.2526.83",
    "os": "Android",
    "device": "Amazon Kindle Fire HDX 7",
    "device_type": "mobile",
    "cpu": "intel",
    "rendering_engine": "AppleWebKit",
    "client_type": "Custom Browser"
  },
  "network": {
    "client_ip": "116.83.107.125",
    "country": "IL",
    "organization": {
      "name": "InfoWeb(Fujitsu Ltd",
      "subnet": "116.83.0.0-116.83.127.255"
    }
  },
  "request_time": "2022-05-31 02:10:17.000",
  "reference_id": "ad07c06f19054e484974fa22e9fb6bb1",
  "content_type": "text/html; charset=UTF-8",
  "scheme": "HTTP",
  "http_status_code": 200,
  "http_version": "1.1",
  "response_time": "3",
  "request_headers": {
    "ACCEPT": "*/*",
    "ACCEPT-ENCODING": "gzip, deflate",
    "CONNECTION": "keep-alive",
    "HOST": "oih.jung.fblcloud-qa.net",
    "USER-AGENT": "Firefox/44.3",
    "X-FORWARDED-FOR": "169.54.212.219",
    "X-FORWARDED-PORT": "80",
    "X-FORWARDED-PROTO": "http"
  },
  "incident_id": "9f06152824394345",
  "request_type": "block",
  "session_request_count": "1",
  "domain": "example.com",
  "requested_domain": "example.com",
  "query_string": "q=select%20user%20from%20master..a",
  "result": "passed",
  "traffic_types": [
    "sanctioned",
    "policy_blocked"
  ],
  "pattern_matched_tags": [
    {
      "tag": "sql",
      "display_name": "SQL Injection",
      "description": "This client attempted insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data, etc.",
      "field": "uri",
      "field_name": "q",
      "pattern_name": "SQL Injection Prevention",
      "pattern_value": "select user from master..",
      "execution_phase": "access"
    }
  ],
  "common_tags": [
    {
      "tag": "injectionattack",
      "display_name": "Injection Attack",
      "description": "Multiple injection attempts were detected."
    }
  ]
}

Authorizations

APIKey
string
header
required

API key for authentication.

Path Parameters

domain_id
integer
required

The domain ID

request_id
string
required

The request ID

Response

200
application/json

Successful Response

Request's details used when displaying a single request.