Overview
IAM
- Account
- Users
- API Tokens
CDN
- IP addresses list
- CDN service
- Origins
- CDN resources
- CDN activity logs
- Log forwarding
- Log viewer
- Logs uploader
- Tools
- Rules
- Rule templates
- Purge history
- SSL certificates
- CA certificates
- CDN Statistics
- Advanced analytics
- Origin shielding
- Let's Encrypt certificates
Managed DNS
- Analyze
- Locations
- Lookup
- Metrics
- Pickers
- DNS Clients
- Zones
- DNSSEC
- RRsets
Cloud
- Bare Metal
- Container as a Service
- Cost Reports
- DDOS Protection
- File Shares
- Firewalls
- Floating IPs
- Function as a Service
- GPU Cloud
- IP Ranges
- Images
- Inference Instances
- Instances
- Load Balancers
- Logging
- Managed Kubernetes
- Managed PostgreSQL
- Networks
- Placement Groups
- Projects
- Quotas
- Regions
- Registry
- Reservations
- Reserved IPs
- Routers
- SSH Keys
- Secrets
- Service Endpoints
- Snapshot Schedules
- Snapshots
- Tasks
- User Actions
- User Role Assignments
- Volumes
Security
- Event Logs
- BGP announces
- Security Templates
- Profiles
FastEdge
- Apps
- Binaries
- FastEdge Clients
- FastEdge Secrets
- Stats
- FastEdge Templates
WAAP
- WAAP Service
- Domains
- Policies
- Analytics
- Custom Page Sets
- Custom Rules
- Firewall Rules
- Advanced Rules
- Tags
- Network Organizations
- API Discovery
- IP Spotlight
- Security Insights
Web Security
- Billing Statistics
- Resources
Video Streaming
- Streams
- Overlays
- Broadcasts
- Restreams
- Videos
- Subtitles
- Directories
- Playlists
- QualitySets
- Players
- AI
- Streaming Statistics
Object Storage
- Notifications
- Key
- Location
- Storage
- Storage Statistics
Analytics
Get Request Details
Retrieves all the available information for a request that matches a given request id
GET
/
waap
/
v1
/
domains
/
{domain_id}
/
requests
/
{request_id}
/
details
Copy
Ask AI
curl --request GET \
--url https://api.gcore.com/waap/v1/domains/{domain_id}/requests/{request_id}/details \
--header 'APIKey: <api-key>'
Copy
Ask AI
{
"id": "96763b8fb655e9f18a2e04097b704e39-458959",
"path": "/new_index",
"method": "GET",
"action": "block",
"rule_id": "86",
"rule_name": "SQL Injection",
"user_agent": {
"full_string": "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.1.1599.114 Safari/537.36 Puffin/4.5.0IT",
"client": "Firefox",
"client_version": "44.3",
"base_browser": "Chrome",
"base_browser_version": "47.0.2526.83",
"os": "Android",
"device": "Amazon Kindle Fire HDX 7",
"device_type": "mobile",
"cpu": "intel",
"rendering_engine": "AppleWebKit",
"client_type": "Custom Browser"
},
"network": {
"client_ip": "116.83.107.125",
"country": "IL",
"organization": {
"name": "InfoWeb(Fujitsu Ltd",
"subnet": "116.83.0.0-116.83.127.255"
}
},
"request_time": "2022-05-31 02:10:17.000",
"reference_id": "ad07c06f19054e484974fa22e9fb6bb1",
"content_type": "text/html; charset=UTF-8",
"scheme": "HTTP",
"http_status_code": 200,
"http_version": "1.1",
"response_time": "3",
"request_headers": {
"ACCEPT": "*/*",
"ACCEPT-ENCODING": "gzip, deflate",
"CONNECTION": "keep-alive",
"HOST": "oih.jung.fblcloud-qa.net",
"USER-AGENT": "Firefox/44.3",
"X-FORWARDED-FOR": "169.54.212.219",
"X-FORWARDED-PORT": "80",
"X-FORWARDED-PROTO": "http"
},
"incident_id": "9f06152824394345",
"request_type": "block",
"session_request_count": "1",
"domain": "example.com",
"requested_domain": "example.com",
"query_string": "q=select%20user%20from%20master..a",
"result": "passed",
"traffic_types": [
"sanctioned",
"policy_blocked"
],
"pattern_matched_tags": [
{
"tag": "sql",
"display_name": "SQL Injection",
"description": "This client attempted insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data, etc.",
"field": "uri",
"field_name": "q",
"pattern_name": "SQL Injection Prevention",
"pattern_value": "select user from master..",
"execution_phase": "access"
}
],
"common_tags": [
{
"tag": "injectionattack",
"display_name": "Injection Attack",
"description": "Multiple injection attempts were detected."
}
]
}
Authorizations
API key for authentication.
Response
200
application/json
Successful Response
Request's details used when displaying a single request.
Was this page helpful?
Copy
Ask AI
curl --request GET \
--url https://api.gcore.com/waap/v1/domains/{domain_id}/requests/{request_id}/details \
--header 'APIKey: <api-key>'
Copy
Ask AI
{
"id": "96763b8fb655e9f18a2e04097b704e39-458959",
"path": "/new_index",
"method": "GET",
"action": "block",
"rule_id": "86",
"rule_name": "SQL Injection",
"user_agent": {
"full_string": "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.1.1599.114 Safari/537.36 Puffin/4.5.0IT",
"client": "Firefox",
"client_version": "44.3",
"base_browser": "Chrome",
"base_browser_version": "47.0.2526.83",
"os": "Android",
"device": "Amazon Kindle Fire HDX 7",
"device_type": "mobile",
"cpu": "intel",
"rendering_engine": "AppleWebKit",
"client_type": "Custom Browser"
},
"network": {
"client_ip": "116.83.107.125",
"country": "IL",
"organization": {
"name": "InfoWeb(Fujitsu Ltd",
"subnet": "116.83.0.0-116.83.127.255"
}
},
"request_time": "2022-05-31 02:10:17.000",
"reference_id": "ad07c06f19054e484974fa22e9fb6bb1",
"content_type": "text/html; charset=UTF-8",
"scheme": "HTTP",
"http_status_code": 200,
"http_version": "1.1",
"response_time": "3",
"request_headers": {
"ACCEPT": "*/*",
"ACCEPT-ENCODING": "gzip, deflate",
"CONNECTION": "keep-alive",
"HOST": "oih.jung.fblcloud-qa.net",
"USER-AGENT": "Firefox/44.3",
"X-FORWARDED-FOR": "169.54.212.219",
"X-FORWARDED-PORT": "80",
"X-FORWARDED-PROTO": "http"
},
"incident_id": "9f06152824394345",
"request_type": "block",
"session_request_count": "1",
"domain": "example.com",
"requested_domain": "example.com",
"query_string": "q=select%20user%20from%20master..a",
"result": "passed",
"traffic_types": [
"sanctioned",
"policy_blocked"
],
"pattern_matched_tags": [
{
"tag": "sql",
"display_name": "SQL Injection",
"description": "This client attempted insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data, etc.",
"field": "uri",
"field_name": "q",
"pattern_name": "SQL Injection Prevention",
"pattern_value": "select user from master..",
"execution_phase": "access"
}
],
"common_tags": [
{
"tag": "injectionattack",
"display_name": "Injection Attack",
"description": "Multiple injection attempts were detected."
}
]
}
Assistant
Responses are generated using AI and may contain mistakes.