Gcore WAAP protects your web application by blocking traffic from well-known malicious IP addresses.
We constantly collect, update, and validate these IP addresses, adding malicious IPs to the blocklist. This allows you to block, challenge, or allow traffic from highly suspected entities.
This policy group is available in the Pro and Enterprise plans.
You can review the IP reputation policy group and enable or disable its policies in the Gcore Customer Portal:
1. Navigate to WAAP > Domains.
2. Find the domain where you want to configure the policy group and click the domain name to open it.
3. On the Policies page that opens, click IP reputation to expand the section and adjust the policies.
All IP reputation policies are enabled by default. To disable a policy, turn on the toggle near that policy.
TOR nodes are commonly used for web anonymity, but can also be used by hackers, scrapers, and spammers to crawl and hack web applications.
Use JavaScript validation to verify traffic originating from the TOR network. This helps prevent potential anonymity and security risks associated with TOR usage within web applications.
Proxy networks are commonly used for web anonymity, but can also be used by hackers, scrapers, and spammers to crawl and hack web applications.
Use JavaScript validation to verify traffic from known proxy networks. This provides enhanced visibility and security against potential risks associated with proxy usage within web applications.
Organic human traffic is unlikely to come from IP spaces belonging to hosting providers. Instead, this traffic typically comes from infected servers controlled by hackers.
Use JavaScript validation to verify traffic from hosting services and commercial cloud providers. This enhances your application security by mitigating potential risks associated with such services within web applications.
Virtual Private Networks (VPNs) are commonly used for web anonymity, but can also be used by hackers, scrapers, and spammers to crawl and hack web applications.
Validate traffic originating from VPNs using JavaScript. This provides increased visibility and security against potential risks associated with VPN usage within web applications.
Use JavaScript validation to verify traffic coming from IP addresses associated with malicious automated agents (bots).
Validate traffic coming from high-risk NAT ranges using JavaScript. These ranges are calculated based on historical web behavior detected by a machine learning classifier.
The IPs on this list are known to be malicious or spam. When an IP with a negative reputation is detected, validate the incoming traffic using JavaScript.
Organic human traffic is unlikely to originate from IP spaces belonging to CDN companies. When such traffic is detected, validate it using JavaScript.
Was this article helpful?