Should your customers come from data centers? Not typically. It could be helpful to exclude some of the traffic sources to improve the security of applications and APIs.
With Wallarm, you can block traffic originated from a specific country based on compliance requirements,or block Tor exit nodes and popular proxy servers frequently generating a lot of malicious requests.
Wallarm also identifies and displays in the Wallarm Console the IP address sources, i.e countries, data centers, VPN, and residential proxies.
Read more about the new blocking features on our documentation portal.
We rely on the data from 3rd party providers including IP2Location which is a partner of Wallarm.
APIs are one of the most important technologies in digital business ecosystems. And yet, the…
API security is becoming more important by the day and skilled practitioners are in high…
Is an AI-to-AI attack scenario a science fiction possibility only for blockbusters like the Terminator…
Lefteris Tzelepis, CISO at Steelmet /Viohalco Companies, was shaped by cybersecurity. From his early exposure…
This is a predictions blog. We know, we know; everyone does them, and they can…
The attack landscape has been dynamic following the disclosure of the React Server Components RCE…