Release v2.7.0 - April, 2025
Overview
This release introduces Suspicious IP Throttling, a comprehensive set of security features that safeguard applications against unauthorized access, brute force attacks, and malicious IP activities.
This release introduces enhanced detection, throttling, and blocking mechanisms to ensure trusted access while mitigating suspicious behavior.
Key Functionality
Trusted IPs
Allows administrators to configure a whitelist of trusted IP addresses.
Users connecting from trusted IPs can bypass security challenges.
Ensures a smooth login experience for corporate networks or approved remote IPs.
Anomaly Detection Check
Monitors incoming traffic against historical user activity patterns.
If a request comes from an IP previously marked as blocked or suspicious, the system will automatically deny access.
Prevents attackers from reusing compromised IPs.
Brute Force Attack Check
Detects multiple failed login attempts from the same IP.
Automatically marks the IP as suspicious and triggers CAPTCHA or IP blocking.
Reduces risk of credential stuffing and password spraying attacks.
Activity Event Criteria
Provides fine-grained control over login failure thresholds.
Admins can configure:
Event Type (e.g.,
user_login_failure
)Time Range (seconds) – period in which attempts are counted
Attempts – number of failures allowed
Cooling Period (seconds) – block duration after threshold is reached
Example: If 3 failed login attempts occur within 30 seconds, the IP is blocked for 10 minutes.
External IP Threat Providers
Integrates with third-party threat intelligence databases.
If an IP is flagged as malicious in the external DB, the system will automatically block it.
Ensures proactive defense against known global attack sources.
Last updated