CDNetworks Documentation Flood Shield 2.0 User Guide Threat Intelligence (Value Added Services)

Threat Intelligence (Value Added Services)

Last update:2026-02-05 11:03:21

Based on a large number of attack samples captured by CDNetworks, through feature engineering and expert rule analysis modeling strategies, Flood Shield 2.0 can generate accurate IP threat intelligence applicable to different scenarios. You can use threat intelligence to monitor traffic initiated by suspected malicious IPs, and if necessary, enable interception as a supplemental protection measure.

Threat intelligence mainly includes the following types:

  • Specific Attack Risk IPs: High-risk IPs that have been blocked by the Whole Site Protection platform and are continuously engaging in attack activities, such as DDoS attacks, web vulnerability exploits, malicious crawlers, and malicious scanning.
  • Industry Attack Risk IPs: High-risk IPs that have been blocked by the Whole Site Protection platform and are persistently targeting specific industries.
  • Attack Resource Risk IPs: IP resources frequently utilized by hackers to launch various attacks. This intelligence is gathered externally, with IP types mainly including proxy servers, cloud service providers, IDC providers, and open-source black IP reputation databases.

To Configure Threat Intelligence

  1. Log in to the CDNetworks Console, find the security product in use under Subscribed Products.
  2. Go to the Protection Configuration > Security Policy page.
  3. Find the hostname for which you want to configure security policies, click [ Product Maintenance ] Cloud Security Product Maintenance Announcement.
  4. Go to the Threat Intelligence tab. If this policy is off, turn it on.

Using Threat Intelligence

  • Find the type of threat intelligence you wish to handle and select the action you need to execute.
  • Click Publish Changes to make the configuration take effect.

Add Threat Intelligence IP/ASN/Request Header Whitelist

  • Click Whitelist Configuration to display the whitelist configuration entry.
  • Enter the IP/IP segment, ASN, or request header whitelist that needs to be bypassed on the page. Multiple conditions are combined using the ‘AND’ operator. Click Save.
  • Click Publish Changes to make the configuration take effect.
Is the content of this document helpful to you?
Yes
I have suggestion
Submitted successfully! Thank you very much for your feedback, we will continue to strive to do better!