Last update:2026-02-05 11:03:21
Based on a large number of attack samples captured by CDNetworks, through feature engineering and expert rule analysis modeling strategies, Flood Shield 2.0 can generate accurate IP threat intelligence applicable to different scenarios. You can use threat intelligence to monitor traffic initiated by suspected malicious IPs, and if necessary, enable interception as a supplemental protection measure.
Threat intelligence mainly includes the following types:
- Specific Attack Risk IPs: High-risk IPs that have been blocked by the Whole Site Protection platform and are continuously engaging in attack activities, such as DDoS attacks, web vulnerability exploits, malicious crawlers, and malicious scanning.
- Industry Attack Risk IPs: High-risk IPs that have been blocked by the Whole Site Protection platform and are persistently targeting specific industries.
- Attack Resource Risk IPs: IP resources frequently utilized by hackers to launch various attacks. This intelligence is gathered externally, with IP types mainly including proxy servers, cloud service providers, IDC providers, and open-source black IP reputation databases.
.