Skip to main content

Access Statistics

Access Statistics analyzes results of all access requests from various perspectives to understand bot attack status.

Overview

Access Statistics Overview

The access statistics screen displays the following information:

  • Access request result comparison (block/detect/pass)
  • Top 10 bot access pages
  • Top 10 bot access IPs
  • Bot attack trend chart

Query Period Configuration

You can set the query period at the top:

SettingDescription
Start Date/TimeQuery start time
End Date/TimeQuery end time

Access Request Result Comparison

Total Access Requests

Displays the total number of access requests during the query period and distribution by result. Access statistics classifies all requests into three results—Block, Detect, and Pass—to provide an overview of bot attack status at a glance.

Access Request Result Meanings

ResultDescriptionAction Mode
BlockNumber of requests blocked by policiesWhen policies are set to Blocking Mode, requests determined to be bots are blocked. Blocked requests do not reach the server.
DetectNumber of requests detected as bots but passedWhen policies are set to Detection Mode, requests determined to be bots are only recorded in logs and passed. Used for monitoring purposes.
PassNumber of requests determined to be normalRequests from normal users that passed bot detection policies.

Data Interpretation Guide

You can evaluate bot attack scale and policy effectiveness through access request results.

SituationInterpretationRecommended Action
High block ratio (20% or more)Active bot attacks are ongoing and policies are effectively blocking themMaintain policies, strengthen monitoring, check main attack types in Bot Type Statistics
Many detections but no blocksAll policies are operating in detection modeReview switching main policies to blocking mode in Policy Configuration
Very high pass ratio (90% or more)Few bot attacks or policies are not sufficiently activatedCheck policy activation status, compare with Bot Type Statistics to check for detection misses
Sudden increase in block + detect ratioPossible new attack patternAnalyze attack patterns by checking Top 10 Bot Access IPs and Top 10 Bot Access Pages

Characteristics of Access Statistics

Access statistics analyzes the flow of all requests from time, page, and IP perspectives. This differentiates it from Bot Type Statistics, which focuses on attack type classification.

Top 10 Bot Access Pages

Displays the top 10 pages that bots accessed most frequently.

RankPageAccess Count
1/api/products1,234
2/api/users987
3/login765
.........

How to Use

Analysis Points:

  • Check if bot access is concentrated on specific pages
  • Identify attacks on event/promotion pages
  • Analyze attack patterns on API endpoints

Top 10 Bot Access IPs

Displays the top 10 IP addresses with the most bot access.

RankIPAccess Count
1203.0.113.xxx5,678
2198.51.100.xxx4,321
3192.0.2.xxx3,210
.........

How to Use

Analysis Points:

  • Identify IPs repeatedly appearing in top rankings
  • Check datacenter/cloud IP ranges
  • Review malicious IP list registration

Displays bot attack trends by time period in a chart.

Chart Composition

Example of bot attack trends by time period:

Time PeriodAttack Count
00:00100
04:00150
08:00800
12:00600
16:00450
20:00200
ItemDescription
PeakMaximum attack count and time within query period
LowestMinimum attack count and time within query period

How to Use

Analysis Points:

  • Identify attack peak time periods
  • Business hours vs non-business hours attack patterns
  • Analyze correlation between specific events and attacks

Detailed Statistics Data

Access Request Statistics Structure

Key Metrics

MetricCalculation MethodMeaning
Bot Ratio(Block + Detect) / Total RequestsRatio determined to be bots
Block RateBlock / (Block + Detect)Ratio of blocking mode application
Peak TimeMaximum request timeAttack concentration time

Usage Scenarios

Scenario 1: Daily Monitoring Routine

Goal: Quickly understand bot attack status daily and detect anomalies

Procedure:

  1. Set query period to previous day 00:00 ~ 23:59
  2. Check block/detect ratio in Access Request Result Comparison
    • If sudden increase compared to usual → Check peak time in Bot Attack Trends
    • If ratio is within normal range → Daily monitoring complete
  3. Check IPs repeatedly appearing in top rankings in Top 10 Bot Access IPs
    • If same IP appears in top for 3 or more days → Review registration in Malicious IP List
  4. If anomalies found → Check attack types in Bot Type Statistics

Scenario 2: Event/Promotion Period Intensive Monitoring

Goal: Detect and respond to bot attacks concentrated during specific periods in real time

Procedure:

  1. Set query period from event start time to end time
  2. Check event-related pages in Top 10 Bot Access Pages
  3. Analyze attack patterns in Bot Attack Trends
    • Sudden increase right after event start → Judge as expected traffic
    • Sudden increase at abnormal time → Additional investigation needed
  4. Check for distributed attacks in Top 10 Bot Access IPs
    • Small attacks from various IPs → Suspect distributed bot attack
    • Concentrated attacks from specific IP → Review blocking that IP

Scenario 3: Strengthen Protection for Specific Pages/API Endpoints

Goal: Identify bot attacks on important pages or APIs and strengthen protection level

Procedure:

  1. Set query period to last 7 days
  2. Check pages requiring protection in Top 10 Bot Access Pages
    • Example: API endpoints like /api/users, /api/products
  3. Analyze access patterns for those pages
    • Check attack time periods for those pages in Bot Attack Trends
    • Check IPs attacking those pages in Top 10 Bot Access IPs
  4. Apply protection measures
  5. Monitor after measures
    • Re-query the same period the next day to verify effectiveness

Scenario 4: Detailed Analysis and Response for Suspicious IPs

Goal: Identify IPs that repeatedly attack and decide appropriate actions

Procedure:

  1. Identify IPs to analyze in Top 10 Bot Access IPs
    • IPs appearing in top for 3 or more days
    • IPs with abnormally high counts
  2. Check IP detailed information
    • Check full IP address (unmask)
    • Check if it is a datacenter/cloud IP (e.g., AWS, GCP, Azure)
  3. Analyze access patterns
    • Check attack time periods for that IP in Bot Attack Trends
    • Check pages that IP mainly attacks in Top 10 Bot Access Pages
  4. Decide actions
    • If judged as malicious IP → Register in Malicious IP List to block
    • If possibility of normal user → Register in Exception Target List for exception processing
    • If uncertain → Decide after additional monitoring