Enter a host and click Run Scan
Click Load Rules to fetch firewall rules
No ports managed yet. Use Block/Open Port above.
' OR 1=1--)
XSS (Cross-Site Scripting) — injecting malicious scripts into web pages (e.g. <script>alert(1)</script>)
Path Traversal — accessing files outside the web root (e.g. ../../etc/passwd)
Command Injection — executing OS commands through the app (e.g. ;whoami)
Rate Limiting — auto-blocks IPs sending too many requests (default: 60/min, blocks for 5 min)
Real-time detection of SQL injection, XSS, path traversal, and command injection using regex pattern matching on URL, query string, and request body
Configurable max requests per minute per IP address. Abusive IPs are auto-blocked for a configurable duration.
Manually add any IP address to the blocklist. Blocked IPs receive a 403 Forbidden response on every request.
All request bodies are capped at 1MB. Oversized requests are rejected to prevent memory exhaustion attacks.
Every response includes: X-Frame-Options: DENY, X-Content-Type-Options: nosniff, X-XSS-Protection: 1; mode=block, Referrer-Policy: no-referrer
Every request is logged: timestamp, client IP, HTTP method, URL path, allow/block decision, block reason, and detected attack type.
Click Load Audit Log to view requests
Click Run All Tests to start the security audit