Skip to main content
Every request that reaches your domain passes through Recon44’s Web Application Firewall before it gets anywhere near your origin server. The WAF evaluates the request against a comprehensive set of attack signatures and either allows it through, blocks it outright, or flags it for review — all within a single network hop at the edge.

What the WAF inspects

The WAF analyzes the full request: URL path, query string, request headers, cookies, and request body. It looks for known attack payloads embedded in any of these fields.

SQL injection (SQLi)

Detects attempts to manipulate database queries via user-supplied input, including UNION-based, error-based, and blind injection techniques.

Cross-site scripting (XSS)

Catches reflected, stored, and DOM-based XSS payloads targeting browsers that process your responses.

Remote code execution (RCE)

Blocks payloads that attempt to execute shell commands or server-side code through vulnerable input handlers.

Path traversal

Stops requests that use ../ sequences and encoded variants to read files outside the web root.

Server-side template injection (SSTI)

Identifies template expression syntax (e.g., {{7*7}}) that exploits template engines running on your server.

Protocol & encoding abuse

Normalizes and decodes requests before matching, catching double-encoded and obfuscated payloads that bypass naive filters.

OWASP Core Rule Set matching

Recon44’s WAF is built on the OWASP Core Rule Set (CRS) — the same rule set used by Cloudflare and AWS WAF. Each rule has a unique identifier so you can trace exactly which pattern triggered a block.
Rule IDCategoryWhat it matches
WAF-SQLI-01SQL injectionClassic ' OR 1=1 and boolean-based payloads
WAF-SQLI-02SQL injectionUNION SELECT extraction attempts
WAF-SQLI-03SQL injectionTime-based blind injection (SLEEP, WAITFOR)
WAF-XSS-01Cross-site scripting<script> tag injection and event handler attributes
WAF-XSS-02Cross-site scriptingJavaScript URI schemes and data URIs
WAF-RCE-01Remote code executionShell metacharacters and command separators
WAF-PT-01Path traversal../ sequences and URL-encoded equivalents
WAF-SSTI-01Template injectionTemplate expression syntax for common engines
The triggered rule ID appears in the Threat Feed and Audit Logs for every blocked request.
Recon44 normalizes each request before matching — decoding URL encoding, HTML entities, and common obfuscation patterns. This ensures attackers cannot bypass rules by encoding their payloads.Matching runs in parallel across all rule categories. If any rule fires, the WAF acts according to your plan’s configured mode before the request continues.

Inspection latency

Average WAF inspection latency is 47ms. This is the time added to a request for full rule evaluation — Recon44 adds no perceptible delay to legitimate users.
Inspection happens at edge nodes geographically close to your visitors. The request is evaluated in-flight; your origin server only receives requests that have already cleared the WAF.

WAF modes by plan

Your WAF operates in one of two modes depending on your plan.
On the Free plan, the WAF runs in read-only mode:
  • Every request is inspected against the full rule set.
  • Matching requests are logged and visible in your Threat Feed.
  • No traffic is blocked — requests pass through to your origin.
Use this mode to understand your attack surface before upgrading to active blocking.
You can still manually block specific IPs from the dashboard on the Free plan. WAF auto-blocking requires Pro or above.

Handling false positives

If the WAF blocks legitimate traffic, you have two options:
1

Check the Threat Feed

Open your dashboard and find the blocked request. The entry shows the source IP, the matched rule ID, and the full request path.
2

Whitelist the IP

If the blocked IP belongs to a trusted source (a monitoring service, your own office, a payment provider), click Whitelist next to the entry. Whitelisted IPs bypass WAF inspection entirely.
3

Report a false positive

If you believe a rule is incorrectly matching legitimate traffic, use the Report false positive option on the blocked entry. This sends the rule ID and anonymized request data to the Recon44 rule team for review.
Whitelisting an IP disables all WAF inspection for traffic from that address. Only whitelist IPs you fully control or trust.

Live Threat Feed

See every WAF event in real time, including the rule ID and action taken.

IP Blocking

Manage automatic and manual IP blocks, whitelists, and geo rules.