Read-only WAF vs. active blocking
On the Free plan, the WAF runs in read-only mode: it detects and logs attacks but does not block them. This gives you visibility into what is hitting your site without any risk of false positives interrupting legitimate traffic. When you upgrade to Pro or higher, you switch to active blocking: matching requests are dropped at the edge before they reach your origin server.Free — read-only
Attacks are detected and recorded in the threat feed, but all traffic passes through to your origin.
Pro+ — active blocking
Malicious requests are blocked at the edge in under 50ms. No traffic matching attack patterns reaches your server.
Enable active blocking
Upgrade your plan
Go to Settings → Billing in the dashboard and select the Pro plan or higher. Active blocking is available on Pro, Business, Scale, and Enterprise.
Switch from monitor to block
Find the Mode toggle at the top of the WAF page. Change it from Monitor to Block. The toggle turns red to confirm active blocking is on.
Confirm the change
A confirmation dialog lists the attack categories that will now be blocked (SQLi, XSS, RCE, path traversal, SSTI, and more). Click Enable blocking to apply.
Changes take effect within 30 seconds across all edge nodes. You do not need to update your DNS record or restart anything.
Manually block or whitelist an IP
You can override Recon44’s automated decisions for any individual IP address at any time.Find the IP in the threat feed
Go to Dashboard → Threat Feed and locate the event from the IP you want to manage. Click the IP address to open the IP detail panel.
Choose an action
In the IP detail panel, click Block IP to add it to your blocklist immediately, or click Whitelist IP to ensure Recon44 never blocks it regardless of its behavior.
Set a duration (optional)
By default, manual blocks are permanent. Use the Duration dropdown to set a temporary block of 1 hour, 24 hours, or 7 days if you prefer.
How brute force protection works
Recon44 monitors login request patterns automatically. When it detects a suspicious number of authentication attempts from a single IP — for example, repeated failed logins in a short window — it takes the following actions in sequence:- Rate limiting: The source IP is throttled, slowing the attack without immediately blocking it.
- Blocklist: If the pattern continues, the IP is added to your blocklist and all further requests from that IP are dropped.
- Alert (Pro+ for email, Business+ for Telegram and SMS): You receive a notification that a brute force attempt was detected and blocked.
How DDoS mitigation works
DDoS mitigation runs automatically for all plans, including Free, because your traffic flows through Cloudflare’s global network the moment you add the Recon44 CNAME record. There is nothing to configure. Volumetric attacks are absorbed at the edge before reaching your origin. The threat feed shows DDoS events in real time so you can monitor the attack as it is being mitigated.DDoS mitigation is infrastructure-level and operates independently of your WAF mode setting. It is active even when the WAF is in read-only mode.
Tuning: whitelist legitimate IPs
If active blocking causes false positives — for example, a security scanner you own or a partner’s monitoring service gets blocked — whitelist those IPs so they are never affected by WAF or rate limit rules.Add a whitelist entry
Click Add rule, enter the IP address or CIDR range, and set the action to Whitelist.
Add a label
Enter a description (for example, “Uptime Robot monitoring”) so you can identify the rule later.
Attack types caught by the WAF
SQL Injection (SQLi)
SQL Injection (SQLi)
Requests containing SQL syntax designed to manipulate your database queries — matched against dozens of payload variations including comment-based, union-based, and blind injection patterns.
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Attempts to inject client-side scripts into your pages, covering reflected, stored, and DOM-based XSS payloads.
Remote Code Execution (RCE)
Remote Code Execution (RCE)
Requests that attempt to execute system commands through vulnerable endpoints, including shell injection and deserialization exploits.
Path traversal
Path traversal
Attempts to access files outside the web root using sequences like
../, catching both encoded and double-encoded variants.Server-Side Template Injection (SSTI)
Server-Side Template Injection (SSTI)
Payloads that target template engines such as Jinja2, Twig, and Freemarker to execute server-side code.
Scanners and bots
Scanners and bots
Automated scanning tools and vulnerability probers are fingerprinted and blocked based on behavior and known signatures.