1 |
Anomaly # |
{anomaly_id} |
Integer |
Returns the unique ID number of the anomaly. |
2 |
Prefix |
{prefix} |
Prefix |
Returns the Victim IP/CIDR (inbound anomalies) or Source IP/CIDR (outbound anomalies). CIDR mask is omitted for hosts (/32 for IPv4, /128 for IPv6). |
3 |
IP Address |
{ip} |
Prefix |
Returns the IP of {prefix}, excluding the CIDR mask. |
4 |
IP Version |
{ip_version} |
Prefix |
Returns the IP version of {prefix}, either 4 or 6. |
|
|
{ip_dns} |
String |
Returns the reverse DNS of {ip}. If lookup fails, returns {ip} instead. |
5 |
IP AS Number |
{ip_asn} |
Integer |
Returns the AS Number of {ip}. If no AS is found in GeoIP DB, returns 0. |
6 |
CIDR |
{cidr} |
Integer |
Returns the CIDR mask of {prefix}. |
7 |
IP Group |
{ip_group} |
String |
Returns the IP Group of {prefix}. |
8 |
Anomaly |
{anomaly} |
String |
Returns a description of the anomaly. By default, describes the threshold rule that triggered it. |
9 |
Anomaly Classification |
{classification} |
String |
Returns the classification set by Console users: Unclassified, False Positive, Possible Attack, Trivial Attack, Verified Attack, or Crippling Attack. |
10 |
Anomaly Comment |
{comment} |
String |
Returns a user-submitted comment regarding the anomaly, if any. |
11 |
Direction |
{direction} |
String |
Returns incoming for inbound anomalies, outgoing for outbound. |
|
|
{Direction} |
String |
Same as {direction} but capitalized (Incoming, Outgoing). |
|
|
{direction_to_from} |
String |
Returns to for inbound anomalies, from for outbound. |
|
|
{direction_receives_sends} |
String |
Returns receives for inbound anomalies, sends for outbound. |
12 |
Domain |
{domain} |
String |
Returns the domain used by the threshold: internal IP if a /32 (IPv4) or /128 (IPv6) host, subnet or external IP. |
|
|
{Domain} |
String |
Same as {domain} but capitalized. |
13 |
Anomaly Class |
{class} |
String |
Returns threshold for threshold-based anomalies, profile for profiling-based anomalies. |
14 |
Threshold Type |
{threshold_type} |
String |
Returns the threshold value type, which can be either absolute or percentage. |
15 |
Anomaly Decoder (Protocol) |
{decoder} |
String |
Returns the decoder used to detect the anomaly. |
16 |
Comparison |
{operation} |
String |
Returns over or under, referencing the threshold rule comparison. |
|
|
{comparison} |
String |
Returns > if {operation} = over; < if {operation} = under. |
17 |
Unit |
{unit} |
String |
Returns the measurement unit of the threshold rule: pkts/s or bits/s. |
18 |
Threshold Value |
{rule_value} |
Integer* |
Returns the traffic value specified by the threshold. |
19 |
Computed Threshold |
{computed_threshold} |
Integer* |
Returns the dynamically adjusted threshold for profiling or percentage anomalies. |
20 |
Sensor |
{sensor} |
String |
Returns the name of the Sensor detecting the anomaly, plus [Interface Name] for SNMP Sensor & Flow Sensor. |
21 |
Sensor Name |
{sensor_name} |
String |
Returns the name of the detecting Sensor. For SNMP Sensor & Flow Sensor, it does not return the interface name. |
22 |
Sensor Group |
{sensor_group} |
String |
Returns the Device Group set in the Sensor configuration. |
23 |
Sensor IP |
{sensor_ip} |
Prefix |
Returns the IP address of the server running the Sensor. |
24 |
Sensor Type |
{sensor_type} |
String |
Returns the type of Sensor: Packet Sensor, Flow Sensor, SNMP Sensor, or Sensor Cluster. |
25 |
Sensor ID |
{sensor_id} |
Integer |
Returns the Server ID of the server that hosts the Sensor. |
26 |
Flow Exporter IP |
{router_ip} |
Prefix |
Returns the IP address of the flow exporter if this is a Flow Sensor; otherwise empty. |
27 |
IP Zone |
{ipzone} |
String |
Returns the IP Zone used by the Sensor. |
28 |
IP Zone Prefix |
{ipzone_prefix} |
Prefix |
Returns the most specific IP Zone prefix that includes {prefix}. |
29 |
IP Zone Parent Prefix |
{ipzone_parent_prefix} |
Prefix |
Returns the parent of the most specific IP Zone prefix that includes {prefix}. |
30 |
Response |
{response} |
String |
Returns the Response triggered by the threshold rule. |
31 |
Response Actions |
{response_actions} |
String |
Returns a list with the Response actions executed. Only includes actions where Record Action is checked. |
32 |
Threshold Template |
{template} |
String |
Returns the Threshold Template containing the threshold rule, if any. |
33 |
Expiration Delay |
{expiration} |
Integer |
Returns the number of inactivity seconds before the anomaly expires. |
34 |
Peak Packets/s |
{anomaly_pps} |
Integer* |
Returns the highest packets/s rate observed. |
35 |
Peak Bits/s |
{anomaly_bps} |
Integer* |
Returns the highest bits/s rate observed. |
36 |
Latest Packets/s |
{latest_anomaly_pps} |
Integer* |
Returns the most recent packets/s value. |
37 |
Latest Bits/s |
{latest_anomaly_bps} |
Integer* |
Returns the most recent bits/s value. |
38 |
Peak Value |
{value} |
Integer* |
Returns the peak abnormal traffic value, and also {unit}. |
39 |
Latest Value |
{latest_value} |
Integer* |
Returns the latest abnormal traffic value, and also {unit}. |
40 |
Sum Value |
{sum_value} |
Integer* |
Returns the number of packets counted during the anomaly if {unit} = pkts/s, or number of bits counted if {unit} = bits/s. |
41 |
Peak Rule Severity |
{severity} |
Float |
Returns the ratio between peak abnormal traffic rate and the threshold. |
42 |
Latest Rule Severity |
{latest_severity} |
Integer |
Returns the ratio between latest abnormal traffic rate and the threshold. |
43 |
Peak Link Severity |
{link_severity} |
Integer |
Returns the ratio between peak abnormal traffic rate and the interface’s traffic rate. |
44 |
Latest Link Severity |
{latest_link_severity} |
Integer |
Returns the ratio between latest abnormal traffic rate and the interface’s traffic rate. |
45 |
Latest Link Utilization |
{latest_link_utilization} |
Integer |
Returns the percentage of the interface’s capacity currently in use by the IP decoder. Computed as (latest_traffic / interface_speed) x 100. |
46 |
Captured Packets |
{captured_pkts} |
Integer |
Returns the number of successfully captured packets if the Response includes a packet-capturing action. |
47 |
BGP Log Size |
{bgplog_bytes} |
Integer |
Returns the size of the BGP announcement log, >0 only if a BGP routing update was triggered for the anomaly. |
48 |
Unique Tokens |
N/A |
String |
Used to avoid Response action duplication if another active anomaly matches the same user-defined token list (e.g., “{ip} {decoder}”). Action triggers only if no other anomaly with identical tokens is active. Operator must be set to equal to. |
49 |
Custom Script Return Value |
N/A |
Integer |
Executes only if the user-specified script returns exit status 0. Pass tokens as arguments. Operator must be equal to. The script must finish quickly since it blocks the originating process. |
|
|
{anomaly_log_10}, {anomaly_log_50}, {anomaly_log_100}, {anomaly_log_500}, {anomaly_log_1000} |
String |
Returns the first 10/50/100/500/1000 packets (if packet-capturing is enabled) or flows (if Flow Collector is enabled) with anomalous traffic. |
|
|
{attacked_isp} |
String |
Returns the abuse contact mailbox or email for the victim’s ISP if found in the whois database. |
|
|
{software_version} |
String |
Returns the Wanguard version. |
|
|
{json_anomaly_tokens} |
String |
Returns a JSON string with all anomaly-related tokens + list of filtering rules. If token ends with ‘_brief’, only essential tokens are included. If ‘_pretty’, tokens appear in a multi-line JSON. |