PHP Classes

How to Use a PHP Cyber Attack Detection Script to Determine Which IP Addresses Should be Blocked Using the Package AI Threat Hunter: Analyze Web server logs to detect security threats

Recommend this page to a friend!
     
  Info   View files Files   Install with Composer Install with Composer   Download Download   Reputation   Support forum   Blog    
Last Updated Ratings Unique User Downloads Download Rankings
2025-02-14 (4 days ago) RSS 2.0 feedNot yet rated by the usersTotal: Not yet counted Not yet ranked
Version License PHP version Categories
aithreathunter 1.0BSD License7.4HTTP, Security, PHP 7
Description 

Author

This package can analyze Web server log to detect security threats.

It provides a script that calls a class to analyze Web server log files.

Currently, the class can:

- Detect malicious requests based on the request URL patterns that may be used to perform common attacks like cross-site scripting (XSS) and SQL injection (SQLi).

The class can extract the IP addresses of the malicious requests from the Web server log and add the IP address to a block list file and a database table.

Picture of Joseph Mami
  Performance   Level  
Name: Joseph Mami <contact>
Classes: 3 packages by
Country: Tunisia Tunisia
Innovation award
Innovation award
Nominee: 1x

  Files folder image Files (1)  
File Role Description
Plain text file AIThreatHunter Class AIThreatHunter - PHP Security Automation Class

The PHP Classes site has supported package installation using the Composer tool since 2013, as you may verify by reading this instructions page.
Install with Composer Install with Composer
 Version Control Unique User Downloads  
 0%
Total:0
This week:0