Skip to content


Accessible for the Community (paid), Developer and Business plan users.

On the Protection overview page you can see where your site got attacks from, and how have the hackers tried to attack your web application.

Protection modules

Patchstack firewall consists of four types of protection modules, which can be toggled on and off for any protected site. The protection modules also show, how many of your apps are attached to each module.

vPatching Module

Receive vPatches for known dangerous vulnerabilities in your applications. vPatches are highly specific and strict firewall rules that prevent vulnerabilities from being exploited without changing any code.
πŸ“– Read more

Advanced Hardening

The Advanced Hardening module applies additional security mechanics to the WordPress application to block common malicious requests against WordPress sites.
πŸ“– Read more

Community IP Blocklist

Community IP blocklist blocks access to IP addresses which are known to exploit vulnerabilities. This module contributes threat data back to the Patchstack network.

Generic OWASP

Generic firewall rules against OWASP top 10 vulnerability types including XSS, SQLi, RCE and for other known exploitation methods. Note, due to its generic nature this module may cause false-positives for more complex applications.
πŸ“– Read more


From the Activity section, you see, how many times did Patchstack firewall block the traffic for potential threats.
You can set a filter to show the data about up to 1 year.
On the right side of the protection activity section, Patchstack App shows the top 5 IP’s blocked, and top 5 threats blocked in the given period of time.

Log history

Each hacking attempt or attack is shown as a separate protection log entry. You can click on any log entry to view more details about the particular blocking.

To see the details of any attack, click on a table row. A popup opens next.