-
Notifications
You must be signed in to change notification settings - Fork 0
18 Threat Intel Operations
This page explains how to operate DomNexDomain Threat Intel in production.
- Allowlist-first
- Two policy modes only
- XP/Level/Tier classification
- Consolidated
New/Watched/Blockedviews for high-volume traffic - Cross-protocol signal path (HTTP/HTTPS edge + SSH bastion auth/forward denies)
- Direct trace pivot into
Strategic Intel -> Investigations
- Detects and records threat signals.
- Updates XP/Level/Tier state.
- Does not auto-block.
- Best for baselining and tuning.
- Detects and records threat signals.
- Applies temporary soft blocks at soft-risk levels.
- Escalates high-risk level to hard block.
- Hard-blocked sources are edge-dropped (
proxy.block.hard_drop). - Feed intelligence does not directly hard-block by itself.
Deterministic enforcement order on edge requests:
- hard blocked IP list check
- Threat Intel evaluation (signals -> XP/Level/Tier -> decision)
- WAF temporary unknown-host check
- route and policy gates
First terminal decision wins.
Soft block behavior:
- Temporary block window is applied by policy state.
- Soft block duration is an operator-controlled setting (
Soft Block Duration (minutes)in Settings). - Active soft-blocked sources are visible in
Watched.
Hard block behavior:
- Source is placed in hard-block path.
- Requests are dropped at edge (connection close).
- Audit trail remains available for investigation.
- Hard blocks are operationally managed objects (visible in
Blockedview) and can be reviewed/reversed by admins. - Hard-block state is reused by SSH bastion source checks (
:2222) so abusive IPs are denied before auth processing. - Lifecycle transition: after 60 days of inactivity, a hard-blocked source is moved to
watchstate at Level 3 instead of staying permanently blocked forever.
Threat Intel behavior is intentionally tunable from Settings:
- Monitor/Soft/Hard level boundaries
- Soft block duration (
minutes) - feed/signature policy inputs
This allows adapting policy to traffic reality without changing code.
Current baseline decay is intentionally conservative:
- XP decay starts after idle periods and is applied in 30-minute steps.
- Level decay is slow (72-hour step-down cadence).
- Full automatic state cleanup requires sustained inactivity (>= 72h), zero XP/level, and no active block.
- While a source is actively soft-blocked or hard-blocked, decay is paused for that source.
- After hard-block watch transition, normal decay/rehabilitation resumes.
States:
monitoringwatchsoftblock_activehardblockrehabilitated
Key transitions:
- known feed or signature hit ->
watch - level >= soft threshold in auto mode ->
softblock_active - level >= hard threshold in auto mode ->
hardblock - soft block expiry ->
monitoring|watch - hard-block idle-lifecycle downgrade ->
watch - sustained cooling (xp=0, level=0, idle window) ->
rehabilitated
- External threat feeds are stored as backend intelligence, not immediate enforcement.
- A feed-listed IP is only acted on when it actually sends traffic to your edge.
- On first real access with a feed-listed or signature-matched source, the source enters
watchat Level 3 rather than instant block. - This keeps high-risk context while reducing false-positive permanent bans.
This keeps repeat high-risk sources visible longer and reduces premature rehabilitation.
Threat Intel is also fed by SSH bastion security events:
ssh.bastion.auth.deniedssh.bastion.forward.denied
Behavior:
- Repeated SSH denies increase XP/Level for the source IP.
- Soft-block duration from Settings is applied to SSH source checks as well.
- Hard-blocked source IPs are denied on both HTTP/HTTPS edge and SSH bastion.
This gives one shared abuse state across web and SSH entry points.
- Open
Threat Intel. - Verify policy mode and sync interval.
- Review
Newfor low-band, newly observed sources. - Review
Watchedfor Level3to< hard levelentries. - Review
Blockedfor active hard blocks. - Pivot by trace into
Strategic Intel -> Investigationswhen the exact decision path matters. - Use
Allowoverrides only for verified false positives.
-
New- Level
0to<3 - contains sources that are noisy enough to be tracked, but not yet in the watched band
- Level
-
Watched- Level
3to< hard level - includes watch-level sources, soft-block states, and rehabilitated hard blocks returned to Level 3
- Level
-
Blocked- active hard blocks at the configured hard level
- these remain visible until retention-driven rehabilitation or manual release
Sources that fully decay and rehabilitate fall out of all three lists.
Every visible Threat Intel table row should be treated as an investigation entry point.
- Each list exposes at least one trace ID.
- The trace can be opened directly in
Strategic Intel -> Investigations. - Investigations then shows:
- case summary for the current trace
- related prior contacts from the same source IP (
Escalation Chain) -
flowentries -
evidenceentries -
actionentries
This is the recommended way to reconstruct why a source was watched, blocked, or later rehabilitated.
- Start in
Monitor onlyfor baseline collection. - Build allowlist entries for known trusted scanners/agents.
- Switch to
Auto mode. - Review
WatchedandBlockedtrends daily. - Keep manual hard blocks for confirmed abuse only.
- For LAN/hairpin tests, some detections may be intentionally bypassed as internal traffic.
- Feed-listed IPs do not create action unless they actually touch the edge.
- Trace timelines are retained for
60 days, then pruned automatically.
- Home
- Quick Start
- Prerequisites
- Installation
- First Login
- Initial Setup Assistant and OTS
- Domain Wizard
- Subdomain Wizard
- SSH Bastion Client Guide
- Subdomain Settings
- Dashboard Widget Guide
- UI Styles and Branding
- Access Control (Users, Groups, Permission Matrix, API Tokens)
- Users and Roles
- Identity Providers (LDAP + OIDC)
- API Tokens
- Threat Intel
- Logservers and External SIEM
- Operating Profiles
- API Usage Guide
- Product Roadmap
- Technical Reference
- Strategic Intel (Logs and Monitoring)
- Data Retention
- Security
- Backup and Restore
- Troubleshooting
- Glossary
- Support