Modsecurity is an apache web server module that allows you to build a web application firewall and to protect your web applications.  You can use modsecurity in either an integrated manner, to protect the web server and its applications, or as a proxy for other web servers – allowing you to build your own WAF at a fraction of the cost of traditional solutions!  This module is extremely powerful, but like a word processor its useless without content – You need good rules – rules that stop bad things and allow good things.

This is where we come in, we have been writing modsecurity rules longer than anyone else on the Internet, and our rules are used by more people that all the other rulesets combined!  And for good reason, our rules are written with a simple but powerful philosophy “Security Is For Everyone”. Unlike other modsecurity projects, we don’t expect you to be a security expert, thats our job – let us do the hard work for you, we’ll figure out how to keep the bad guys off your system and make sure those rules don’t interfere with your applications and users.  A WAF and WAF rules should just work out the box, you shouldn’t have to tune them – and with our rules thats what we we do for you – our rules are fully supported and just work.

Immediate Results

The Atomicorp/Gotroot Realtime WAF Rules provide an immediate solution for the following challenges:

  • Data Theft and Information Leakage
  • Site Defacement and comment spam
  • Web Application Vulnerabilities
  • PCI-DSS and other Regulatory Compliance
  • Rootkits and Malware
  • SQL injection, Cross Site Scripting and advanced CSRF attacks
  • Advanced Persistent Threats
  • Recursion Attacks
  • File and Code Injection
  • XML attacks
  • And more!


We’re in our seventh year producing WAF technologies and mod_security rules.  No one has more experience with mod_security than we do, and with five years of real world experience protecting systems and preventing false positives you can rest easy knowing your systems will be safe, and won’t interfere with your users authorized activities.

Zero Day Protection

Unlike other security products, the Atomicorp/ WAF rules do not depend on signatures that require constant updating as they include technology to detect and stop entire classes of attacks such as code injection, protocol violations, SQL injection, cross site scripting and more!

The Atomicorp/ Rules Protect Against:

  • Protocol Violations
    • Prevents common attacks by detecting protocol manipulation methods used to launch advanced attacks
    • Prevents resource abuse used to launch Denial of Service attacks
  • Credential Theft
    • Prevents cookie and other credential theft
  • Spam
    • The most robust content spam protection system available for web sites, forums, blogs, guestbooks and more.  Our rules detect spam, spamming techniques and other methods used by web spammers and prevents them from working.  Allowing you to run your website worry free from spam.
  • Code Injection, including PHP, PERL, ASP, Coldfusion and other technologies
    • The most complete malicious code detection and prevention methods and specially tuned to prevent false positives will thousands of web applications.
    • Prevents RFI attacks, obfuscated and cloaked code uploading methods and still allows known trusted applications to work.  No tuning required!
  • SQL Injection Attacks
  • HTTP Response Spliting
  • Cross Site Scripting, including Universal PDF Cross Site Scripting
  • Malicious Client Detection and Blocking
  • Google Hacks
  • Just In Time Patching
    • Our unique JITP system addressesvulnerabilities in applications that can not be patched by patching it for you!  Our JITP system will plug the holes in your applications so you can take the time needed to test updates, and yet still operate your system in a secure and safe manner.  JITPs are released daily when new vulnerabilities are discovered so you don’t have to worry.
  • Data Leakage
    • Detects unauthorized attempts to access protected files, sensitive information, backup files and other data to prevent it from being accessed by malicious parties.
  • Recursion Attacks
    • Prevents attacks from abusing file system bugs to access protected files, or areas of the system.
  • Command injection
  • Trojan, Backdoor, Spam Tool, Shell and Rootkit blocking
    • Detects thousands of different kinds of trojans to prevent already installed trojans, shells and other malicious applications from even running
  • Automatic Malicious Code Removal
    • Another unique feature of our rules:  Using another great apache module, mod_sed, we automatically remove malicious iframes, hidden malicious javascript and other malicious code from your website in real time so that your system won’t serve up malicious content.  Another great defense in depth feature of our rules that goes above and beyond other WAFs and the capabilities of just mod_security.
  • E-mail Injection
  • XML Protection
  • Web RPC Protection


Tűzfalunk valós időben analizálja a nálunk lévő tárhelyekre beérkező kéréseket és elutasítja a támadásokat. A mai nap kiszűrt támadások száma: 0 db
Utoljára kiszűrt lehetséges támadások:
Támadó címe
Támadott weblap
Támadás módja
2017-01-25 07:44:36
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-24 04:20:18
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-25 21:38:48
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-24 04:20:23
Match of "ipMatch,::1" against "REMOTE_ADDR" required.
2017-01-30 04:40:44
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-24 04:20:23
Match of "ipMatch,::1" against "REMOTE_ADDR" required.
2017-01-24 04:20:35
Pattern match "=(?:ogg|gopher|data|php|zlib|(?:ht|f)tps?)://" at REQUEST_URI.
2017-01-24 04:21:29
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-24 04:20:51
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.
2017-01-24 04:28:17
Pattern match "xmlrpc\.php" at REQUEST_BASENAME.