# Real Time Threat Analysis

Real Time Threat Analysis allows you to monitor hacking activity as it happens on your app. The reports are updated continuously and each hit is reported seconds after it occurs. For example, you can see how many attempts occurred on your application right now, which tools or devices they're interacting with, and on which location threat traffic is more. With Real-Time, you can immediately and continuously monitor active devices, the threats, devices ID's on which hacking attemts are made.

To view ADC Real Time Threat Analysis (console) :

  1. Open the ADC console at https://console.appsealing.com (opens new window)
  2. Login with appsealing account credentials
  3. In the navigation pane, choose 'Real Time Threat Analysis'

Contents

ADC Real Time

# Metrics

Real Time Threat Analysis shows real-time information about the Application secured with AppSealing. It provides you with the option to set filters on the metrics where you can opt for Operating System (default selected as Android). Data is auto populated periodically based on frequency selected under Refresh Rate.

Real Time Threat Analysis metrics

Metric Description
Operating System OS Platform for which the application is sealed

Android - Platform used to seal the Native or Hybrid Android apps using Console or CLI tool

iOS - Platform used to seal the Native or Hybrid iOS apps using SDK tool
Application Application for which metrics need to be shown, this list will be populated depending on Operating System selection
Refresh Rate Interval(in mins) after data is auto populated

# Monitoring

Dashboard monitoring contains overall analytical insights for application, that includes Threat Analytics, Real Time Streaming, Geographical distributions, Hacking Types and many more. Information is shown in tiles and each tile provides needful security information

Threat analysis is our in-product threat intelligence solution from expert AppSealing security researchers. It is designed to assist security teams to be efficient for managing emerging threats. Here are a few of the ways you might use Popular Insights:

  • monitor Hacking Attempts and Unique Devices Hacking Attempts on your application in last 60mins
  • understand which is most common Hacking Type used while attacking devices
  • see which country is driving traffic threats to your app
  • monitor the immediate effects on traffic from a blog/social network post or tweet
  • find out which emulator is commonly used through which app is running
  • Device Model from which majority threats are detected
  • monitor percentage of rooted devices

Popular Insight

# Hacking Types Streaming

Unique Devices Hacking Attempts shows the number of total hacking attempts per minute occurred in last 60 mins along with top cheat tools and top device models compromised for security

Axis Description
X-Axis Date for the selected time period as well as previous month period
Y-Axis Represents number of hacking attempts for selected application

Hacking Types Streaming

# Protected Unique Devices Data

Protected Unique Devices Data shows the number of total hacking attempts for unique devices per minute occurred in last 10 mins along with top cheat tools and top device models compromised for security

Axis Description
X-Axis Date for the selected time period as well as previous month period
Y-Axis Represents number of hacking attempts for selected application

Protected Unique Devices Data

# Hacking Attempts By Map Overlay

Hacking Detections By Map Overlay allows you to view the real time geographic representation of hacking attempted on your application with their hacking information overlaid for last 60 mins. It shows where hacking attempts are coming from with Map overview. Countries are highlighted from light to dark shade based on the number of attempts, higher the number darker shade for the country.

On hover over the countries in map you will find number of Hacking Attempts for last 60 mins.

Hacking Attempts By Map Overlay

# Hacking Attempts By Country List

This matrix represents hacking information such as hacking attempts and unique device attempts corresponding with the Country. Data displayed for the Top Countries on basis of number of hacking attempts tried on the device

Hacking Attempts By Country List

# List Of Hacking Attempts

This table represents detailed hacking information from which threats are reported. You can drill down the result set by specifying filters using search bar or using advanced filters. Records are selectable in the table which will display detailed device information for non-trail users. This result set is populated run-time for last 60 mins and contains useful information such as following:

  • Time on which threats are reported
  • AppSealing version for sealed app
  • Device Details on which hacking attempts are made
    • Device Model Name
    • Android version for the device
    • Application version for your application
    • Country from where attempts are made
  • Hacking Details
    • Number of Hacking Attempts
    • Emulator on which app is running (only for android apps)
    • Rooting / Jailbreak status for application
    • Hacking Type

List of Hacking Attempts

# Hacking Attempts By Device Information

Device Information is available only for professional or enterprise plan customers. This table represents detailed device information from which threats are reported. You can drill down the result set by specifying filters using search bar or using advanced filters. This result set contains useful information such as following:

  • Time on which threats are reported
  • Device Details on which hacking attempts are made
    • Android ID / UUID of user's device
    • Operating System version for the device
  • Hacking Details
    • Number of Hacking Attempts
    • Emulator on which app is running (only for android apps)
    • Rooting / Jailbreak status for application
    • Hacking Type
    • Detailed threat information

Hacking Attempts By Device Information

Last Updated: 11/19/2024, 6:55:37 AM