Skip to main content

Real-Time Attack Telemetry

The Attack Logs module within the FREAKHOSTING Firewall Panel provides deep visibility into the malicious traffic targeting your infrastructure. By analyzing this telemetry, you can verify the effectiveness of our mitigation engines, identify specific threat vectors, and gain a technical understanding of the scale and intensity of neutralized attacks.

Difficulty

Beginner

Time

3 Minutes

Technical Performance Metrics

When a DDoS event is detected, our systems record several critical data points to help you understand the nature of the threat.
  • Peak (Mbps): Represents the highest volumetric bandwidth utilized during the attack. This metric defines the “size” of the flood.
  • Peak (PPS): Indicates the maximum number of Packets Per Second processed. This metric measures the “intensity” and is often more critical for game server stability than raw bandwidth.
  • Severity Rating: An intelligent assessment of the attack’s impact potential compared to your server’s baseline legitimate traffic.
  • Mitigation Duration: The total elapsed time the mitigation engine remained in an active scrubbing state to protect your IP.

Interpreting Event Status

Every log entry is categorized by a status indicator, allowing you to prioritize incidents that require immediate attention.
The server is currently experiencing an ongoing attack. Our scrubbing centers are actively filtering traffic in real-time to ensure your services remain accessible.

Strategic Log Filtering

For administrators managing large-scale networks, our panel offers granular filtering tools to isolate relevant data.
1

Target Identification

Filter the log repository by a specific Destination IP to analyze the history of a single service or game server.
2

Temporal Analysis

Adjust the date range to view logs from the last hour, 24 hours, or the entire current month to identify recurring patterns or “slow-drip” attacks.
3

Priority Sorting

use the Severity Filter to focus exclusively on high-intensity events, allowing you to bypass minor automated scans and focus on significant threats.

Data Retention Policy

Detailed attack telemetry is retained within the portal for a duration of 30 real-world days. If you require logs for insurance compliance or external security reporting, ensure you export or document the data before the retention window concludes.

Need Extra Help?

If you encounter any issues, our support team is ready to assist:

Save on Your Hosting

Ready to get a new server? Use code KB20 at checkout for 20% off your first month!

Last Updated: January 2026 | Security: Absolute protection for your digital assets.