


























*.abc.com) is selected, logs from all associated subdomains (ending with .abc.com) will also be downloaded.
Information Type | Field Name | Description | Example |
Basic Information | domain | The domain name information accessed by the client request. For wildcard domain names or object access, it is the precise domain name. | clbwaf-example.qcloudwaf.com |
| request_time | Request duration: the time required for a client request to reach the WAF and return from it. Unit: second. | 0.003 |
| client | Source IP: the source IP address of the client request. | 1.1.1.1 |
| uuid | Request UUID: the unique identifier for an HTTP request. | 2325eec3f71112f07263bd594440e7a9-20f1db72af339bd9587110a22ec2b913 |
| schema | Request protocol: HTTP or HTTPS. | http |
| method | The HTTP method used by the client request. | GET |
| instance | The ID of the WAF instance to which it belongs. | waf_examplename |
| query | The Query String of the client HTTP request, with a maximum length of 1K Byte. | content=article&post_id=123 |
| time | The time when the client HTTP request occurred, as recorded by NGINX and presented in a locally readable time format. | 23/Jun/2025:11:58:22 +0800 |
| timestamp | The ISO 8601 standard format timestamp for when the client HTTP request occurred. | 2025-06-23T11:58:22+08:00 |
| appid | The APPID of the user's Tencent Cloud account. | 1234567891 |
Header Details | url | A client HTTP request header field that records the content between the first "/" after the domain name and the "?" in the client's complete request path. | /products/item123 |
| accept | A client HTTP request header field used to inform the server of the response content types supported by the client. | text/html |
| encoding | A client HTTP request header field used to inform the server of the compression algorithms supported by the client. | gzip |
| language | A client HTTP request header field used to inform the server of the language supported by the client. | en-US |
| connection | A client HTTP request header field that controls connection behavior, such as keeping the connection alive or closing it. | close |
| content_type | A client HTTP request header field that specifies the MIME type of the request body. | application/x-www-form-urlencoded |
| cookie | A client HTTP request header field that records the Cookie information of the request, with a maximum length of 1K. Unit: Byte. | k1=v1;k2=v2 |
| host | A client HTTP request header field that records the domain name requested by the client. | 1.1.1.1:80 |
| referer | A client HTTP request header field that records the source URL information of the request. If the request has no source URL information, this field displays "-". | http://example.com |
| x_forwarded_for | A client HTTP request header field that records all proxy IP addresses through which the client request passes and the client's real IP address. | XX.XX.XX.XX |
| user_agent | A client HTTP request header field that records the software and operating system information of the client. | Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36 |
| request_length | The number of bytes of the client HTTP request. Unit: Byte. | 435 |
Response Details | upstream_status | The response status code returned by the origin server to the WAF. | 0 |
| status | The response status code returned by the SAAS WAF to the client: 200: Normal Request 202: Frontend Defense 302: Redirect 403: Block 4XX: Refer to the HTTP response status code standard definition. 5XX: Refer to the HTTP response status code standard definition. The response status code returned by the CLB WAF to the CLB: 600: Normal Request 624: Frontend Defense 621: Redirect 615: Block | 600 |
| bytes_sent | The size of the response body. Unit: Byte. | 112 |
| upstream_connect_time | The connection time required for a client request to travel from the WAF to the origin server. Unit: second. | 0.033 |
| upstream_response_time | The time required for a client request to return from the origin server to the WAF. Unit: second. | 0.033 |
| upstream | The IP address of the origin server. | 1.1.1.1 |
Basic Attack Logs | attack_type | Attack Type: The specific type of attack that was triggered. | XSS attack |
| sec_action | The handling action triggered by a client attack, including four types of processing results: Observe (0), Block (1), Human-Machine Verification (2), and Redirect (3). | 1 |
| rule_id | Rule ID: The ID of the rule that triggered the protection policy. | 10000244 |
| risk_level | Risk Level: The risk level triggered by a client attack, including three levels: High (1), Medium (2), and Low (3). | 1 |
| sec_chain | The security modules that the request passed through and their corresponding handling actions. | {"acl":{"ac":6},"areaban":{"ac":6},"bw_list":{"ac":12},"web_sec":{"id":10000244,"ac":1},"whitelist":{"ac":6}} |
BOT Protection Details | bot_module | The BOT detection module hit by the current access request. | Module name/Chinese and English processing |
| bot_action | The BOT handling action corresponding to the current access request. | intercept |
| bot_score | The BOT score information for the current access request. | 20 |
| bot_label | The BOT tag hit by the current access request. | Malicious bot |
| ua_type | The type of User-Agent used by the visitor in the current access request. | bot |
| ua_crawlername | The name of the User-Agent suspected to be a crawler in the current access request. | CensysInspect/1.1 |
| ua_fake | Whether the User-Agent in the current access request is forged, where 0 indicates No and 1 indicates Yes. | 0 |
| ua_goodbot | Whether the BOT in the current access request is a goodbot, where 0 indicates No and 1 indicates Yes. | 0 |
| bot_ai | Whether the current access request is detected as an abnormal request by the AI engine, where 0 indicates No and 1 indicates Yes. | 0 |
| bot_stat | Whether the current access request is detected as an abnormal request by intelligent statistics, where 0 indicates No and 1 indicates Yes. | 0 |
| bot_ti_tags | Whether the current access request hits threat intelligence, and displays the hit intelligence tags. | "WEB vulnerability exploitation", "Bot", "FTP scanning" |
| bot_id | The BOT ID of the current access request. | |
| bot_scene_id | The BOT scene ID hit by the current access request. | 3100806770 |
| bot_action_id | The BOT action policy ID hit by the current access request. | |
| bot_rule_id | The BOT rule ID hit by the current access request. | 3300002268 |
| bot_rule_name | The BOT rule name hit by the current access request. | Censys |
| bot_token | The BOT session ID of the current access request. | |
| bot_tld_risk_tag | The terminal risk tag status of the current access request (requires purchasing RCE TDS capability). | |
| bot_ua | Whether the current access request hits the ua policy. | 0 |
Access IP address Information | ipinfo_nation | The country name to which the access IP address belongs. | China |
| ipinfo_state | The English abbreviation of the country to which the access IP address belongs. | CN |
| ipinfo_city | The city to which the access IP address belongs | Guangzhou |
| ipinfo_province | The province to which the access IP address belongs | Guangdong |
| ipinfo_isp | The ISP to which the access IP address belongs | chinaunicom.com |
| ipinfo_detail | Access IP Details. | - |
| ipinfo_longitude | The longitude information to which the access IP address belongs | 113.65302 |
| ipinfo_dimensionality | The latitude information to which the access IP address belongs | 34.7625 |
Other Custom Fields | headers | Protocol header information: including custom header information. | waf-customize-lbid: lb-exmple accept: */* stgw-orgreq: GET / HTTP/1.1 x-waf-uuid: 03043817b707b17ba519d478944e0634-e88bfddc17eb7a9193a92db7b0c00000 stgw-orgcontentlength: 0 content-length: 0 stgw-orgservername: clbwaf-shjr.qcloudwaf.com stgw_request_id: 78b504122b27657f7355af12dbd00000 connection: close |
| body | Request Body | |
| attack_category | Attack Primary Category/Protection Module | General WEB attack |
| attack_content | Attack Content: The content that triggered the attack from the client. | {"action":3,"type":1,"field":"alert("m3nsHen_Va1idation")","mc":"XSS attack","offset":0,"sc":"XSS attack","level":5,"target":"Parameter","match":"alert("m3nsHen_Va1idation")","data":"alert("m3nsHen_Va1idation")","sid":"010000244"} |
| attack_place | Attack Location: The location of the attack method within the HTTP request. | Parameter |
| count | Number of Attacks: The number of attacks aggregated every 10 seconds for the same source IP address and attack type | 1 |
| waf_verify | Captcha verification success flag | success |
| pan | Access domain name or clb object | lb-example, wildcard domain |
| http_log | The log file that records HTTP request and response information | {"REQUEST_METHOD":"GET","PROCOTOL":"HTTP/1.1","REQUEST_ARG_RAW":"{"1750650000.4178421":true,"alert("m3nsHen_Va1idation")":true}"} |
| args_name | Parameter name in the attack log: The parameter name in the HTTP request | Parameter |
Module Field Name | Module type |
web_sec | Web Basic Security |
cc | CC Protection |
areaban | Access Control - Region Blocking |
whitelist | Custom Allow Rule |
bw_list | IP Blocklist/Allowlist |
acl | Access Control |
bot | Bot Management |
ip_punish | Web Basic Security - IP Blocking |
business_risk | Business Security |
ai | AI Engine |
captcha | Captcha service. |
api_sec | API security |
Action Code | Action Description |
0 | Bypass |
1 | Deny |
2 | CAPTCHA |
3 | Redirect |
4 | Log |
5 | No_Action |
6 | Empty_Rules |
7 | Allow |
9 | Return |
10 | Reload |
11 | Error |
12 | Miss |
13 | JSChallenge |
14 | Delay |
15 | AUTO_CAPTCHA_LOG |
16 | AUTO_CAPTCHA_DENY |
20 | Action Unknown |
Was this page helpful?
You can also Contact sales or Submit a Ticket for help.
Help us improve! Rate your documentation experience in 5 mins.
Feedback