All Products
Search
Document Center

Web Application Firewall:DescribeRuleHitsTopClientIp

Last Updated:Sep 11, 2025

Queries the top 10 source IP addresses from which the most attacks originated.

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

The table below describes the authorization required to call this API. You can define it in a Resource Access Management (RAM) policy. The table's columns are detailed below:

  • Action: The actions can be used in the Action element of RAM permission policy statements to grant permissions to perform the operation.

  • API: The API that you can call to perform the action.

  • Access level: The predefined level of access granted for each API. Valid values: create, list, get, update, and delete.

  • Resource type: The type of the resource that supports authorization to perform the action. It indicates if the action supports resource-level permission. The specified resource must be compatible with the action. Otherwise, the policy will be ineffective.

    • For APIs with resource-level permissions, required resource types are marked with an asterisk (*). Specify the corresponding Alibaba Cloud Resource Name (ARN) in the Resource element of the policy.

    • For APIs without resource-level permissions, it is shown as All Resources. Use an asterisk (*) in the Resource element of the policy.

  • Condition key: The condition keys defined by the service. The key allows for granular control, applying to either actions alone or actions associated with specific resources. In addition to service-specific condition keys, Alibaba Cloud provides a set of common condition keys applicable across all RAM-supported services.

  • Dependent action: The dependent actions required to run the action. To complete the action, the RAM user or the RAM role must have the permissions to perform all dependent actions.

Action

Access level

Resource type

Condition key

Dependent action

yundun-waf:DescribeRuleHitsTopClientIp

get

*All Resource

*

None None

Request parameters

Parameter

Type

Required

Description

Example

StartTimestamp

string

Yes

The beginning of the time range to query. The value is a UNIX timestamp. Unit: seconds.

1665331200

EndTimestamp

string

No

The end of the time range to query. The value is a UNIX timestamp. Unit: seconds. If you do not set this parameter, the current time is used as the end time.

1665386280

Resource

string

No

The protected object.

www.aliyundoc.com

RuleType

string

No

The type of rule that the protected object hits. If you do not set this parameter, data for all rule types is returned.

  • blacklist: The IP address blacklist is hit.

  • custom: A custom rule is hit.

  • antiscan: A scan protection rule is hit.

  • cc_system: A CC protection rule is hit.

  • region_block: The Location Blacklist is hit.

blacklist

InstanceId

string

Yes

The ID of the WAF instance.

Note

Call DescribeInstance to query the ID of the WAF instance.

waf_cdnsdf3****

RegionId

string

No

The region where the WAF instance resides. Valid values:

  • cn-hangzhou: the Chinese mainland.

  • ap-southeast-1: outside the Chinese mainland.

cn-hangzhou

ResourceManagerResourceGroupId

string

No

The ID of the resource group.

rg-acfm***q

Response elements

Element

Type

Description

Example

object

The response.

RequestId

string

The request ID.

9F0F9AD6-62E2-50BB-A3E5-30FFB9410262

RuleHitsTopClientIp

array<object>

The top 10 source IP addresses that initiated the most attacks.

object

The attack details for a source IP address.

Count

integer

The number of attack requests.

531

ClientIp

string

The IP address of the client.

3.3.XX.XX

Examples

Success response

JSON format

{
  "RequestId": "9F0F9AD6-62E2-50BB-A3E5-30FFB9410262",
  "RuleHitsTopClientIp": [
    {
      "Count": 531,
      "ClientIp": "3.3.XX.XX"
    }
  ]
}

Error codes

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.