Total Clicks
0
+0% from prev period
High-Risk %
0%
0 blocked
Unique Actors
0
0 new today
Active Clusters
0
0 forming
Data Latency
12ms
p99: 45ms
Noise Floor
2.3%
baseline risk

Risk Distribution

Reason Code Leaderboard

Cluster Pulse Timeline

Geographic Mix

+3%

User Agent Mix

0%

TLS Tuple Mix

+28%

Header-Hash Mix

+61%

Live High-Risk Events

Timestamp IP Address Country Risk Score Bot User Agent Actions
Loading events...
Total Actors
0
Unique IPs
Suspicious Actors
0
Risk ≥ 70
Repeat Visitors
0
Multiple visits

Top Actors by Activity

IP Address Country Total Events Avg Risk Score First Seen Last Seen
Loading actors...
Active Clusters
0
Last 24h
Largest Cluster
0
IPs involved
Cluster Events
0
Total flagged
Advanced IVT Detection Active: Tracking TLS fingerprints, header analysis, geographic patterns, ASN intelligence, visitor trust scores, and protocol coherence across all traffic.

Cluster Network Graph

No clusters detected in current time range

Clusters appear when coordinated bot activity is detected

Total Campaigns
0
Active links
Total Clicks
0
All time
Bots Detected
0
Detection only

Your Short Links

Code Name Destination Clicks Bots Detected Status Actions
Loading campaigns...

Protocol Reality

Active
TLS Version ✅ Collecting
TLS Cipher ✅ Collecting
HTTP/2 Coherence ✅ Collecting
Sec-Fetch Headers ⚠️ Partial

Behavioral Analysis

Active
Timezone Coherence ✅ Scoring (+15 risk for VPN/proxy)
ASN Intelligence ✅ Scoring (+30 for datacenter IPs)
Canvas Fingerprint ⚠️ Phase 2 (Client-side)
WebGL Fingerprint ⚠️ Phase 2 (Client-side)

Velocity Tracking

Active
IP Velocity (10min window) ✅ Scoring (+10 to +40 risk)
Subnet Velocity (/24) ✅ Scoring (+25 for subnet attacks)
In-Memory Tracking ✅ Per-edge location
Redis (Global) ⚠️ Phase 2 (Multi-region)

Trust Memory

Active
Visitor Reputation ✅ Scoring (trust-based risk adjustment)
Trust Cookies ✅ Persistent (_bsk_vid, 7-day)
Return Visitor Bonus ✅ -20 risk for trusted users (>80% clean)
Known Bot Penalty ✅ +30 risk for repeat offenders

Implementation Roadmap

Phase 1: Basic Detection

Risk scoring, IP tracking, User-Agent analysis

Phase 2: Metrics Dashboard

Real-time analytics, event tracking, investigation tools

Phase 3: Advanced Signals

TLS fingerprinting, protocol coherence, behavioral analysis

Phase 4: Trust & Velocity

Visitor reputation, velocity tracking, coordinated detection