Attack blocking requires Metlo agents deployed inline with your API traffic. This is an Enterprise feature.
How Blocking Works
Metlo uses a cloud-coordinated, edge-enforced blocking model:Blocking Methods
Metlo can block based on multiple identifiers:IP Address
Block requests from specific source IPs
User Session
Block based on session identifiers or user IDs
API Key
Revoke access for compromised or abusive API keys
Custom Headers
Block based on any custom header pattern
Manual Blocking
Block bad actors directly from the Metlo dashboard:From Attack Details
- Navigate to the Attacks page
- Click on an attack to view details
- Review the source IP and attack pattern
- Click “Block IP” to add to block list
- Optionally add notes explaining the block reason
From Block List Management
- Go to Settings → Blocking
- Click “Add Block Rule”
- Configure:
- Match Criteria: IP, user ID, session key, etc.
- Block Duration: Permanent or time-limited
- Scope: All endpoints or specific paths
- Save the rule
Automated Blocking (Enterprise)
Configure rules to automatically block based on attack patterns:Block Rule Configuration
Rule Components:- Trigger: Attack type or pattern (e.g., “BOLA detected”)
- Threshold: How many incidents before blocking (e.g., “3 attacks in 10 minutes”)
- Action: Block duration and scope
- Exceptions: IPs or users to never block
Agent Deployment
For blocking to work, deploy Metlo agents inline with traffic:Deployment Options
- Kubernetes
- Node.js
- Python
Deploy as a sidecar container in your pods:
Agent Configuration
Configure blocking behavior:- Block Mode: Enforce or monitor-only
- Sync Interval: How often to pull updated block lists (default: 60 seconds)
- Fallback Behavior: What to do if can’t reach Metlo cloud (allow or deny)
- Custom Response: HTTP status and message for blocked requests
Block List Management
Viewing Active Blocks
The block list shows:- All active blocking rules
- When each rule was created
- Who created it (manual vs automated)
- Number of requests blocked
- Expiration time for temporary blocks
Removing Blocks
To unblock:- Find the block rule in the list
- Click “Remove” or “Edit”
- Optionally add a note about why it was removed
- Changes sync to agents within the configured interval
Removed blocks are logged for audit purposes. You can review the history of all blocking actions.
Field-Level Blocking
Beyond IP blocking, Metlo can redact or block specific data fields:Use Cases
- PCI Compliance: Prevent credit card data from being logged
- GDPR: Block PII from certain endpoints or geographies
- Data Loss Prevention: Redact sensitive fields before external sharing
Configuration
- Navigate to the endpoint details page
- Go to the “Block Fields” tab
- Select data fields to block:
- Request query parameters
- Request/response headers
- Request/response body fields
- Choose action:
- Redact: Replace with
[REDACTED] - Remove: Strip field entirely
- Block Request: Reject requests containing the field
- Redact: Replace with
Monitoring Blocked Requests
Blocked Request Logs
View all blocked requests in real-time:- Source IP: Who was blocked
- Endpoint: What they tried to access
- Block Reason: Which rule triggered the block
- Timestamp: When it occurred
- Request Details: Full context (headers, payload)
Metrics and Analytics
Track blocking effectiveness:- Total requests blocked over time
- Most blocked IPs
- Most targeted endpoints
- Block rule efficiency (false positive rate)
Best Practices
Start in Monitor Mode
Deploy agents in monitor-only mode first to validate blocking rules don’t affect legitimate traffic
Use Time-Limited Blocks
Default to temporary blocks (1-24 hours) to automatically unblock if threat subsides
Whitelist Internal IPs
Ensure internal networks, monitoring tools, and known partners are whitelisted
Review Block Logs Weekly
Check blocked requests regularly to identify false positives and refine rules
Combine with WAF
Use Metlo blocking for API-specific attacks; traditional WAF for broader protection
Whitelisting
Prevent specific IPs or users from ever being blocked:Creating Whitelists
- Go to Settings → Blocking → Whitelists
- Add whitelist entries:
- IP ranges: CIDR notation for networks
- User IDs: Specific authenticated users
- API keys: Service accounts or partners
- Add description for audit trail
- Internal office networks
- Monitoring and health check systems
- Partner API integrations
- Development/staging environments
Troubleshooting
Legitimate Users Being Blocked
Symptoms:- User reports 403 Forbidden errors
- Block logs show legitimate IP/user
- Check if automated rule was too aggressive
- Review attack that triggered the block—false positive?
- Add to whitelist if frequently blocked incorrectly
- Adjust threshold or add exceptions to blocking rule
Blocks Not Enforcing
Symptoms:- Attacks continue from blocked IPs
- Block list shows rule but requests aren’t blocked
- Verify agents are deployed inline (not just mirroring)
- Check agent logs for connection to Metlo cloud
- Confirm sync interval—may take 60s for new blocks to propagate
- Ensure block mode is “enforce” not “monitor”
Performance Impact
Symptoms:- Increased latency after enabling blocking
- High CPU usage on agent containers
- Increase agent resource allocation
- Optimize block list—remove expired or unnecessary rules
- Adjust sync interval to reduce update frequency
- Consider horizontal scaling of agents
Metlo agents are designed for minimal overhead, typically adding less than 5ms latency. Higher impact suggests configuration issues.