MEDPOV Security Center Security CenterMEDPOV Defense Network
TR EN
Network Online
Next-Generation Defense Infrastructure

Global Threat Intelligence. Real-Time Protection.

Security Center combines site-level protection, bot detection, incident visibility and global threat intelligence into a single lightweight defense layer for modern web projects.

Protection Layer Active Runtime guard + client layer
Signal Engine Realtime Security events and traffic
Response Flow Automated Block, resolve and notify
MEDPOV SaaS Platform

Tek merkezi panel, her müşteri için ayrı güvenlik çalışma alanı.

Paketini seç, banka havalesi/EFT ile ödeme bilgisini gönder; admin onayladıktan sonra kendi izole paneline giriş yapıp siteni bağla.

Üyelik başvurusuPlan + site + banka ödeme bildirimi
🛡️ 0 Blocked Attempts Last 24 hours
📡 5 Requests Observed Global traffic log
2 Security Signals Threat event attempts
🧩 37/40 Active Modules Protection stack
🤖 2 Bot Signals Automation detection
🌍 1 Traffic Regions Geo visibility
Global Threat Intelligence Matrix

Live-Styled Worldwide Threat Intelligence Map

Real dashboard map infrastructure with configurable real, simulated or hybrid threat points. Attack vectors are rendered as curved live lines toward the protected website.

// Global Threat Intelligence Matrix Real map layer · Hybrid threat source
Live
Protected Websiteguard.medpov.com
Threat Level Live User Low Medium High Critical
Threat + visitor lines active Threats: 1 · Users: 10
Threat Intelligence

Latest Active Threats

Continuously updated security narratives from the public intelligence layer.

CRITICAL2 min ago

Credential Stuffing Wave

Automated login pattern detected and mitigated across protected endpoints.

Login GuardAutomationBlocked
HIGH8 min ago

Botnet Probe Cluster

Distributed scanner signatures matched bot and headless-browser detection rules.

Bot DetectionScannerRate Limit
MEDIUM15 min ago

Sensitive File Probe

Requests targeting configuration and backup files were identified by the sensitive probe module.

Probe ShieldConfig FilesLogged
MITIGATED31 min ago

SQL Injection Attempt

Injection payload signatures were neutralized before reaching the application layer.

SQLiFirewallResolved
Enterprise-Grade Defense Systems

Security Center Protection Modules

Every module shown here is fed from the Security Center module registry or the admin-managed public content source.

Auto Block Live Traffic Probes

Automatically blocks IP addresses generating too many requests.

AutomationActive

Auto Block Login Attacks

Automatically blocks IP addresses with repeated failed login attempts.

AutomationActive

Auto Block Repeated Medium Risks

Automatically blocks IP addresses that repeatedly trigger medium-risk events.

AutomationActive

Auto Resolve After Block

Marks related high-risk events as resolved after the IP is blocked.

AutomationActive

Automatic IP Blocking

Automatically blocks high-risk intrusion attempts.

AutomationActive

Security Guardian Automation

Automatically analyzes recent security events and blocks dangerous IP addresses and immediately blocks critical score bursts.

AutomationActive

Subnet Rate Limit Protection

Detects distributed request floods coming from the same IPv4 /24 or IPv6 /64 subnet bucket.

AutomationActive
🤖

Bad Bot Protection

Detects scanners, curl, wget, nikto, sqlmap, nuclei, httpx, feroxbuster, headless browsers and suspicious automation tools.

Bot ProtectionActive
🤖

Fake Search Bot Protection

Flags visitors claiming to be Google/Bing/Yandex/Yahoo/Apple/Baidu bots without reverse + forward DNS validation.

Bot ProtectionActive
🤖

Headless Browser Detection

Flags headless Chrome, Playwright, Puppeteer, Selenium and empty user-agent automation.

Bot ProtectionActive
🤖

Verified Search Bot Allowlist

Allows verified Google/Bing/Yandex/Yahoo/DuckDuckGo/Apple/Baidu search bots to crawl public pages without being treated as bad bots.

Bot ProtectionActive

Anti-DevTools / F12 Deterrent

Discourages inspect actions by blocking common developer-tools shortcuts, right click and showing a restricted-mode overlay.

Client ProtectionDisabled

Protected Site CSRF Token Injection

Injects MEDPOV double-submit CSRF tokens into protected public POST forms and can log or enforce token mismatches.

Client ProtectionActive

Protected Site Security Badge

Shows a configurable Security Center badge on protected website pages with first-entry, interval, schedule, duration, opacity, 9-position placement and custom icon controls.

Client ProtectionActive

View-Source Security Signature

Adds a Security Center HTML comment signature at the very top of protected page source.

Client ProtectionActive
📡

Admin Activity Logging

Logs important admin POST/PUT/PATCH/DELETE actions.

LoggingActive
📡

Bot Detection Logging

Stores detected bot classifications and automation signals.

LoggingActive
📡

Live Traffic Logging

Stores visitor traffic separately from security events.

LoggingActive
🔔

E-mail Notifications

Sends e-mail notification when configured and a threat is detected.

NotificationsDisabled
🔔

Telegram Notifications

Sends Telegram bot alerts for blocked / high-risk threats.

NotificationsActive
🛡️

CRLF / Header Injection Protection

Detects encoded CRLF payloads attempting to inject response headers such as Location, Set-Cookie or Content-Type.

ProtectionActive
🛡️

Command Injection Protection

Detects command execution payload patterns such as whoami, curl, wget, shell pipes and backticks.

ProtectionActive
🛡️

Country Ban Protection

Blocks countries added to the country ban list when GeoIP data is available.

ProtectionDisabled
🛡️

IP Reputation Feed Protection

Checks local IP/CIDR reputation lists, cached external feeds, DNSBL zones and optional AbuseIPDB confidence scores before allowing traffic.

ProtectionActive
🛡️

NoSQL / JSON Injection Protection

Detects MongoDB/Elasticsearch-style operators such as $ne, $regex, $where and script DSL payloads.

ProtectionActive
🛡️

Open Redirect Detection

Logs redirect/return/next parameters pointing to external absolute URLs to reduce phishing abuse.

ProtectionActive
🛡️

PHP Stream Abuse Protection

Detects php://, phar://, data://, expect:// and dangerous stream probes.

ProtectionActive
🛡️

Path Traversal Protection

Detects ../, encoded traversal and sensitive OS file access attempts.

ProtectionActive
🛡️

Proxy Header Detection

Flags requests with suspicious proxy forwarding headers.

ProtectionActive
🛡️

SQL Injection Protection

Detects SQLi payloads, UNION SELECT, boolean based tests and DB timing attacks.

ProtectionActive
🛡️

SSRF / XXE / SSTI Protection

Detects internal IP/metadata SSRF probes, unsafe URL schemes, XXE payloads, template injection and Log4Shell-style expressions.

ProtectionActive
🛡️

Sensitive File Probe Protection

Blocks .env, .git, backup, adminer, phpMyAdmin and config file probe attempts.

ProtectionActive
🛡️

Spam Protection

Detects repeated links, bad words and common spam payloads in public forms.

ProtectionActive
🛡️

XSS Protection

Detects script injection attempts in URLs, forms, cookies and raw request payloads.

ProtectionActive
🧭

AI Security Governance Layer

Reviews automatic blocks, detects false positives, finds missed threats and keeps an explainable decision history without touching ignore-list IP addresses.

Security OperationsActive
🧭

Core Integrity Monitor

Stores trusted SHA-256 baselines for Security Center core files and reports changed, missing or newly added executable files.

Security OperationsActive
🧭

Incident Response Center

Groups recent events by attacker IP, recommends operator actions and provides one-click block / resolve workflows.

Security OperationsActive
🧭

Security Health Center

Audits installation health, runtime requirements, writable folders, hardening basics, alert channels and integration signals.

Security OperationsActive
🧭

Security Test Lab

Runs safe internal simulations for SQLi, XSS, path traversal, command injection, bad bot and environment checks.

Security OperationsActive
🧰

File Integrity / Malware Scanner

Admin-triggered root file scan for webshells, obfuscated loaders, exposed SQL dumps, leaked credentials and suspicious third-party outbound endpoints.

System ToolsActive
System Event Stream

System Event Stream

Live · updating continuously · window 48h

// Security Event LogLive · updating continuously
Assurance Layer

Enterprise-ready security visibility without heavy front-end payloads.

Designed for shared hosting and classic PHP projects as well as modern stacks. Public visuals stay lightweight while admin intelligence remains private inside Security Center.

  • Real dashboard map engine
  • Admin-managed public content
  • Configurable fake / real data balance
  • Module-aware capability cards