type: leaky name: crowdsecurity/http-crawl-non_statics description: "Detect aggressive crawl from single ip" filter: "evt.Meta.log_type in ['http_access-log', 'http_error-log'] && evt.Parsed.static_ressource == 'false' && evt.Parsed.verb in ['GET', 'HEAD']" distinct: "evt.Parsed.file_name" leakspeed: 0.5s capacity: 40 #debug: true #this limits the memory cache (and event_sequences in output) to five events cache_size: 5 groupby: "evt.Meta.source_ip + '/' + evt.Parsed.target_fqdn" blackhole: 1m labels: confidence: 1 spoofable: 0 classification: - attack.T1595 behavior: "http:crawl" service: http label: "detection of aggressive crawl" remediation: true