Skip to content

Blocked Attempts – View Authentication Requests Blocked by Security Rules

The Blocked Attempts page displays all RADIUS authentication requests that were denied before reaching the authentication process. These blocks occur when incoming requests match a static filter rule or are flagged by the Mideye Shield automated protection system.

Reviewing blocked attempts is essential for validating that your security policies are working as intended, identifying false positives that may be blocking legitimate users, and understanding the volume and nature of threats targeting your authentication infrastructure. Each blocked event includes the timestamp, username, calling station ID, and the specific reason the request was blocked.

Required Role: ROOT, SUPER_ADMIN, ADMIN, or OPERATOR

Navigation: Home → Logs → Blocked Attempts

All authenticated users with the required role can view blocked attempts. This is a read-only view — blocked attempts cannot be manually created or deleted from this page.

The data grid displays blocked authentication attempts with server-side pagination and sorting. By default, events are sorted by time in descending order (newest first).

ColumnDescription
TimeTimestamp when the authentication attempt was blocked
UsernameThe user identity in the blocked request
Calling Station IDThe originating IP address or MAC address
ReasonWhy the request was blocked
ReasonDescription
Blocked by Static Filter RuleThe request matched a manually configured static filter rule targeting the username or calling station ID
Blocked by Automated ShieldThe request was blocked by Mideye Shield’s automated IP reputation and fraud score analysis

Click the Filter icon in the toolbar to open the filter panel.

FilterTypeDescription
Start DateDate pickerBeginning of the time range
End DateDate pickerEnd of the time range
UsernameText inputFilter by username
Calling Station IDText inputFilter by originating address
ReasonSingle selectFilter by block reason: All, Blocked by Static Filter Rule, or Blocked by Automated Shield

Click Apply to execute the filter, or Reset to clear all filter fields.

Click the Refresh (loop) icon in the toolbar to reload blocked attempts from the server with the current filter criteria.

Field NameTypeRequiredDescriptionValidation
jhiTimeLocalDateTimeYesTimestamp of the blocked attempt
usernameStringNoUsername from the blocked authentication request
callingStationIdStringNoOriginating IP or MAC address
reasonBlockReasonYesEnum indicating why the request was blockedBLOCKED_BY_STATIC_FILTER_RULE or BLOCKED_BY_AUTOMATED_SHIELD

Purpose: Narrow down blocked attempts by date range, username, calling station, or reason. Steps:

  1. Click the Filter icon in the toolbar.
  2. Set desired filter values.
  3. Click Apply.

Result: The data grid updates to show only matching blocked attempts.

Purpose: Reload the latest blocked attempt data. Steps: Click the Refresh (loop) icon in the toolbar. Result: The data grid refreshes with current data.

  1. Create a static filter rule targeting a specific username or IP address.
  2. Navigate to Blocked Attempts.
  3. Filter by Reason: “Blocked by Static Filter Rule”.
  4. Verify that authentication attempts matching the rule appear in the list.

Identifying False Positives from Mideye Shield

Section titled “Identifying False Positives from Mideye Shield”
  1. Filter by Reason: “Blocked by Automated Shield”.
  2. Review the blocked usernames and calling station IDs.
  3. If a legitimate user or IP address appears, consider adjusting the Mideye Shield thresholds or adding an ALLOW rule in Static Filter Rules.
  1. Set the Start Date and End Date to define a reporting period.
  2. Review the total number of blocked attempts.
  3. Compare volumes across different time periods to identify trends or spikes in malicious activity.
IssuePossible CauseResolution
No blocked attempts appearNo blocks occurred in the selected time rangeExpand the date range or check that Mideye Shield and static filter rules are active
Legitimate user is blockedOverly broad filter rule or low shield thresholdReview static filter rules and Mideye Shield configuration; create an ALLOW rule if needed
Username shows as emptyRequest did not contain a username attributeThis can occur with malformed or probing RADIUS packets