All Products
Search
Document Center

Cloud Firewall:Internet Exposure

Last Updated:Mar 31, 2026

The Internet Exposure page shows inbound traffic from the Internet to your cloud assets, including trace information about unusual inbound traffic and the count of open public IP addresses, open ports, open applications, and public IP addresses of cloud services. Use this page to spot suspicious exposure patterns and take action before they become incidents.

Prerequisites

Before you begin, ensure that you have:

How it works

The Internet Exposure page has two main views:

ViewWhat it coversLookback window
Visualized AnalysisReal-time traffic charts across all public IP addressesUp to 30 days
Exposure DetailsBreakdown of open public IP addresses, open ports, open applications, and assets; exportable as CSVUp to 7 days

Visualized Analysis

The Visualized Analysis tab shows peak inbound traffic across all your public IP addresses and highlights which sources and destinations generate the most activity.

  1. Log on to the Cloud Firewall console. In the left-side navigation pane, choose Traffic Analysis > Internet Exposure.

  2. Select a time range from the drop-down list in the upper-right corner, then click the Visualized Analysis tab. The time range can be a preset period or a custom range within the previous 30 days.

  3. Review the sections described in the following table.

image
SectionWhat it showsWhat to look for
IP TrafficTotal peak inbound traffic per public IP address, with IP address type.IPs with unexpectedly high peak traffic may indicate scanning activity or data exfiltration attempts. Click image.png to see the traffic trend for a specific IP. Click image.png to view traffic logs in Log Audit. Click image to check outbound connections for the same IP.
Inbound Traffic TrendPeak request and response traffic across all assets in real time.Sudden spikes in request traffic without a corresponding response increase may signal volumetric attacks. Move the pointer over the chart to see traffic at a specific point in time. Click a point on the x-axis to refresh the IP Traffic rankings for that moment.
Rankings of Visits by TrafficTop 10 source locations, top 10 IP address ranges by session percentage, top 10 source IP addresses, and statistics on at-risk ports.High-volume source IP addresses or unusual geographic origins warrant further investigation. A large share of sessions from a single IP address range can indicate automated or coordinated access.

View Internet exposure statistics

The Data Statistics section and Exposure Details tab display statistics of usual and unusual inbound traffic for your assets. Use this view to troubleshoot unusual traffic and prioritize which assets to investigate or restrict.

  1. Log on to the Cloud Firewall console. In the left-side navigation pane, choose Traffic Analysis > Internet Exposure.

  2. Select a time range from the drop-down list in the upper-right corner. The time range can be a preset period or a custom range within the previous 7 days.

  3. Review the statistics in the Data Statistics section and on the Exposure Details tab.

image
ParameterWhat it showsActions
Open Public IP AddressesTotal open public IP addresses and how many are flagged as at-risk.On the Open Public IP Addresses tab, click View Details in the Actions column to see access details for a specific IP address. From there, you can also: click Configure Access Control Policy to go to Access Control > Internet Border and create an inbound or outbound policy; click Add to Address Book to add the IP to an address book for centralized management; click 1 > View Logs to open the Traffic Logs tab in Log Audit.
Open PortsTotal open ports and how many are flagged as at-risk.On the Open Ports tab, click View Details in the Actions column to see access details for a specific port.
Open ApplicationsTotal open applications and how many are flagged as at-risk.On the Open Applications tab, click View Details in the Actions column to see access details for a specific application.
DetailsTraffic statistics across all assets.On the Details tab, click View Details in the Actions column to see access details for a specific asset.
Cloud ServicesNumber of public IP addresses receiving inbound traffic that accesses cloud services.None.

Export Internet exposure statistics

Click the 下载 icon in the upper-right corner of the Exposure Details tab to export data for open public IP addresses, open ports, open applications, assets, and cloud services as a CSV file.

What's next

References