LoFP LoFP / legitimate web application clients or mobile apps that access multiple api endpoints as part of normal functionality, monitoring and health check systems probing various endpoints for availability, load balancers performing health checks across different paths, api testing frameworks during development and qa processes, or users navigating through web interfaces that trigger multiple api calls may generate similar patterns during normal operations.

Techniques

Sample rules

Ollama Possible API Endpoint Scan Reconnaissance

Description

Detects API reconnaissance and endpoint scanning activity against Ollama servers by identifying sources probing multiple API endpoints within short timeframes, particularly when using HEAD requests or accessing diverse endpoint paths, which indicates systematic enumeration to map the API surface, discover hidden endpoints, or identify vulnerabilities before launching targeted attacks.

Detection logic

`ollama_server` "[GIN]" 
| bin _time span=5m 
| stats count as total_requests, values(dest) as dest, values(http_method) as methods, values(status) as status_codes by _time, src, host 
| where total_requests > 120 
| eval severity="medium" 
| eval attack_type="API Activity Surge" 
| stats count by _time, host, src, total_requests, dest, methods, status_codes, severity, attack_type 
| `ollama_possible_api_endpoint_scan_reconnaissance_filter`