API Security Use Case
Your APIs Handle More Traffic Than Your Website. And Nobody's Watching.
APIs are the new perimeter. They carry authentication tokens, customer data, payment flows, and business logic — and they're the fastest-growing attack surface in every organization. The Optus breach — 10M customer records stolen through an unauthenticated API endpoint. The T-Mobile breach — 37M records exfiltrated via API abuse over weeks. Peloton, Facebook, Parler — all API-first breaches where the attacker never touched a firewall.
Your WAF sees HTTP requests. Your SIEM sees access logs — if you're even ingesting them. Neither understands API semantics: who's calling what, how often, in what order, and whether the pattern looks like a customer or an attacker enumerating every record in your database.
How spotr.io does it?
spotr.io treats API logs as a first-class data source. High-volume, high-cardinality, streaming — exactly what we're built for. Track distinct endpoints hit per API key. Detect enumeration patterns — sequential ID walking, pagination abuse, response size anomalies. Flag credential stuffing against auth endpoints at any scale. Catch business logic abuse — a user accessing 10,000 other users' records one at a time, staying just under rate limits.
Threshold models catch brute force and volumetric abuse. Anomaly models catch behavioral deviation — an API key that normally makes 50 calls/hour suddenly making 50,000. Sequence models catch multi-step API attacks — auth → enumerate users → extract data → exfil. Rate models catch slow-and-steady scraping that stays under per-request limits but aggregates into massive data theft.
Your WAF blocks known-bad payloads. spotr.io detects unknown-bad behavior.
The next big breach won't come through your front door. It'll come through your API.