diff --git a/documentation/waap/waap-policies/ip-reputation.md b/documentation/waap/waap-policies/ip-reputation.md index c667e06d..38fd0e7e 100644 --- a/documentation/waap/waap-policies/ip-reputation.md +++ b/documentation/waap/waap-policies/ip-reputation.md @@ -52,7 +52,7 @@ All IP reputation policies are enabled by default. To disable a policy, turn on TOR nodes are commonly used for web anonymity, but can also be used by hackers, scrapers, and spammers to crawl and hack web applications. -Use JavaScript validation to verify traffic originating from the TOR network. This helps prevent potential anonymity and security risks associated with TOR usage within web applications. +Block traffic from IP addresses associated with the TOR network. ### Traffic via proxy networks @@ -86,4 +86,4 @@ The IPs on this list are known to be malicious or spam. When an IP with a negati ### Traffic via CDNs -Organic human traffic is unlikely to originate from IP spaces belonging to CDN companies. When such traffic is detected, validate it using JavaScript. \ No newline at end of file +Organic human traffic is unlikely to originate from IP spaces belonging to CDN companies. When such traffic is detected, validate it using JavaScript.