What is an Account Takeover?
An overview of Account Takeover Attacks
Since Peakhour sits between your end user and your origin server it will see a Peakhour IP as the requesting IP address for a page/resource. If you wish to preserve the IP addresses of visitors in your access logs you will have to configure your server to check the
X-Peakhour-IP
header to retrieve the IP of the request coming into Peakhour. Please note that depending on your web server the configuration to use this header in your logs will be different. If you would like the
**X-Forwarded-For
header to be set then please contact us
An overview of Account Takeover Attacks
A step-by-step breakdown of how credential stuffing attacks are carried out, from obtaining stolen credentials to bypassing defenses and taking over accounts.
Download our comprehensive 2024 Australian Account Takeover Security Survey for insights on account protection strategies and emerging threats.
Learn about the types of attacks malicious bots carry out.
Just how much of the internet's traffic is generated by bots?
We answer what a CAPTCHA is in terms of bots and the internet.
© PEAKHOUR.IO PTY LTD 2025 ABN 76 619 930 826 All rights reserved.