✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount
✨ New Plugin Alert ✨ SleekRank is now available with €50 launch discount

SleekView for Patchstack: firewall log & vulnerability records as tables

Patchstack writes blocked requests to wp_patchstack_firewall_log and tracks vulnerability events alongside it. SleekView turns both into a single sortable grid with saved views, role scoping, and inline annotations.

♾️ Lifetime License available

SleekView table view for Patchstack

Firewall events that bend to your questions

Patchstack stores its main event stream in wp_patchstack_firewall_log, with one row per blocked or flagged request: IP, country, rule ID, URI, user agent, and timestamp. Vulnerability and patching activity is written alongside it through the plugin's own logger. The default screens summarise the data well, but only let you filter by a fixed shortlist of fields.

SleekView reads wp_patchstack_firewall_log directly and treats every column, including the rule reference, the country, and the user agent fragment, as a first-class filter. Saved views capture filters, columns, and sort order so a triage screen for SQL injection attempts or a watchlist for known IP ranges takes a click rather than a SQL query.

Inline annotations let you tag a request as already actioned, archive a noisy rule, or flag an entry for follow-up without leaving the grid. Patchstack continues writing events through its own pipeline; SleekView only adds the operational layer on top.

Workflow

From Patchstack logs to a working firewall grid

1

Connect to the firewall log

Create a SleekView against wp_patchstack_firewall_log. Time, IP, country, rule, URI, and user agent are detected and offered as the starting field set.
2

Compose triage columns

Promote the columns your team uses for triage, including rule and country, and hide the noisy ones. Save the column set so it travels with the view.
3

Save reusable views

Pin SQL injection attempts, XSS attempts, rate-limit traffic, or good-bot traffic as separate views. Each captures the active filter, the columns, and the sort.
4

Annotate and export

Tag a row as actioned, archive a noisy entry, or escalate one for follow-up. Export the visible columns as CSV or JSON for tickets, SIEMs, or audits.

Sample columns

A typical Patchstack firewall view

One row per blocked request with rule, country, URI, and action from wp_patchstack_firewall_log.
Source: wp_patchstack_firewall_log, wp_options (vulnerability and patch records)
When IP Country Rule URI Action
Today 06:14 198.51.100.4 RO sql-injection /wp-login.php Blocked
Today 07:02 203.0.113.55 US xss-attempt /?s=