SleekView for Patchstack: firewall log & vulnerability records as tables
Patchstack writes blocked requests to wp_patchstack_firewall_log and tracks vulnerability events alongside it. SleekView turns both into a single sortable grid with saved views, role scoping, and inline annotations.
♾️ Lifetime License available
Firewall events that bend to your questions
Patchstack stores its main event stream in wp_patchstack_firewall_log, with one row per blocked or flagged request: IP, country, rule ID, URI, user agent, and timestamp. Vulnerability and patching activity is written alongside it through the plugin's own logger. The default screens summarise the data well, but only let you filter by a fixed shortlist of fields.
SleekView reads wp_patchstack_firewall_log directly and treats every column, including the rule reference, the country, and the user agent fragment, as a first-class filter. Saved views capture filters, columns, and sort order so a triage screen for SQL injection attempts or a watchlist for known IP ranges takes a click rather than a SQL query.
Inline annotations let you tag a request as already actioned, archive a noisy rule, or flag an entry for follow-up without leaving the grid. Patchstack continues writing events through its own pipeline; SleekView only adds the operational layer on top.
Workflow
From Patchstack logs to a working firewall grid
Connect to the firewall log
wp_patchstack_firewall_log. Time, IP, country, rule, URI, and user agent are detected and offered as the starting field set.
Compose triage columns
Save reusable views
Annotate and export
Sample columns
A typical Patchstack firewall view
wp_patchstack_firewall_log.
wp_patchstack_firewall_log, wp_options (vulnerability and patch records)
| When | IP | Country | Rule | URI | Action |
|---|---|---|---|---|---|
| Today 06:14 | 198.51.100.4 | RO | sql-injection | /wp-login.php | Blocked |
| Today 07:02 | 203.0.113.55 | US | xss-attempt | /?s= | Blocked |
| Today 07:31 | 192.0.2.10 | DE | rate-limit | /wp-json/wc/store/cart | Throttled |
| Today 08:00 | 203.0.113.22 | GB | good-bot | /sitemap.xml | Allowed |
Comparison
Default Patchstack admin vs SleekView
Default Patchstack admin
-
The firewall log screen filters by date and rule, but does not expose every column in
wp_patchstack_firewall_logas a sortable field. - Cross-referencing a country, a rule, and an IP range against the same window is not part of the default UI.
- Vulnerability and patch records are summarised, with no joined grid against firewall events from the same window.
- Bulk actions on log rows (archive, tag, escalate) are limited to row by row in the default view.
- Exports are CSV from one screen with a fixed column set.
SleekView
-
Reads
wp_patchstack_firewall_logas a first-class grid with every column filterable. - Saves named views for SQL injection, XSS, rate-limit, or good-bot traffic and reopens them across teams.
- Pivots requests by country, rule, or IP range with multi-column filters.
- Inline tag of a row as actioned, archived, or escalated without leaving the grid.
-
Exports the visible column set as
CSVorJSONwith the active filter applied.
Features
What SleekView gives you for Patchstack
Multi-column firewall filters
Treats every field in wp_patchstack_firewall_log as filterable. Country, rule, URI fragment, IP range, and time window combine in one query without a SQL detour.
Inline triage tags
Add an actioned, archived, or escalated tag from the row. Investigation context stays attached to the firewall event itself rather than scattered across tickets and chat.
Firewall and patch records together
Pair the firewall grid with a view of vulnerability and patch records so you can see, in the same admin, which active exploits the firewall is currently blocking and which ones have been patched.
Audience
Who uses SleekView for Patchstack
Security ops
Filter wp_patchstack_firewall_log across rule, country, and time window. Pivot suspicious traffic by IP or user agent fragment and pin the resulting view for the next incident.
Agency admins
Run the same Patchstack triage grid across many client sites by saving the same view as a template. Per-site filters keep tenant data scoped correctly.
Compliance owners
Export filtered firewall events for monthly security reviews. Saved views ensure the same column set and filter feed the report each cycle.
The bigger picture
Why a firewall log deserves a real grid
Patchstack is a thoughtful product because it patches real vulnerabilities at the firewall layer rather than waiting for a plugin author. The reason its raw log matters is that the firewall sees traffic the rest of WordPress never logs in detail, and that traffic is the earliest signal of a campaign or an emerging exploit. Treating wp_patchstack_firewall_log as a flat list hides the patterns that triage actually needs: the same country running the same rule against the same endpoint over an hour, or the same user agent fragment hopping IP ranges.
A real grid surfaces those patterns in seconds because every column is filterable and sortable. Saved views make repeat investigations cheaper because the next on-call admin reopens the same filter and column set rather than rebuilding it from memory. Annotations turn the log from a record of what was blocked into a working timeline of what the team did about it.
Combining firewall and patch records in the same admin closes the loop, because the question stops being 'what blocked' and becomes 'what changed in our coverage today'. Patchstack already records faithfully; a real grid turns that record into a tool.
Questions
Common questions about SleekView for Patchstack
No. SleekView only reads wp_patchstack_firewall_log. The firewall rules, signature updates, and patches keep running through Patchstack itself.
Yes. Country, rule, URI, user agent, and IP are all first-class columns in SleekView, with combined filters and sort order saved per view.
 Yes. The vulnerability and patch records Patchstack tracks can sit in their own SleekView grid. You can correlate them against firewall events by date or rule reference.
 Yes. Tag, archive, or escalate multiple rows from a single bulk operation. Annotations live alongside the event so the next reviewer sees the prior context.
 SleekView paginates server-side and uses the existing indexes on timestamp, rule, and IP. Even sites with heavy traffic and large firewall logs stay responsive.
 Yes. Capability checks follow WordPress roles. You can also gate specific saved views to a smaller group when the data is sensitive.
 Yes. JSON exports respect the active filter and visible columns, which works as input for SIEMs and other security tools.
 SleekView respects multisite context. A super-admin view can join firewall events across sites, while site-level admins see only the slice that belongs to their site.
 Pricing
More than 1000+
happy customers
Explore our flexible licensing options tailored to your needs. Upgrade your license anytime to access more features, or opt for a lifetime license for ongoing value, including lifetime updates and lifetime support. Our hassle-free upgrade process ensures that our platform can grow with you, starting from whichever plan you choose.
Lifetime ♾️
Most popular
EUR
once
- Unlimited websites
- Lifetime updates
- Lifetime support
...or get the Bundle Deal
and save €250 🎁
The Bundle (unlimited sites)
Pay once, own it forever
Elevate your WordPress site with our exclusive plugin bundle that includes all of our premium plugins in one package. Enjoy lifetime updates and lifetime support. Save significantly compared to buying plugins individually.
What’s included
-
SleekAI
-
SleekByte
-
SleekMotion
-
SleekPixel
-
SleekRank
-
SleekView
€749
Continue to checkoutBrowse more
- Woocommerce Conditional Discounts
- Aelia Currencyswitcher
- Woocommerce Checkout Manager
- Woocommerce Product Feed Pro
- Solid Affiliate
- Square For Woocommerce
- Rehub Affiliate
- Woocommerce Tiktok Pixel
- Woocommerce Colissimo
- Klarna Payments
- Woocommerce Shipping Class Rates
- Checkout Field Editor
- Woocommerce Shipping Australia Post
- Wholesale Suite
- Skubana Wp