The display wlan ids attack-detected command displays information about the detected attacking devices.
display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameter  | 
Description  | 
Value  | 
|---|---|---|
all  | 
Displays information about all types of attacking devices.  | 
-  | 
flood  | 
Displays information about devices launching flood attacks.  | 
-  | 
spoof  | 
Displays information about devices launching spoofing attacks.  | 
-  | 
wapi-psk  | 
Displays information about devices that perform brute force cracking in WAPI-PSK authentication mode.  | 
-  | 
weak-iv  | 
Displays information about devices launching weak IV attacks.  | 
-  | 
wep-share-key  | 
Displays information about devices that perform brute force cracking in WEP-SK authentication mode.  | 
-  | 
wpa-psk  | 
Displays information about devices that perform brute force cracking in WPA-PSK authentication mode.  | 
-  | 
wpa2-psk  | 
Displays information about devices that perform brute force cracking in WPA2-PSK authentication mode.  | 
-  | 
mac-address mac-address  | 
Displays information about the detected attacking devices with specified MAC addresses.  | 
The value is in H-H-H format. An H is a hexadecimal number of 4 digits.  | 
Usage Scenario
After attack detection is enabled, you can run the display wlan ids attack-detected command to view information about the attacking devices.
Prerequisites
The attack detection functions of all types have been enabled using the wids attack detect enable command.
# Display information of all current attacking devices.
<HUAWEI> display wlan ids attack-detected all
#AP: Number of monitor APs that have detected the device
AT: Last detected attack type
CH: Channel number
act: Action frame            asr: Association request
aur: Authentication request  daf: Deauthentication frame
dar: Disassociation request  wiv: Weak IV detected
pbr: Probe request           rar: Reassociation request
eaps: EAPOL start frame      eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
-------------------------------------------------------------------------------
MAC address     AT     CH   RSSI(dBm)  Last detected time     #AP
-------------------------------------------------------------------------------
000b-c002-9c81  pbr    165  -87        2014-11-20/15:51:13    1
0024-2376-03e9  pbr    165  -84        2014-11-20/15:52:13    1
0046-4b74-691f  act    165  -67        2014-11-20/15:43:33    1
00bc-71b7-171d  pbr    165  -88        2014-11-20/15:41:43    1
00bc-71b7-171f  act    165  -87        2014-11-20/15:44:03    1
-------------------------------------------------------------------------------
Total: 5, printed: 5
Item  | 
Description  | 
|---|---|
MAC address  | 
  | 
AT  | 
Acronym of the attack type.  | 
CH  | 
Channel in which the last attack is detected.  | 
RSSI(dBm)  | 
Average received signal strength indicator (RSSI) of the attack frames detected.  | 
Last detected time  | 
Last time at which an attack is detected.  | 
#AP  | 
Number of APs which detect this attack.  | 
# Display information of an attacking device with the specified MAC address.
<HUAWEI> display wlan ids attack-detected mac-address 8c70-5a47-aad0
act: Action frame            asr: Association request
aur: Authentication request  daf: Deauthentication frame
dar: Disassociation request  wiv: Weak IV detected
pbr: Probe request           rar: Reassociation request
eaps: EAPOL start frame      eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
-------------------------------------------------------------------------------
MAC address                           : 8c70-5a47-aad0
Number of detected APs                : 1
Channel                               : 165
RSSI(dBm)                             : -80
Reported AP 1
  AP name                             : ap-13
  Flood attack type                   : pbr
  First detected time(Flood)          : 2014-11-20/15:50:33
  Spoof attack type                   : -
  First detected time(Spoof)          : -
  First detected time(Weak-iv)        : -
  First detected time(WEP)            : -
  First detected time(WPA)            : -
  First detected time(WPA2)           : -
  First detected time(WAPI)           : -
-------------------------------------------------------------------------------
Item  | 
Description  | 
|---|---|
MAC address  | 
  | 
Number of detected APs  | 
Number of APs which detect this attack.  | 
Channel  | 
Channel in which the last attack is detected.  | 
RSSI(dBm)  | 
Average received signal strength indicator (RSSI) of the attack frames detected.  | 
Reported AP  | 
Information of the AP which detects the attack.  | 
AP name  | 
Name of the AP which detects the attack.  | 
Flood attack type  | 
Flood attacks detected by the AP.  | 
Spoof attack type  | 
Spoofing attacks detected by the AP.  | 
First detected time  | 
First time when an attack is detected by an AP.  |