A major consumer fintech app was facing a relentless Credential Stuffing attack. Hackers had bought 100 million username/password pairs from a data breach and were trying them all on the app's login API.
Why standard rate limits failed: The attackers used a "Rotating Proxy Network." Every single login attempt came from a different IP address. Rate limiting by IP (`5 attempts per IP`) did nothing because no IP was ever used twice.
The security team deployed CandycornDB to analyze the network infrastructure of incoming requests. They discovered two patterns:
By filtering based on Network Type rather than just IP Reputation, the team blocked 99.8% of the bot traffic. Legitimate users (logging in from Verizon, Comcast, T-Mobile) saw zero friction, while the attackers' success rate dropped to zero.