You could if you wanted too. Set the systemlog to email you on any notifications to see if any WAN IP addresses show up. IF the logs show attempted WAN side IP addresses, maybe then you can set a rule to block that IP address then.
I've never seen or had any issues from the WAN side on any of my D-Link routers. Been safe and secure using router default settings and configuring SSID and PWs. I do keep FW up to date unless I'm testing something out. 
Right now, I have it going to my Syslog server. Guess I could write a script to scan it.
Speaking of firmware...
Router says
Current Firmware Version: 1.00, Fri 02 Jun 2017
Current Firmware Date: 2017-06-02 05:20:00
Web site (and in another thread here, says latest is 1.00B19 / 1.00B11 for Ext) with a date of Aug 17, 2017
Since firmware dates are different, I told the router to check for new firmware.
Said I was running the latest.
So, is it newer or not is the question...
=====================================================================================================================================================================
Any inbound traffic from the WAN side are blocked by default. The only way in is through remote management if enabled, but that is protected with a password.
The other way they can get in, is through the LAN ports but that secured in your house. Just make sure the doors and windows are locked. =)
The third way is wireless but it is already hidden and protected with WPA2 Authentication.
So far no known vulnerabilities with COVR system.
Good to know, thanks