Brute force attempt from suspicious IP by user email

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect a brute force attack on a user across log sources.

Strategy

To identify a successful attempt: Detect when the same user fails to log in five times, and then successfully logs in. This generates a MEDIUM severity signal.

To identify an unsuccessful attempt: Detect when the same user fails to log in ten times. This generates an INFO severity signal.

Triage and response

  1. Inspect the logs to see if this was a valid login attempt.
  2. Verify if 2FA was authenticated.
  3. If the user was compromised, rotate user credentials.