Login activity observed from Tor client IP

This rule is part of a beta feature. To learn more, contact Support.

Classification:

threat-intel

Tactic:

Technique:

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect activity observed from a Tor exit node.

Strategy

Monitors event logs and IP address associated with the application to determine whether activity is observed from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real-time.

Triage and response

  1. Determine if the user: {{@usr.name}} from IP address: {{@network.client.ip}} should have performed activity: {{@evt.name}}.
  2. Investigate the user’s recent activity and login history to identify potential anomalies.
  3. If the activity is deemed suspicious, consider escalating the incident to the security team for further investigation and potential remediation.