Log Event Type | Description |
---|---|
pla | Generated before login and monitor bot detection, even if bot detection is only in monitoring mode and not using CAPTCHAs to identify bots. |
fu | Failed user login events due to invalid username, which can indicate attempted username enumeration or account takeover attempts. |
fp | Failed user login events due to invalid password, which can indicate attempted credential stuffing attacks. |
pwd_leak | Attempted login events with a leaked password, which can indicate attempted credential stuffing attacks. |
limit_wc | IP block events for >10 failed login attempts to a single account, which indicates the IP address is likely to belong to a bot. |
limit_sul | User block events for >20 login attempts per minute from the same IP address, which indicates likely bot activity. |
limit_mu | IP block events for >100 failed login attempts or >50 signup attempts from the same IP address, which indicates likely bot activity. |
fcoa | Failed cross-origin authentication events, which indicates attackers using automation to perform account takeovers. |
scoa | Successful cross-origin authentication events, which indicates attackers using automation to perform account takeovers when originating from a small number of IP addresses across multiple users. |
user-agent
strings, and consider employing a reverse proxy.