Log event types
f:
Failed user loginfu
: Failed user login due to invalid usernamefp
: Failed user login due to invalid passwordpwd_leak
: Attempted login with a leaked passwordsignup_pwd_leak
: Attempted to sign up with a leaked passwordlimit_wc
: IP blocked for >10 failed login attempts to a single accountlimit_sul
: User blocked for >20 login per minute from the same IP addresslimit_mu
: IP blocked for >100 failed login attempts or >50 signup attemptsfcoa
: Failed cross-origin authenticationscoa
: Successful cross-origin authenticationfp
, fu
and fcoa
log events. For more information, read Auth0’s Breached Password playbook.
fp
, fu
, and fcoa
log events in your logs.
fp
log events and pwd_leak
log events.
fs
, ss
and signup_pwd_leak
log events.
date:[startdate to enddate]
in YYYY-MM-DD
format. For example, 2024-10-01
. Use *
to represent the current date.
By limiting the time of interest to a potential attack window, you can retrieve all log events of the type you’re interested. Below is an example query that searches for brute force attacks from October 1, 2024 to the present:
user-agent
strings, and consider employing a reverse proxy.fcoa
and scoa
events, remembering that Auth0 does not recommend using cross-origin authentication.