Skip to main content

Risk Events

The Risk Events page provides a full audit log of every login attempt evaluated by the Risk Engine. Each event captures the risk score, triggered signals, device information, geographic data, and anomaly flags. Admins can browse, filter, and investigate individual events in detail.

Risk Events Page

Risk Events — Login evaluations, risk scores, and signal details

Filters

Time Range

OptionDescription
Last 24 HoursEvents from the past 24 hours
Last 7 DaysEvents from the past 7 days
Last 30 DaysEvents from the past 30 days
AllFull event history

Severity Filter

Quick-filter buttons for All / Safe / Low / Moderate / High severity bands. Multiple selections are not supported; each button is mutually exclusive.

Full-text search across username, IP address, city, and country fields.

Event List Columns

ColumnDescription
Date / TimeWhen the login attempt occurred
UsernameThe user identifier
IP AddressResolved client IP, with country flag
City / CountryGeographic location from IP geo database
Risk ScoreNumeric score with severity badge (color-coded)
SignalsTags showing each triggered signal with its MITRE ATT&CK technique ID. Hovering over a tag shows the signal description
DeviceBrowser name, OS name, device type
ASNAutonomous System Number and AS name

False-Positive Rows

Events marked as false positives are visually dimmed (60% opacity) and their severity badge is greyed out. This allows admins to distinguish confirmed benign events from active threats without deleting the record.

Event Detail

Clicking on an event row opens a detail panel (loaded via AJAX) with the complete event record:

Identity & Location

  • Username, IP address, country, region, city
  • Latitude and longitude
  • ASN and AS name

Device Information

  • Browser name and version
  • Operating system name and version
  • Device type (desktop, mobile, tablet, etc.)
  • Raw user-agent string
  • Device fingerprint hash
  • Bot detection flag

Timezone Analysis

  • Browser Timezone — Timezone reported by the browser (UTC offset in minutes)
  • IP Timezone — IANA timezone name resolved from the IP geo database
  • Timezone Difference — Computed difference between the two (hours). A large mismatch can indicate VPN or proxy use.

Travel Analysis

  • Impossible Travel — Boolean flag indicating whether the login location is physically impossible given the time elapsed since the previous login
  • Travel Velocity — Computed speed in km/h between the current and previous login location

Triggered Signals

A breakdown of all signals that fired, grouped by context category (Reputation, Location, Identity, Time, Device). Each signal shows its key name, MITRE ATT&CK technique ID, and the score it contributed.

Normal Profile (for comparison)

Built from the user's last 100 low-risk (Safe) events:

  • Most common countries
  • Most common cities
  • Most common browsers
  • Most common operating systems
  • Most active hours (histogram)

This profile helps distinguish genuine anomalies from expected variation in the user's behavior.

False-Positive Toggle

Admins can mark any event as a false positive directly from the detail panel. Marking an event as a false positive does not lift any blocks — it only changes the visual presentation and allows filtering.

Risk Signal Reference

The following signals may appear on events. They are grouped by context and mapped to MITRE ATT&CK techniques:

Reputation Signals (T1090)

SignalDescription
known_bad_ipIP matched a high-confidence threat feed
suspicious_ip_reputationIP matched a medium-confidence threat feed
ip_blocklistIP is on an active IP blocklist

Location Signals

SignalMITREDescription
impossible_travelT1078Location change is physically impossible given elapsed time
geo_radius_exceededT1078Login is outside the user's normal geographic radius
new_countryT1078Login from a country not seen in user history
new_regionT1078Login from a region not seen in user history
new_cityT1078Login from a city not seen in user history
datacenter_asnT1583.003IP belongs to a known cloud/datacenter ASN
known_vpn_asnT1090.003IP belongs to a known VPN provider ASN
tor_anonymous_proxy_asnT1090.003IP belongs to a Tor exit node ASN

Identity Signals (T1110 / T1078)

SignalDescription
failed_attemptsMultiple recent authentication failures for this user
first_time_loginThis is the user's first successful login ever
dormant_accountAccount has been inactive for an extended period
novel_asnLogin from an ASN not seen in recent user history

Time Signals (T1078)

SignalDescription
unusual_hourLogin hour falls outside the user's historical active hours
nighttime_loginLogin occurred during typical nighttime hours
weekend_loginLogin occurred on a weekend
timezone_mismatchBrowser-reported timezone differs significantly from IP-derived timezone

Device Signals (T1059 / T1078)

SignalDescription
bot_detectedUser-agent or behavior matches known bot patterns
headless_browserBrowser fingerprint indicates a headless/automated browser
empty_user_agentNo user-agent string present
new_deviceDevice fingerprint not seen in recent user history
new_device_no_cookieNo device cookie present and fingerprint is new
fingerprint_blocklistDevice fingerprint is on the blocklist
fingerprint_watchlistDevice fingerprint is on the watchlist
shared_deviceSame device fingerprint recently used by multiple users
browser_name_changedBrowser name differs from recent logins
os_name_changedOperating system differs from recent logins
device_type_changedDevice type (desktop/mobile) differs from recent logins