Monitoring access patterns and detecting threats in real-time
Monitor authentication events and security activities
6
Past hour
2
Past hour
3
Require attention
4
Active locations
Timestamp | User | Event | IP Address | Device | Location | AI Alert |
---|---|---|---|---|---|---|
2024-01-15 14:32:15 | sarah.wilson@company.com | Login Success | 192.168.1.100 | Chrome - Windows 11 | San Francisco, CA | |
2024-01-15 14:30:22 | unknown@external.com | Login Failed | 203.45.67.89 | Firefox - macOS | Unknown | Unusual Device |
2024-01-15 14:28:45 | admin@company.com | Admin Action | 192.168.1.50 | Chrome - Windows 11 | San Francisco, CA | |
2024-01-15 14:25:10 | mike.chen@company.com | Login Success | 192.168.1.75 | Safari - macOS | San Francisco, CA | |
2024-01-15 14:20:33 | john.doe@company.com | Login Failed | 192.168.1.100 | Chrome - Windows 11 | San Francisco, CA | Multiple Failures |
2024-01-15 14:15:18 | lisa.rodriguez@company.com | Login Success | 192.168.1.120 | Chrome - Windows 11 | San Francisco, CA | |
2024-01-15 14:10:42 | admin@company.com | Login Success | 203.45.67.90 | Chrome - Windows 11 | New York, NY | Impossible Travel |
2024-01-15 14:05:55 | emily.johnson@company.com | Login Success | 192.168.1.95 | Chrome - Windows 11 | San Francisco, CA |
Impossible Travel Detected
Admin user logged in from New York at 14:10, but was in San Francisco at 14:28. This suggests potential account compromise.
Unusual Device Access
Unknown user attempted login from unrecognized device and location. This could be a brute force attack.
Multiple Login Failures
User "john.doe" has multiple failed login attempts from the same IP. Account may be compromised or user forgot password.