heroui logo

Axonius login from Tor IP

Panther Rules

View Source
Summary
The Axonius detection rule "Axonius.TooManyFailedLogins" monitors user login activity to identify instances where multiple failed login attempts are made from a Tor IP address, signaling a potential malicious login attempt. The rule activates upon detecting a specified threshold of failed logins to ensure that suspicious activities are captured before they can form a successful intrusion. The expected behavior is that if a user, such as 'testr@axonius.com', encounters more than a predefined count of failed logins (e.g., six in this case), an alert will be triggered. This is reflected in a structured logging method that logs relevant details such as the user's email and the response of the login attempt, allowing for thorough investigation. The severity of this rule is marked as 'Medium' given the context that abnormal login attempts can vary in threat levels depending on other factors. Moreover, the implementation includes a runbook outlining the necessary steps to be taken when such an alert is triggered. This involves reviewing actions taken, checking the credentials/service user utilized, and escalating the incident when warranted.
Categories
  • Identity Management
  • Endpoint
  • Cloud
Data Sources
  • User Account
  • Application Log
Created: 2025-09-19