Suspicious IP Configuration

Suspicious IP Address Configuration

The Suspicious IP Address Configuration feature provides administrators with an advanced mechanism to identify, monitor, and manage IP addresses that exhibit abnormal or potentially malicious behavior. It plays a crucial role in safeguarding the authentication environment by detecting suspicious login patterns, mitigating brute force attempts, and blocking unauthorized network access in real time.

This configuration module offers fine-grained control through multiple components designed to provide flexibility and intelligence in threat detection.

Configuration

The General Configuration section enables administrators to define the baseline behavior for IP monitoring.

  • Enable: Activates the suspicious IP detection system. Once enabled, the platform begins analyzing incoming IP requests for suspicious patterns based on configured rules and previous history.

  • Trusted IP Addresses: A whitelist of IPs that are considered secure and exempt from throttling or blocking checks. This is ideal for internal systems, corporate VPNs, or other trusted network sources.

  • Blocked IP Addresses: A list of IPs that are permanently or temporarily denied access to the system. Any traffic originating from these IPs is automatically rejected to prevent further security threats.

Previous Criteria Check

The Previous Criteria Check section provides automated evaluation of IP behavior based on historical data and user activity patterns.

  • The system marks an IP as suspicious if it is associated with known fraudulent activities or multiple failed authentication attempts.

  • When this condition is met, the system can automatically trigger CAPTCHA challenges, initiate multi-factor authentication (MFA), or block the IP entirely.

  • This proactive approach ensures early identification of potential threats while maintaining a balance between user experience and security.

Activity Event Criteria

The Activity Event Criteria section focuses on tracking and responding to real-time IP activity within a defined monitoring window.

  • Enable: Activates event-based tracking and automatic blocking rules.

  • Time Range (in seconds): Defines how long the system should monitor specific IP behavior (e.g., login failures within an hour).

  • Cooling Period (in seconds): Specifies how long a blocked IP remains restricted before it is automatically released. Setting this value to zero enforces a permanent block.

  • Event Name and Attempt Threshold: Allows administrators to specify which events to track (such as USER_LOGIN_FAILURE) and how many attempts trigger a suspicious IP flag.

This dynamic rule-based configuration provides flexibility to adapt to different security policies, ensuring that repeated malicious activities are automatically addressed without manual intervention.

External IP Threat Providers

To further enhance security, the configuration integrates with external IP threat intelligence providers like IPSum. These providers deliver up-to-date information on known malicious IPs, allowing the system to proactively block high-risk sources before any login attempt occurs. This integration strengthens the overall security posture by combining internal monitoring with global threat intelligence data.

Conclusion:

  • Proactive Threat Prevention: Identifies and blocks suspicious IPs before they can exploit vulnerabilities.

  • Adaptive Protection: Automatically adjusts to changing attack patterns using configurable rules.

  • Operational Efficiency: Reduces manual intervention by automating IP blocking and unblocking processes.

  • Enhanced Visibility: Provides administrators with detailed insights into IP-based access patterns and potential security threats.

The Suspicious IP Address Configuration feature acts as an intelligent defense layer within your authentication ecosystem continuously monitoring network activity, preventing unauthorized access, and fortifying your security infrastructure against evolving cyber threats.

Last updated