Suspicious login detection (Anomalous Login Detection)
This workflow is primarily used for real-time monitoring of user login behavior, identifying abnormal logins, and quickly responding to potential security threats. By integrating various data sources, such as GreyNoise threat intelligence and IP-API geolocation services, it can automatically compare historical login records to determine if any abnormal behavior exists and issue alerts based on risk priority. It supports notifying users of abnormal situations via Slack and email, enhancing account security and providing an efficient threat handling mechanism for the security team.
Tags
Workflow Name
Suspicious_login_detection (Anomalous Login Detection)
Key Features and Highlights
This workflow enables real-time monitoring and anomaly detection of user login activities by integrating multi-dimensional data sources for comprehensive analysis, rapidly identifying and prioritizing potential security threats. Highlights include:
- Multi-Source Data Fusion: Integrates GreyNoise threat intelligence, IP-API geolocation services, and UserParser user-agent parsing to create detailed contextual login information.
- Anomalous Behavior Identification: Automatically detects new login locations and devices/browsers by comparing against historical login records to promptly identify suspicious logins.
- Intelligent Threat Prioritization: Automatically assigns high, medium, or low alert levels based on GreyNoise IP reputation and classification data, optimizing security response workflows.
- Multi-Channel Alert Notifications: Supports real-time security alert pushes via Slack channels and sends email notifications to users regarding anomalous logins, enhancing security awareness.
- Flexible Trigger Mechanisms: Supports triggering via Webhook for real login events and manual triggers for testing, facilitating deployment and debugging.
Core Problems Addressed
- Timely detection and response to anomalous user account logins to prevent unauthorized access.
- Reducing false positives and improving detection accuracy through rich threat intelligence and user behavior comparison.
- Automated priority management and notification mechanisms to ensure security teams efficiently handle the most critical incidents.
- Enhancing end-user security confidence by proactively informing them of potential risks and promoting collaborative security protection.
Application Scenarios
- User identity security management for enterprises or organizations.
- Login security monitoring for SaaS products or online services.
- Security Operations Centers (SOC) requiring automated security event detection and alerting.
- Security automation workflows involving advanced threat analysis through multi-source data integration.
Main Process Steps
- Data Collection
Receive login events via Webhook and extract key data (IP address, user agent, timestamp, user ID, accessed URL, etc.). - Threat Intelligence Query
- Call GreyNoise API to obtain IP security reputation and classification.
- Call IP-API to retrieve geolocation information.
- Call UserParser to parse user-agent strings and identify device, browser, and operating system.
- Data Aggregation and Analysis
Merge the above data to form a comprehensive login profile. - Anomaly Detection
- Query the user’s last 10 login records and compare current login geolocation and device information.
- Determine if the login originates from a new location or new device/browser.
- Threat Prioritization
Assign risk priority (high, medium, low) to the login event based on GreyNoise classification, trust level, and anomaly detection results. - Alerting and Notification
- Send detailed security alerts via Slack, including priority level, user info, IP details, and GreyNoise report links.
- If the user has an email address, send HTML-formatted email notifications detailing the anomalous login and providing security recommendations.
- Follow-up Actions
Based on priority and context, the security team may take measures such as password resets or account suspension.
Involved Systems and Services
- GreyNoise: Provides IP threat intelligence to classify IPs as malicious, benign, or unknown.
- IP-API: Offers geolocation data for IP addresses.
- UserParser: Parses user-agent strings to identify login devices and browsers.
- Postgres Database: Stores user and login history data for comparison and analysis.
- Slack: Sends instant alert messages to the security team.
- Gmail: Sends anomalous login notification emails to users.
- Webhook: Receives real-time login events to trigger the workflow.
- Manual Trigger: Supports manual triggering for testing purposes.
Target Users and Value Proposition
- Security Operations Teams (SecOps): Achieve automated and efficient anomalous login detection and threat response with this workflow.
- Product Security Managers: Enhance product account security and reduce incidents caused by suspicious logins.
- IT Operations Personnel: Quickly identify risky IPs and anomalous behaviors by integrating multiple data sources, simplifying security analysis.
- General Enterprise Users: Protect account security by timely awareness of abnormal access and proactively mitigating potential risks.
This workflow provides a mature and extensible solution for building intelligent and secure login monitoring systems, helping organizations strengthen their security posture and safeguard digital assets.
New WooCommerce Order to Slack
This workflow automatically monitors new orders on the WooCommerce platform. When the order amount reaches or exceeds 100, the order details are pushed in real-time to a designated Slack channel. Through conditional checks, it ensures that the team is promptly informed of high-value order updates, enhancing response speed and customer service quality, reducing manual monitoring costs, and promoting team collaboration. It is suitable for e-commerce operations, customer service, and sales teams, facilitating efficient order management and information sharing.
Receive Updates for All Changes in Pipedrive
This workflow uses Pipedrive triggers to monitor all data changes in the customer relationship management system in real-time, ensuring that users receive timely update notifications, thereby enhancing information accuracy and work efficiency. It is suitable for sales teams and customer service departments, as it can automatically sync change information and trigger subsequent actions, helping users respond quickly to customer needs, optimize service processes, and reduce information omissions, ultimately achieving more efficient customer management.
Discord Scheduled Events Synchronization to Google Calendar
This workflow is designed to achieve automatic synchronization of scheduled events between a Discord server and Google Calendar. Through scheduled triggers, it regularly retrieves activity schedules from Discord and compares them with corresponding events in Google Calendar, automatically performing additions or updates. This automation process not only reduces the tediousness of manual operations but also effectively avoids issues of information omission and inconsistency, helping users manage cross-platform event schedules more efficiently.
Nextcloud Folder and Subfolder Batch File Move Automation Workflow
This workflow enables the orderly migration of specified folders and their subfolders' files to a target location within a Nextcloud environment. By recursively traversing and moving files one by one, it avoids migration failures caused by rate limits, ensuring consistency in the directory structure. It supports manual triggering, Webhooks, or other workflow calls, accommodating various scenario needs, simplifying large-scale file management tasks, and enhancing the automation and reliability of file migration.
Dropbox File Download and Management Automation Workflow
This workflow can automatically download files from a specified URL and upload them to a designated folder in Dropbox, while also supporting the viewing and management of files within Dropbox. By streamlining the processes of downloading, uploading, and managing files, users can effectively reduce manual operations and improve file handling efficiency. It is suitable for individuals and teams that need to regularly back up online resources or manage files.
Bitrix24 Task Form Widget Application Workflow Example (Webhook Integration)
This workflow example implements the integration of custom widgets in the Bitrix24 task view, supporting the automatic reception of event notifications and handling application installations via Webhook. It is capable of dynamically registering widget locations, retrieving and formatting task data in real-time, thereby enhancing the user experience. The workflow also includes status monitoring, configuration management, and error handling mechanisms to ensure stable system operation, making it suitable for enterprise management and team collaboration scenarios, while simplifying the integration and data interaction processes of third-party applications.
Create, Update, and Retrieve a User Using the G Suite Admin Node
This workflow enables automated management of Google Workspace users, supporting the creation of new users, updating user information, and retrieving user details. Through secure OAuth2 authentication, it simplifies user lifecycle management, eliminates manual operations, and enhances the accuracy and timeliness of data maintenance. It is suitable for IT administrators and human resources departments, effectively saving time and labor costs while optimizing daily user management tasks.
Create Google Credentials
This workflow is designed to automatically batch create OAuth2 credentials for multiple Google services (such as Docs, Sheets, Slides, etc.), significantly simplifying the complex process of manual creation and management. Users only need to input the Google JSON file and email address to quickly generate well-structured, conventionally named credentials that are easy to use and maintain. This automated solution is particularly suitable for developers and businesses, enhancing efficiency, reducing repetitive tasks, and ensuring logical and convenient credential management.