Real-time monitoring
Security Center provides you with an overview of your tenant’s security pulse and allows you to drive outcomes from within the Auth0 Management Dashboard. In Security Center, you can:- Monitor your total traffic and total threats
- Observe threat behavior trends
- Identify applications associated with threat behavior trends
- Track login and signup traffic
- Monitor threats identified by our and features
Filtering and aggregation
Security Center allows you to filter available data to your needs. You can filter data based on a time period, including:- Last hour
- Last 12 hours
- Last day
- Last 7 days
- Last 14 days
Threat behavior trends
Security Center allows you to observe threat behavior trends for the following threat types:- Credential stuffing: Behavioral patterns that appear to involve a machine attempt with the goal of submitting credentials to compromise user accounts.
- Signup attack: Behavioral patterns that appear to involve a machine attempt with the goal of creating new user accounts.
- MFA bypass: Behavior patterns that appear to involve a machine attempt with the goal of circumventing user multi-factor authentication (MFA) protections.

Authentication events
Security Center allows you to inspect authentication events, including login attempts and signup attempts.
Login attempts
Login attempts include both successful and failed login transactions over the last seven days.Signup attempts
Signup attempts include both successful and failed signup transactions over the last seven days.Attack Protection and MFA monitoring
Security Center helps you understand current attack trends identified by our Attack Protection and MFA features, and allows you to implement countermeasures by enabling and configuring these features:We will identify patterns that are usually an indicator of known attack types and log-related events, regardless of whether you selected countermeasures when configuring our Attack Protection features.
Bot detection
mitigates scripted attacks by detecting when a request is likely to be coming from a bot. Bot detection includes the number of bots detected over the last seven days.
Suspicious IP throttling
blocks traffic from any IP address that rapidly attempts too many logins or signups. Suspicious IP throttling includes the number of suspicious IPs blocked over the last seven days.
Brute-force protection
safeguards against a single IP address attacking a single user account. Brute-force protection includes the number of blocked brute-force attempts over the last seven days.
Breached password detection
protects your applications from signing up or logging in with stolen credentials. Breached password detection includes the number of breached credentials detected in login and signup flows over the last seven days.
Multi-factor authentication
Multi-factor authentication (MFA) verifies users by requiring more than one type of user validation. MFA includes the number of MFA challenges detected and the number of MFA challenges passed or failed over the last seven days.