Bad Logins Documentation¶
Menu Location: Reports > System & Security > Bad Logins
Access Level: Administrator / Kiva Admin
Last Updated: 2026-03-01
Overview¶
The Bad Logins page tracks all failed login attempts across your admin and customer portals, providing crucial security monitoring to identify potential unauthorized access attempts, brute force attacks, or compromised accounts.
Primary Functions:
- Monitor all failed login attempts in real-time
- Identify potential security threats and attack patterns
- Track suspicious IP addresses attempting unauthorized access
- Review customer login issues for support purposes
- Generate reports on security incidents
- Block or whitelist IP addresses based on activity
Page Layout¶
Header Section¶
- Page Title: "Bad Logins" with total failed attempt count
- Date Range Filter: Select time period to review
- Search Bar: Search by IP address, username, or email
- Export Button: Download bad login data as CSV
Main Data Table¶
Displays all failed login attempts with the following columns:
- Date/Time: When the failed attempt occurred
- IP Address: Source IP of the login attempt
- Username/Email: The credentials used in the attempt
- Login Type: Admin or Customer portal
- Reason: Why the login failed (wrong password, account not found, etc.)
- User Agent: Browser/device information
- Actions: Options to block IP or view details
Summary Stats Panel¶
- Total failed attempts in selected period
- Unique IP addresses
- Most targeted accounts
- Peak attack times
Search & Filtering¶
Date Range Filter¶
Filter failed logins by time period:
- Last 24 Hours: Most recent activity
- Last 7 Days: Weekly security overview
- Last 30 Days: Monthly security analysis
- Custom Range: Specify exact date range
- All Time: Complete login failure history
Search Options¶
Search across multiple fields simultaneously:
- IP Address: Find all attempts from specific IP
- Email/Username: Track attempts targeting specific account
- User Agent: Filter by browser or device type
Failed Login Reason Filter¶
- Wrong Password: Legitimate users with incorrect credentials
- Account Not Found: Attempts using non-existent usernames
- Account Locked: Attempts on temporarily locked accounts
- Account Disabled: Attempts on deactivated accounts
- Multiple Failures: IPs with repeated failed attempts
Actions & Operations¶
Review Login Attempt¶
Purpose: View detailed information about a specific failed login
Steps:
- Click on any row in the bad logins table
- Review detailed modal showing:
- Full timestamp
- Complete IP address information
- Geographic location (if available)
- Full user agent string
- Password attempt (partially masked)
- Related attempts from same IP
- Click "Close" to return to list
Block IP Address¶
Purpose: Permanently block an IP address from accessing the system
Steps:
- Locate the suspicious IP address in the list
- Click "Block IP" button in the Actions column
- Confirm blocking decision
- Add optional note explaining reason for block
- IP is added to permanent blacklist
Requirements:
- Administrator access level
- Confirmation of blocking action
- IP not already in whitelist
Add to Whitelist¶
Purpose: Mark legitimate IP as safe to prevent future blocking
Steps:
- Identify the legitimate IP address
- Click "Whitelist" button in Actions column
- Add note explaining why IP is trusted
- Click "Save to Whitelist"
Use Cases:
- Company office IP addresses
- VPN endpoints used by staff
- Known customer locations with password issues
Export Bad Login Data¶
Purpose: Download security data for analysis or reporting
Steps:
- Apply desired filters (date range, IP, etc.)
- Click "Export CSV" button
- Choose export options:
- Summary (basic info)
- Detailed (all fields)
- Custom (select fields)
- Click "Download"
- Save CSV file to your computer
Common Use Cases¶
Use Case 1: Identifying Brute Force Attack¶
Goal: Detect and stop an ongoing brute force attack
Steps:
- Navigate to Bad Logins page
- Set Date Range to "Last 24 Hours"
- Sort by "IP Address" to group attempts
- Look for IPs with 10+ failed attempts
- Review the targeted usernames
- Click "Block IP" for attacking addresses
- Document the incident with notes
- Consider notifying targeted users if legitimate accounts
Example: IP 192.168.1.100 shows 47 failed login attempts in 2 hours targeting admin accounts "admin", "root", "administrator" - clear brute force attack pattern. Block immediately.
Tips:
- Block IPs with 20+ rapid failed attempts
- Look for dictionary attack patterns (common usernames)
- Check if targeted accounts actually exist
- Monitor for distributed attacks from multiple IPs
Use Case 2: Helping Customer with Login Issues¶
Goal: Diagnose why a legitimate customer can't log in
Steps:
- Search for customer's email address
- Review their recent failed login attempts
- Check the "Reason" column for failure cause
- Common issues:
- "Wrong Password": Customer needs password reset
- "Account Not Found": Email mismatch or account deleted
- "Account Locked": Too many failed attempts, unlock needed
- Take appropriate action (send password reset, unlock account, etc.)
- Contact customer with solution
Example: Customer [email protected] shows 5 failed attempts with "Wrong Password" over 3 days. Send password reset link and follow up with instructions.
Use Case 3: Monthly Security Review¶
Goal: Conduct regular security audit of login activity
Steps:
- Set Date Range to "Last 30 Days"
- Export full detailed report
- Analyze in spreadsheet:
- Total failed attempts vs. previous month
- Most targeted accounts
- Geographic patterns
- Time-of-day patterns
- Identify trends:
- Increasing attack frequency
- New targeted accounts
- Emerging threat IPs
- Update security measures:
- Block problematic IPs
- Strengthen targeted accounts
- Adjust rate limiting if needed
- Document findings for security log
Tips:
- Schedule monthly on same day each month
- Compare month-over-month trends
- Look for seasonal patterns
- Share findings with team
Use Case 4: Investigating Compromised Account¶
Goal: Determine if account has been compromised
Steps:
- Search for the suspected account email
- Review all failed and successful logins
- Look for red flags:
- Logins from unusual geographic locations
- Multiple failed attempts followed by success
- Different user agents than normal
- Login times outside user's typical pattern
- Cross-reference with customer activity logs
- If compromised:
- Lock the account immediately
- Contact customer via verified channel
- Force password reset
- Review any orders/changes made
Use Case 5: Tracking Geographic Attack Patterns¶
Goal: Identify if attacks originate from specific regions
Steps:
- Set Date Range to desired period
- Export detailed report with IP data
- Use IP lookup tools to map geographic locations
- Identify clustering:
- Multiple attacks from same country/region
- Known high-risk geographic areas
- Patterns suggesting botnet activity
- Consider geographic blocking if appropriate
- Update firewall rules if necessary
Report Data & Columns¶
| Column | Description | Details |
|---|---|---|
| Date/Time | When attempt occurred | Timezone matches account settings |
| IP Address | Source IP of attempt | Clickable to view all attempts from IP |
| Username/Email | Credentials used | Partially masked for privacy |
| Login Type | Portal type | "Admin" or "Customer" |
| Reason | Why login failed | System-generated failure reason |
| User Agent | Browser/device info | Full string available in detail view |
| Country | Geographic origin | Based on IP geolocation |
| Attempts Count | Multiple from same IP | Shows clustering |
| Actions | Available operations | Block, Whitelist, View Details |
Sorting & Display Options¶
Sort Options:
- Date/Time (newest first - default)
- Date/Time (oldest first)
- IP Address (alphabetically - groups by IP)
- Username (alphabetically)
- Attempts (highest to lowest - shows worst offenders)
Display Options:
- Show 25 per page (default)
- Show 50 per page
- Show 100 per page
- Show All (use cautiously with large datasets)
View Modes:
- Standard View: All columns visible
- Compact View: Essential columns only
- Detail View: Expandable rows with full information
Export & Download Options¶
Export Formats:
- CSV (Basic): Date, IP, Username, Reason
- CSV (Detailed): All fields including user agent, geolocation
- CSV (Security Report): Optimized for security analysis
- JSON: For programmatic analysis
Export Process:
- Apply desired filters to narrow dataset
- Click "Export" button
- Select format from dropdown
- Choose date range (if not already filtered)
- Click "Generate Export"
- Wait for processing (large datasets may take a minute)
- Download file when ready
Export Tips:
- Filter before exporting to reduce file size
- Use Basic format for quick reviews
- Use Detailed format for thorough investigations
- Schedule automated exports for regular monitoring
Troubleshooting¶
Issue 1: Too Many Results to Review¶
Symptoms: Thousands of failed login attempts making analysis difficult
Solutions:
- Apply date range filter to narrow timeframe
- Sort by IP address to group related attempts
- Filter by "Multiple Failures" to see repeat offenders first
- Use search to focus on specific accounts or IPs
- Export and analyze in spreadsheet with pivot tables
Common Causes:
- Prolonged brute force attack
- Widely distributed attack across many IPs
- Legitimate users with forgotten passwords
- Bot traffic not properly filtered
Issue 2: Legitimate User Appears as Bad Login¶
Symptoms: Customer reports login issues and appears in bad logins list
Check:
- Review the "Reason" field for the failure cause
- Verify customer's email address matches account
- Check if account is locked or disabled
- Look for case sensitivity issues in username
- Verify customer is using correct login portal (admin vs. customer)
- Check for browser/cache issues in User Agent
Solutions:
- Send password reset link if "Wrong Password"
- Unlock account if "Account Locked"
- Verify email if "Account Not Found"
- Update account status if "Account Disabled"
- Clear cookies/cache if persistent browser issues
Issue 3: Can't Block Attacking IP Address¶
Symptoms: Block IP button doesn't work or IP continues attacking
Check:
- Verify you have Administrator access level
- Check if IP is in whitelist (prevents blocking)
- Confirm IP address format is valid
- Look for IP range instead of single IP
- Check if using VPN/proxy that rotates IPs
Solutions:
- Request admin permissions if needed
- Remove from whitelist if mistakenly added
- Block entire IP range if rotating within range
- Implement rate limiting in addition to blocking
- Contact Kiva Logic for advanced firewall rules
If Problem Persists: Contact Kiva Logic support with:
- Attacking IP address(es)
- Timestamp of attack
- Screenshots of bad login attempts
- Exported data showing attack pattern
Issue 4: Export Times Out or Fails¶
Symptoms: Export button processing but file never downloads
Solutions:
- Reduce date range to smaller time period
- Apply more specific filters to limit results
- Try Basic export instead of Detailed
- Export in multiple smaller batches
- Try during off-peak hours
- Clear browser cache and retry
- Try different browser
Prevention:
- Don't export "All Time" with no filters
- Limit exports to 30 days or less initially
- Filter by specific IP or account before exporting
Related Pages¶
- IP Blacklist - Manage permanently blocked IP addresses
- Admin Login Logs - View successful admin logins
- Customer Login Logs - View successful customer logins
- Security Settings - Configure login security policies
- User Activity Logs - Track user actions after login
Typical Workflow:
- Bad Logins → Identify attack → IP Blacklist (block attacker)
- Bad Logins → Customer issue → Customer Detail (resolve login problem)
- Bad Logins → Export → Security Review → IP Blacklist (update blocks)
Permissions & Access¶
Required Access Level: Administrator
Access Level Capabilities:
- Manager: View only, no blocking capabilities
- Administrator: View + Export + Block IPs + Whitelist
- Kiva Admin: All features + Advanced filtering + Database access
Restricted Features:
- Block IP: Requires Administrator or higher
- Whitelist IP: Requires Administrator or higher
- Delete Records: Requires Kiva Admin only
Best Practices¶
Monitoring Frequency¶
- Review bad logins at least weekly
- Set up alerts for unusual spike in failures
- Monitor daily during high-risk periods
- Check immediately after major announcements
- Review before and after system changes
Security Response¶
- Block IPs with 20+ failed attempts within 1 hour
- Investigate IPs with 10+ attempts targeting specific accounts
- Whitelist known legitimate IPs proactively
- Document all blocking decisions with notes
- Review blocked IPs quarterly (unblock if no longer threat)
Customer Support¶
- Check bad logins before resetting passwords
- Verify failure reason before taking action
- Document customer login issues
- Follow up after resolving login problems
- Educate customers on password best practices
Reporting & Documentation¶
- Export monthly security reports
- Track trends over time
- Share findings with management
- Document significant security incidents
- Maintain log of blocked IPs with reasons
Things to Avoid¶
- Don't block IPs without investigation
- Don't ignore patterns of failed attempts
- Don't delete bad login records (needed for audits)
- Don't whitelist IPs without verification
- Don't export sensitive data to unsecured locations
Integration Points¶
Firewall Integration¶
- Blocked IPs sync to server firewall
- Automatic blocking at network level after X attempts
- Rate limiting based on bad login patterns
Email Notifications¶
- Alert admins when attack detected
- Notify users of suspicious login attempts
- Send reports of security incidents
Customer Support System¶
- Link to customer records for support cases
- Track login issues in support tickets
- Reference bad logins in customer communication
Quick Reference Card¶
| Task | Action/Location |
|---|---|
| View today's failed logins | Date Range: "Last 24 Hours" |
| Find attacks from specific IP | Search by IP address |
| Block attacking IP | Actions column > "Block IP" |
| Help customer with login | Search customer email > review Reason |
| Monthly security review | Date Range: "Last 30 Days" > Export |
| Find brute force attacks | Sort by IP > look for high attempt counts |
| Whitelist company IP | Actions > "Whitelist" > add note |
| Export security report | Apply filters > Export > Detailed CSV |
| Check specific account attacks | Search by email/username |
| Review geographic patterns | Export > analyze IP locations |
FAQs¶
How long are bad login records kept?¶
Failed login attempts are stored for 12 months, then automatically archived. Kiva Admin can access historical archives beyond 12 months if needed for investigations.
What triggers an account lockout?¶
After 5 failed login attempts within 15 minutes, the account is temporarily locked for 30 minutes. This applies to both admin and customer logins.
Can I see successful logins too?¶
Yes, successful logins are tracked in separate logs. See "Admin Login Logs" or "Customer Login Logs" pages for successful authentication history.
What's the difference between blocking and blacklisting?¶
Blocking is immediate and temporary - it can be reversed. Blacklisting is permanent and typically requires Kiva Admin to remove. Use blocking for most security responses.
How do I know if I'm experiencing a brute force attack?¶
Look for: (1) Many failed attempts from single IP in short time, (2) Attempts using common usernames (admin, root, etc.), (3) Sequential password patterns, (4) Unusual time-of-day for your business.
Can attackers bypass bad login tracking?¶
Sophisticated attackers may use rotating IPs or distributed attacks. Bad login tracking catches these but may require IP range blocking or rate limiting to stop effectively.
Should I block IPs from foreign countries?¶
Only if your business exclusively serves specific regions. Many legitimate customers travel or use VPNs. Review patterns before implementing geographic blocking.
What if I accidentally block a legitimate user?¶
Navigate to IP Blacklist page, find the IP, and click "Unblock". The user can immediately attempt login again. Consider whitelisting the IP to prevent future issues.
End of Documentation
For additional help, contact your system administrator or Kiva Logic support.